Feeds

Yes! It's the sawed-off USB key!

Practical IT jokes

The Power of One Brief: Top reasons to choose HP BladeSystem

Ripping a USB cable in half is an achievement, but your friends will be even more impressed when they discover it still performs data transfers.

sawed_off_flash_key_1

Evil Mad Science Laboratories’ inserted a flash drive into the USB jack

The sawed-off USB key features in the Evil Mad Science Laboratories’ (EMSL) online IT destruction bible, which provides all sorts of bizarre IT-esque walkthroughs ranging from USB cables to Cyborg Jack-o-lanterns.

sawed_off_flash_key_2

The dog finally let go of the USB cable

The USB cable walkthrough describes how a ‘technician’ at EMSL used a hobby knife to cut around the plastic surrounding the USB cable’s metal jack, before prising it open and slotting in 1GB KingMax flash drive.

By putting the flash drive inside the cable’s jack, the user is still able to save information to the flash drive. But users will be dumbstruck as to where the USB cable is actually storing data. For about five minutes, anyway.

To rip the cable in half you’ll probably need to use a knife, unless you’re feeling particularly strong. But make sure you leave lots of wires poking out the end to give the cable that truly menacing look.

Using blade systems to cut costs and sharpen efficiencies

More from The Register

next story
Report: American tech firms charge Britons a thumping nationality tax
Without representation, too. Time for a Boston (Lincs) Macbook Party?
iPad? More like iFAD: We reveal why Apple ran off to IBM
But never fear fanbois, you're still lapping up iPhones, Macs
Apple gets patent for WRIST-PUTER: iTime for a smartwatch
It does everything a smartwatch should do ... but Apple owns it
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Child diagnosed as allergic to iPad
Apple's fondleslab is the tablet dermatitis sufferers won't want to take
Microsoft takes on Chromebook with low-cost Windows laptops
Redmond's chief salesman: We're taking 'hard' decisions
For Lenovo US, 8-inch Windows tablets are DEAD – long live 8-inch Windows tablets
Reports it's killing off smaller slabs are greatly exaggerated
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.