Feeds

Filthy PCs: The X-rated circus of horrors

Grotesque dust creatures and mummified frogs

Internet Security Threat Report 2014

Ventblockers II Well, you lovely people, it's time to pour yourselves a stiff brandy before entering the circus of horrors that is Ventblockers II.

Good work by all those readers who sent in evidence demonstrating that it really is a good idea to keep your computer spick and span. The consequences of poor PC hygiene can, as we shall see, be quite terrifying.

Of course, we're going to break you in gently, so let's warm up with a few dusty moments. Picoshark admits he "didn't have the nerve" to open this box in the warehouse where he works, so he just wrote a message for his boss, suggesting they should probably get some new kit:

BAD written in thick dust on PC case

Cornz, though, did have the cojones to open this machine from a builder's yard. He says it was "caked in really fine brick dust", and accordingly suffering somewhat from overheating:

Builders' PC coated in dust

Roger Greenwood reports that he was "called to our welding and grinding shop" to investigate a clapped-out machine. Magnetic metal dust and computers don't mix, although five minutes with a compressed air gun were enough to get this PC up and running:

Another dust-coated PC interior

Top 5 reasons to deploy VMware with Tegile

Whitepapers

Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
How to determine if cloud backup is right for your servers
Two key factors, technical feasibility and TCO economics, that backup and IT operations managers should consider when assessing cloud backup.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.