Feeds

Filthy PCs: The X-rated circus of horrors

Grotesque dust creatures and mummified frogs

Security for virtualized datacentres

Ventblockers II Well, you lovely people, it's time to pour yourselves a stiff brandy before entering the circus of horrors that is Ventblockers II.

Good work by all those readers who sent in evidence demonstrating that it really is a good idea to keep your computer spick and span. The consequences of poor PC hygiene can, as we shall see, be quite terrifying.

Of course, we're going to break you in gently, so let's warm up with a few dusty moments. Picoshark admits he "didn't have the nerve" to open this box in the warehouse where he works, so he just wrote a message for his boss, suggesting they should probably get some new kit:

BAD written in thick dust on PC case

Cornz, though, did have the cojones to open this machine from a builder's yard. He says it was "caked in really fine brick dust", and accordingly suffering somewhat from overheating:

Builders' PC coated in dust

Roger Greenwood reports that he was "called to our welding and grinding shop" to investigate a clapped-out machine. Magnetic metal dust and computers don't mix, although five minutes with a compressed air gun were enough to get this PC up and running:

Another dust-coated PC interior

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.