Feeds

Filthy PCs: The X-rated circus of horrors

Grotesque dust creatures and mummified frogs

Secure remote control for conventional and virtual desktops

Peter Witherow offered us a couple of snaps of a slightly grubby Dell...

Dusty Dell interior

Another view of dusty Dell interior

...while Kreepykrawly sent in snaps of an Oz machine covered in "at least 4mm of bulldust" (fine red outback dust). It was running a bit slow, the owner noted:

Interior of PC coated with dust

This is unpleasant - an ailing PC treated by John Tuohy for a nasty case of human skin flakes:

PC motherboard coated in dust

Top 5 reasons to deploy VMware with Tegile

More from The Register

next story
All aboard the Poo Bus! Ding ding, route Number Two departing
Only another three days of pooing and I can have a ride!
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
Official: European members prefer to fondle Apple iPads
Only 7 of 50 parliamentarians plump for Samsung Galaxy S
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Space Commanders rebel as Elite:Dangerous kills offline mode
Frontier cops an epic kicking in its own forums ahead of December revival
Nexus 7 fandroids tell of salty taste after sucking on Google's Lollipop
Web giant looking into why version 5.0 of Android is crippling older slabs
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Reducing the cost and complexity of web vulnerability management
How using vulnerability assessments to identify exploitable weaknesses and take corrective action can reduce the risk of hackers finding your site and attacking it.
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.