Feeds

Is it a phone? Is it a Taser? No, it's a cattle prod!

Novel explanation for mobile stun gun

Choosing a cloud hosting partner with confidence

A Queensland man yesterday pleaded guilty to possession of a Taser disguised as a mobile phone.

In his defence, Carl Townroe claimed the device was a cattle prod and not in disguise. Mind you, he also pleaded guilty to possession of marijuana, so the weed may have got to him.

Tasers are nasty things and we can think of no legitimate reason why a civilian should have one, let alone one that pretends to be a phone. Neither can Australia's Customs and Border Protection, which last December intercepted a consignment from China of 20 electric-stun-guns-pretending-to-be-phones.

Their intended recipient, Michael Van Hout, 44, a Gold Coast resident, was fined $8,000 yesterday for illegal importation.

We are perhaps being a little loose with the word "Taser", which is a brand name of a highly reputable company that likes to shock people.

No-brand electric stun guns, such as those contained in Van Hout's parcel can be much more powerful, and that means much more dangerous, than official Tasers. ®

Secure remote control for conventional and virtual desktops

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.