Feeds

Fire-breathing bus attacks South London

Hysterical Londoners flee renewed assault

  • alert
  • submit to reddit

A new approach to endpoint data protection

Hysterical Londoners were last week subjected to a further terrifying ordeal after another Satanic bendy bus caught fire prompting immediate evacuation of the murderous vehicle.

We say terrifying not because the incident was in any way life-threatening, but because the attack was timed to cause maximum emotional distress - the articulated single-decker was at the time in New Cross, which means that the victims were obliged to spend longer in the sun-kissed South London paradise than absolutely necessary. Nasty.

Regular readers will recall that three bendy buses last year spontaneously combusted, provoking a temporary withdrawal of the entire fleet. The cause was later attributed to "a hose used in the bus engines", as the BBC rather vaguely puts it.

The suicidal omnibus (route 436, bus enthusiasts will be interested to note) has been "taken to a garage for inspection". We have no doubt that bendy bus champion "Red" Ken Livingstone will be waiting to once again cover up the real reason for the outrage and silence any witnesses in the traditional manner - by offering them a lifelong exemption from congestion charges and a family pass for the London Eye.

We take this opportunity to once again warn readers about the bendy bus menace and to demand the immediate redeployment of Routemasters across the capital. ®

The Rise of the Machines™

Dyson unleashes self-replicating hoover
Battling teen crushes roboarm menace
French join motorised Lizard Alliance
Lizard Army develops copulating robot
We are Zogg: The Cuddly Menace
Lizard Army invades Alaska
London menaced by flaming DVD players
Killer hoover attacks Scotsman
Car self-destructs in assassination bid
The rise of the rat-brain controlled android
Japanese unveil trumpet-playing robot
Boffins unleash robotic cockroach
Ukrainian teen fights the Rise of the Machines
Man in satanic Renault terror ordeal
Killer cyberappliances: Satan implicated
US develops motorised robobollard
Killer cyberloo kidnaps kiddie
A robot in every home by 2010
Cyberappliances attack Italian village
Fire-breathing buses threaten London
Cyberloo blast rocks Stoke-on-Trent
Spanish cyberkiosks claim second victim
Cyberkiosk assaults Spanish teenager
Hi-tech toilet caught on camera
Hi-tech toilet swallows woman

The Essential Guide to IT Transformation

More from The Register

next story
Just TWO climate committee MPs contradict IPCC: The two with SCIENCE degrees
'Greenhouse effect is real, but as for the rest of it ...'
Asteroid's DINO KILLING SPREE just bad luck – boffins
Sauricide WASN'T inevitable, reckon scientists
Brit amateur payload set to complete full circle around PLANET EARTH
Ultralight solar radio tracker in glorious 25,000km almost-space odyssey
Boffins spot weirder quantum capers as neutrons take the high road, spin takes the low
Cheshire cat effect see neutrons and their properties walk different paths
NASA Mars rover FINALLY equals 1973 Soviet benchmark
Yet to surpass ancient Greek one, however
Famous 'Dish' radio telescope to be emptied in budget crisis: CSIRO
Radio astronomy suffering to protect Square Kilometre Array
prev story

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?