Feeds

Auctioneer uses rear flasher to flog old bike

Caught unawares

Secure remote control for conventional and virtual desktops

We all know that sex sells, and the second-hand bike trade has obviously become so competitive that sellers will go to any lengths to expose their wares.

The following auction is obviously a crack by some cheeky youth at capitalising on the latest trend:

On closer inspection:

MOUNTAIN BIKE NEEDS TO GO SOME ATTENTION REQUIRED BUT WILL MAKE A NICE LITTTLE BIKE YOU ARE BIDING ON FULL COMPLETE BIKE FULL SUSPENSION ADJUSTABLE REAR GOOD BIKE BUT MOTOERBIKE NEEDS THE ROOM ASK ANY QUESTIONS NOTHING TO HIDE PICK UP ONLY PLEASE MAY BE ALBE TO DELIVER BUT WOULD NEED YOUR ADDRESS TO GET PRICE HAPPY BIDDING

Our correspondent Pat says: "Love the fact he notes: "NOTHING TO HIDE" ha!"

Potential buyers may like to note that the item is "used", "needs some attention" and has an "adjustable rear". No frame size is stipulated.

There have been other examples of the need-to-spice-up-an-ordinary-auction genre recently. Regular readers will remember the cases of the ashtray cleavage outrage and the wing mirror reflecto-porn shocker. ®

Bootnote

Ta very much to reader Pat for exposing this auction-smut.

Beginner's guide to SSL certificates

More from The Register

next story
Bladerunner sequel might actually be good. Harrison Ford is in it
Go ahead, you're all clear, kid... Sorry, wrong film
Musicians sue UK.gov over 'zero pay' copyright fix
Everyone else in Europe compensates us - why can't you?
I'll be back (and forward): Hollywood's time travel tribulations
Quick, call the Time Cops to sort out this paradox!
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Megaupload overlord Kim Dotcom: The US HAS RADICALISED ME!
Now my lawyers have bailed 'cos I'm 'OFFICIALLY' BROKE
Forget Hillary, HP's ex CARLY FIORINA 'wants to be next US Prez'
Former CEO has political ambitions again, according to Washington DC sources
prev story

Whitepapers

Designing and building an open ITOA architecture
Learn about a new IT data taxonomy defined by the four data sources of IT visibility: wire, machine, agent, and synthetic data sets.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
5 critical considerations for enterprise cloud backup
Key considerations when evaluating cloud backup solutions to ensure adequate protection security and availability of enterprise data.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.