Feeds

USB missile launches detected on multiple fronts

Yes, it's WAR!

High performance access to file storage

Updated What have we done? Today, we began receiving sporadic reports of the outbreak of hostilities between rival factions within the nation's offices and workplaces, all following our coverage of the USB missile launcher gizmo yesterday.

Reg Hardware, is seems, may have contributed to a major dip in the country's productivity as workers down tools and start firing small, foam rockets at each other. Entire departments are believed to have become mired in conflict.

Update

And we're now getting word of a dramatic escalation in the USB missile launcher arms race. Many Bothans died getting us these images of a USB webcam-augmented USB missile launcher.

usb missile launcher hostilities unfold

Intelligence suggests these fearsome new weapons are the product of notorious munitions boffin David Willis.

Meanwhile, a rogue faction of Linux programmers led by one Scott Weston have hijacked a number of missile deployment units. Alas, they made a classic blunder, communicating the details of their plot and methodology in webpage form.

Thanks to the international man of mystery known only as 'Geoff' for this item.

Update ends

We received this bulletin from the front line this morning. It is typical of the many reports we are currently receiving:

Due to rapid growth, our company offices are split down the middle by a public corridor; this has resulted in a 'west wing' and and 'east wing'. There have been concerns of a 'them and us' culture developing, but recent events have accelerated this beyond measure....

Comments from the West Wing are denoted with W and East with an E.

W
At last WMD in an achievable price range!
-------------------------------------------------------------------------------

E
It makes no mention of range. Is it a short-range or long-range intra-office balistic missile system?
-------------------------------------------------------------------------------

W
Good point. I'm assuming that it will go further than North Korea's little effort although I don't know if it has cross-corridor capabilities
--------------------------------------------------------------------------------

E
Does this mean the start of an inter-corridor arms race? We need to start preparing our defences (elastic band launchers and kamikaze stuffed penguins)...

Now where is my tin hat?
-------------------------------------------------------------------------------

W
I think this talk of 'arms races' and 'band launchers' is counter productive to the fragile peace that exists across our borders. This sabre-rattling about penguins only seeks to undermine the Pub-Lunch Initiatives and the Waterfront Pizza Non-Proliferation Treaty.
--------------------------------------------------------------------------------

E
I went to the pub for lunch, yet no member of the West wing was there. This snub sees my preparing for full scale conflict.
--------------------------------------------------------------------------------

W
How can delegates attend something to which they were not invited?

This is typical of the East's attitude and nothing more than a continuation of long line of calculated diplomatic faux-pas designed to increase tensions between us. For example, the increasing laxity of the East's research delegation in attending pre-arranged meetings designed to build bridges between our great nations.
--------------------------------------------------------------------------------

E
I'm sorry, but if you can't be bothered to take an interest in local affairs, that's your own lookout. Energize the demolition beam. I don't know. Apathetic bloody office. I have no sympathy at all.
--------------------------------------------------------------------------------

E
This is an official statement from the newly formed East Wing Ministry of Defence.

A spate of comunications were intercepted during Thursday 6th July discussing armament and inter-office conflict. These communications initiated within the West Wing, and are viewed by the East Wing Government as a clear indication of West Wing aggression.

The East Wing believes this aggression to be a direct threat to our peaceful way of life, and a clear evidence of the Evil that resides within the West Wing. In the interests of preserving democracy for the free peoples of the office, the East Wing has sought access to West Wing installations for our approved weapons inspectors. This access has not been granted, and it is now clear that the West Wing is hiding an advanced and deadly inter-office weapons programme.

Subsequently, the East Wing Government feels that we are left with no choice but to launch a pre-emptive strike in defence of all that is good.
--------------------------------------------------------------------------------

W
The contents of our cupboards is our own business, but we would willingly grant access to these facilities in return for similar access to the cupboards of the East.
-------------------------------------------------------------------------------

E
We are not fooled by your request. Clearly you wish to acquire our peace-keeping technology to use it for your own non-peaceful, aggressive and evil means.

I think that the security of our wind [sic] would be compromised both by allowing access to our cupboards and by the West Wing's refusal to grant us allocated, UN-authorised, inspector access to the stationary cupboard. We can only take this time wasting move by the West Wing as a further sign of proposed action against our Wing.

I believe this was not an act of desperation, but an act of asymmetrical warfare waged against us.
--------------------------------------------------------------------------------

W
Just how secure is your wind?
--------------------------------------------------------------------------------

E
It is extremely secure, but the threat from the West Wing should not be under-emphasised. The escape of critical peace-keeping chemical weapons which could follow a sustained terrorist attack could seriously deplete our ability to respond.
--------------------------------------------------------------------------------

High performance access to file storage

More from The Register

next story
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Nvidia gamers hit trifecta with driver, optimizer, and mobile upgrades
Li'l Shield moves up to Android 4.4.2 KitKat, GameStream comes to notebooks
AMD unveils Godzilla's graphics card – 'the world's fastest, period'
The Radeon R9 295X2: Water-cooled, 5,632 stream processors, 11.5TFLOPS
Sony battery recall as VAIO goes out with a bang, not a whimper
The perils of having Panasonic as a partner
NORKS' own smartmobe pegged as Chinese landfill Android
Fake kit in the hermit kingdom? That's just Kim Jong-un-believable!
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.