Feeds

Fancy some hot buttered storage?

Bringing new meaning to pop-ups

  • alert
  • submit to reddit

Application security programs and practises

Competition It is a Monday, and we're all looking at another five days of miserable toil before the glory of the weekend beckons once more. We can't do much about that, but how's this for a way to ease the pain of a new week?

Reg reader Alan Howlett sent us word of a very silly tech prank, and we've decided to turn it into a competition. As you read on, keep in mind that there will be a test at the end.

Over to Alan:

I bought a Synology DS-207 Network-Attached-Storage (NAS) device and it arrived yesterday. I have set it up as the primary file server for my office and am totally in love with it. It's fantastic- it does nearly everything our Windows 2000 Server PC did...

Yes, yes. you like your new shiny bit of kit. Enough eulogising, and on with the story, please...

Is it a toaster? Is it a NAS? Too many questions...

It does, however, look like a toaster and I have been informally calling it "the toaster" in the office.

Anyway, I had also bought an actual toaster that arrived on the same day. The real toaster has some slots on the top, and the synology has lights, but apart from that they are very similar.

Imagine my amusement when the actual toaster arrived first, and I realized that I could fit a hard disk into each bread slot. I had a customer (also a friend) about to visit, so I put 2 x 40GB drives into it, tucked in a network cable, and persuaded him that the toaster was actually a NAS device.

Those of us in the know kept commenting on the need for the toaster to run cool so as to prevent the disks burning etc., but our customer did not suspect and was convinced that it was a pretty good bit of kit.

I will keep his identity secret to spare his blushes, but everyone in the office found it hilarious.

Just in case anyone is worried about doing business with us, we have played practical jokes on each other before.

Yours,

Alan

Stunning work. We particularly like the post-it note that is stuck on the side. Presumably this has a phony IP address scribbled on it, for added authenticity.

Here's the test: can you do any better? In a Jackass-meets-BOFH style contest, we want to see photographic evidence of silly stuff like this.

The rules are simple, and few:

  • The victim (we assume there will be one) must be at least slightly computer savvy - pranks on total non-techies don't count.
  • No toasters (or people) should be physically hurt in the cause of this tomfoolery. Mental anguish is fine; toasters are very robust like that.

Toasters are not essential. Pictures, however, are. Email your submissions to: icandobetterthanthetoaster@theregister.co.uk by Friday, 20 July.

We'll select the cream of the crop and then turn the finalists over to El Reg's beloved readers for a public vote. The eventual winner will get a Reg Goodie Bag. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Attack of the clones: Oracle's latest Red Hat Linux lookalike arrives
Oracle's Linux boss says Larry's Linux isn't just for Oracle apps anymore
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Top 8 considerations to enable and simplify mobility
In this whitepaper learn how to successfully add mobile capabilities simply and cost effectively.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.