Feeds

Dirty, dirty PCs: The X-rated picture guide

Horror beyond human imagination

Business security measures using SSL

Not nasty enough for you so far? Try this, from Rob Fisk, who notes that "the mail room with its proliferation of pesky paper particles perhaps had not been the wisest choice of location" for this server:

Database server covered in paper dust

That's just 4-6 weeks of build-up, Rob reckons. Here's something unpleasant from Michael Siwinski, which we believe took a bit longer to culture:

Floppy drive port packed with dust and lint

Michael says he didn't take a picture of what was inside this floppy drive slot, but he's probably just sparing us the terrible truth.

Website security in corporate America

More from The Register

next story
WRISTJOB LOVE BONANZA: justWatch sex app promises blind date hookups
Mankind shuffles into the future, five fingers at a time
Apple's Mr Havisham: Tim Cook says dead Steve Jobs' office has remained untouched
'I literally think about him every day' says biz baron's old friend
Oi, London thief. We KNOW what you're doing - our PRECRIME system warned us
Aye, shipmate, it be just like that Minority Report
Every billionaire needs a PANZER TANK, right? STOP THERE, Paul Allen
Angry Microsoftie hauls auctioneers to court over stalled Pzkw. IV 'deal'
Oz carrier Tiger Air takes terror alerts to new heights
Don't doodle, it might cost you your flight
Cops apologise for leaving EXPLOSIVES in suitcase at airport
'Canine training exercise' SNAFU sees woman take home booming baggage
prev story

Whitepapers

Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.