Feeds

UK's first 'most wanted' website goes titsup

Burgled perhaps?

7 Elements of Radically Simple OS Migration

An FBI-style website listing some of the UK's 'most wanted' crims has gone titsup within hours of going live.

The site - www.mostwanted-uk.org - enables vulture-eyed citizens to tip-off police if they spot any villains.

The site was launched today by charity Crimestoppers and has been described by Nick Ross, presenter of the BBC's Crimewatch TV programme, as the "biggest advance since the 'Wanted' poster".

Snag is, the site has suffered GBH after thousands of people tried to access it this morning.

While some may have got a peep at the UK's "most wanted", many others were faced with the following message: "The page cannot be displayed. The request cannot be processed at this time. The amount of traffic exceeds the Web site's configured capacity."

A spokesman for Crimestoppers told us that the site had been swamped by users.

One wag who contacted El Reg said: "Maybe the dark forces of the criminal underworld have got wind of the site and hired a hitman to 'take it out'" Another suggested it had been burgled.

Ho hum. ®

Boost IT visibility and business value

Whitepapers

7 Elements of Radically Simple OS Migration
Avoid the typical headaches of OS migration during your next project by learning about 7 elements of radically simple OS migration.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Solving today's distributed Big Data backup challenges
Enable IT efficiency and allow a firm to access and reuse corporate information for competitive advantage, ultimately changing business outcomes.
A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?