Feeds

Wannabe Jedi drool over potent laser 'lightsabre'

'Horrendously dangerous' zapper for sale

3 Big data security analytics techniques

Those of you who fancy playing Star Wars or who have a currently unarmed shark knocking about the house might be interested in the Wicked Lasers Spyder III Pro Arctic - a real-life "lightsabre" capable of inflicting some serious damage:

The Spyder III Pro Arctic

The maker explains that it whipped the direct blue laser diode components from a laser home theatre projector to create a weapon which "emits a cool blue beam that is up to 4000% brighter than a 405nm violet laser with an incredible output power of 1W".

The blurb warns: "Don't let the Arctic name fool you, this laser possesses the most burning capabilities of any portable laser in existence. That's why it's also the most dangerous laser ever created."

Unsurprisingly, the Arctic has set alarm bells ringing. Laser safety expert John Colton, main man at Lucid Optical Services, described it to Sky News Online as "horrendously dangerous".

Quantifying the Arctic's 1W beam as "1,000 times stronger than laser pointers normally available to the public", Colton warned of potentially dire consequences if it was pointed at aircraft or car drivers. He said: "Under no circumstances should they be on sale on the internet."

The Trading Standards Institute's Christine Heemskerk said that while she was "seriously concerned about the sale of these products which should only be for industrial use", because the Arctic is manufactured in Hong Kong, there's nothing the TSI can do to block net sales of the weapon.

Which is good news for wannabe buyers of the Arctic, who've been enthusing on the interwebs about the laser's destructive potential. According to Sky, one drooled: "Real lasers that resemble Star Wars lightsabres, that can burn skin, cut through plastic and ignite matches - yes please."

Another said: "I must have this. Birthday present anyone? I will KILL things, with FIRE." ®

SANS - Survey on application security programs

More from The Register

next story
Samsung Galaxy S5 fingerprint scanner hacked in just 4 DAYS
Sammy's newbie cooked slower than iPhone, also costs more to build
US mobile firms cave on kill switch, agree to install anti-theft code
Slow and kludgy rollout will protect corporate profits
Leaked pics show EMBIGGENED iPhone 6 screen
Fat-fingered fanbois rejoice over Chinternet snaps
Microsoft lobs pre-release Windows Phone 8.1 at devs who dare
App makers can load it before anyone else, but if they do they're stuck with it
Oh no, Joe: WinPhone users already griping over 8.1 mega-update
Hang on. Which bit of Developer Preview don't you understand?
Report: Apple seeking to raise iPhone 6 price by a HUNDRED BUCKS
'Well, that 5c experiment didn't go so well – let's try the other direction'
Rounded corners? Pah! Amazon's '3D phone has eye-tracking tech'
Now THAT'S what we call a proper new feature
Feast your PUNY eyes on highest resolution phone display EVER
Too much pixel dust for your strained eyeballs to handle
Hearthstone: Heroes of Warcraft – A jolly little war for lunchtime
Free-to-play WoW turn-based game when you have 20 minutes to kill
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.