Feeds

Yes! It's the sawed-off USB key!

Practical IT jokes

Top three mobile application threats

Ripping a USB cable in half is an achievement, but your friends will be even more impressed when they discover it still performs data transfers.

sawed_off_flash_key_1

Evil Mad Science Laboratories’ inserted a flash drive into the USB jack

The sawed-off USB key features in the Evil Mad Science Laboratories’ (EMSL) online IT destruction bible, which provides all sorts of bizarre IT-esque walkthroughs ranging from USB cables to Cyborg Jack-o-lanterns.

sawed_off_flash_key_2

The dog finally let go of the USB cable

The USB cable walkthrough describes how a ‘technician’ at EMSL used a hobby knife to cut around the plastic surrounding the USB cable’s metal jack, before prising it open and slotting in 1GB KingMax flash drive.

By putting the flash drive inside the cable’s jack, the user is still able to save information to the flash drive. But users will be dumbstruck as to where the USB cable is actually storing data. For about five minutes, anyway.

To rip the cable in half you’ll probably need to use a knife, unless you’re feeling particularly strong. But make sure you leave lots of wires poking out the end to give the cable that truly menacing look.

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.