Feeds

Inventor deploys hoodie-busting sonic weapon

Suck on Mosquito, teen ne'er-do-well

Beginner's guide to SSL certificates

A Welsh invention which claims to repel rowdy teenage ne'er-do-wells while leaving lawabiding fortysomethings and septuagenarian war heroes to go about their business unmolested has been creating a bit of a stir in the UK and international press this week.

Howard Stapleton's "Mosquito" emits an ultrasonic sound which can be heard by most kids and teenagers but is inaudible to the majority of adults over 30 due to the inevitable deterioration of hearing with age.

Field tests at a grocery store in Barry, South Wales, and a shop in Stapleton's home town of Merthyr Tydfil have proved successful, with rowdy yobs driven from the premises.

The future looks bright for the Mosquito, with its inventor admitting to Reuters: "All I'm getting is pats on the back." And no wonder. ®

Intelligent flash storage arrays

More from The Register

next story
Criticism of Uber's journo-Data Analytics plan is an Attack on DIGITAL FREEDOM
First they came for Emil – and I'm damn well SPEAKING OUT
'It is comforting to know where your data centres are.' UK.GOV does NOT
Plus: Anons are 'wannabes', KKK says, before being pwned
Google's whois results say it's a lousy smut searcher
Run whois google.com or whois microsoft.com. We dare you, you PIG◙◙◙◙ER
Holy vintage vehicles! Earliest known official Batmobile goes on sale
Riddle me this: are you prepared to pay US$180k?
'Open source just means big companies can steal your code.' O RLY?
Plus: Flame of the Week returns, for one night only!
NEWSFLASH: It's time to ditch dullard Facebook chums
Everything hot in tech, courtesy of avian anchor Regina Eggbert
Hey, you, PHONE-FACE! Kickstarter in-car mobe mount will EMBED your phone into your MUG
Stick it on the steering wheel and wait for the airbag to fire
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Website security in corporate America
Find out how you rank among other IT managers testing your website's vulnerabilities.