Feeds

Smut-blurring software ruins quality net porn

PixAlert fights inappropriate material

Seven Steps to Software Security

NSFW Irish smut-busting outfit PixAlert has develeoped technology which it claims "completely prevents pornographic images being displayed and viewed on computer screens" by somehow blocking "illegal or inappropriate images as they are rendered".

This impressive feat is achieved through "high-speed image analysis software" which can apparently detect "images actually being displayed on any screen and originating from any computer source".

Hmmmmm. We're not quite sure how PixAlert distinguishes between Edouard Manet's Olympia, for example, and a XXXX snap of a recumbent cheerleader pleasuring herself with a pom-pom, but here's how the company describes it:

PixAlert Monitor resides on the desktop and when a suspect image is blurred and subsequently viewed, a record is created in an audit log and an immediate alert can be sent to the administrator console. The administrator can view an encrypted copy of the image, along with the source machine and user name, date-time and the program used to view it.

PixAlert marketing supremo, Andy Churley, explained: "Inappropriate images in the workplace are becoming a real threat to business operations. Their presence on corporate computers and dissemination through a network can have severe consequences for an organisation and its corporate officers, including exposure to civil litigation, criminal proceedings, brand and reputation damage, financial loss and breach of corporate policies."

This is true. To determine whether your organisation is at risk from a litigation shitstorm, or already installed PixAlert over the weekend, see if you can view with clarity the following image of Paris Hilton romping naked on a couch with Madonna while Natalie Portman soaps herself down in the shower:

This image has been blocked and the authorities notified

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.