Feeds

Dirty, dirty PCs: The X-rated picture guide

Horror beyond human imagination

The Power of One Brief: Top reasons to choose HP BladeSystem

Ventblockers Our shock picture last Friday of a Quatermass-style lifeform lurking inside a PC prompted a flurry of snaps forwarded by readers who had similarly confronted unspeakable horrors.

We gather that many of our correspondents are responding well to therapy, and could be back working in PC maintenance in five years or so. Others, sadly, are condemned to spend the rest of their days in a padded room gibbering about alien beings like that unfortunate bloke from Quatermass and the Pit who sees a hellish vision of Mars inhabited by Red Planet bouncing insect creatures.

Well, flamethowers at the ready. We're going in...

PC case front caked in dust

A gentle start there, courtesy of Rob Dege and the front panel of a client's PC. Definite signs of proto-life.

Next up, Neil Cameron-Rollo, who says this machine was still working...

Motherboard completely encrusted with dust

...as was this one, claims Stuart Green, "until we cleaned it":

Montage of dust-encrusted PC case and boards

Eight steps to building an HP BladeSystem

More from The Register

next story
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
Russia sends SEX-CRAZED GECKOS to SPAAAAACE!
In space... no one can hear you're green...
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.