Feeds

Right: Which one of you lot invented 'tw*tdangle', eh?

Lingo police want your biometrics, and sharpish

Seven Steps to Software Security

Ok, here's the deal: We at the Vulture Central Neologism Soviet want the name and personal details of whoever it was who invented the term "twatdangle", and we want them now.

The reason? Well, no one-way ticket to the Gulag for the individual responsible, rather a congratulatory free shirt from El Reg's merchandising tentacle Cash'n'Carrion.

Yes, we're rather taken by the term down here at Vulture Central. No sooner had we published this provocative piece on the galactically-talented media strumpet David Blaine hanging upside-down for, well, minutes at a time, than some bright spark got straight to work and forged the indubitably immortal new term.

However, and as the comments to our Blainito Mussolini follow-up show, there's some doubt as to who actually had the lexicographical light bulb moment.

So, was it in fact UK comedian Marcus Brigstocke, or a member of the unwashed masses? Of course, we could do the research ourselves, but we can't be arsed. Over to you lot, then.

And while you work it out, we'd like to note for those of you interested in things linguistic that, within hours of its coining, "twatdangle" had evolved from a simple noun into a verb ("to twatdangle") and an agent noun (twatdangler"). Such is the terrifying power of the English language coupled to the interweb.

To recap: We want the name, email addy and inside leg measurement of the scoundrel behind "twatdangle", Either give him up, or we'll use our IP-address-sniffing attack hounds to flush the bastard out. The clock is ticking... ®

And where is the IT angle on this story, exactly?

Ah, we're glad you asked us that. We've noted of late that, and despite previous advisories, we're still plagued by commentards disputing the validity of certain content on El Reg on the grounds it doesn't meet their own particular standards of IT purity.

Well, here's a reminder for you: If you don't like this sort of content, then don't click here, or here, or especially here. If that's too complicated for you, take a cue from the headlines to the offending articles, which often flag their non-IT content through the cunning use of words. Sorted.

Seven Steps to Software Security

More from The Register

next story
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.