Feeds

Yes! It's the sawed-off USB key!

Practical IT jokes

Internet Security Threat Report 2014

Ripping a USB cable in half is an achievement, but your friends will be even more impressed when they discover it still performs data transfers.

sawed_off_flash_key_1

Evil Mad Science Laboratories’ inserted a flash drive into the USB jack

The sawed-off USB key features in the Evil Mad Science Laboratories’ (EMSL) online IT destruction bible, which provides all sorts of bizarre IT-esque walkthroughs ranging from USB cables to Cyborg Jack-o-lanterns.

sawed_off_flash_key_2

The dog finally let go of the USB cable

The USB cable walkthrough describes how a ‘technician’ at EMSL used a hobby knife to cut around the plastic surrounding the USB cable’s metal jack, before prising it open and slotting in 1GB KingMax flash drive.

By putting the flash drive inside the cable’s jack, the user is still able to save information to the flash drive. But users will be dumbstruck as to where the USB cable is actually storing data. For about five minutes, anyway.

To rip the cable in half you’ll probably need to use a knife, unless you’re feeling particularly strong. But make sure you leave lots of wires poking out the end to give the cable that truly menacing look.

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
Chipmaker FTDI bricking counterfeit kit
USB-serial imitators whacked by driver update
Xperia Z3: Crikey, Sony – ANOTHER flagship phondleslab?
The Fourth Amendment... and it IS better
DOUBLE BONK: Testy fanbois catch Apple Pay picking pockets
Users wail as tapcash transactions are duplicated
Microsoft to enter the STRUGGLE of the HUMAN WRIST
It's not just a thumb war, it's total digit war
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
New hybrid storage solutions
Tackling data challenges through emerging hybrid storage solutions that enable optimum database performance whilst managing costs and increasingly large data stores.