Feeds

Filthy PCs: The X-rated circus of horrors

Grotesque dust creatures and mummified frogs

Top three mobile application threats

Now, here's what happens if you don't move in and eliminate PC lifeforms at the fan stage - they break out and threaten civilisation, as Mark Cooney can attest:

Back of PC case featuring major dust puppy

Stateside Adam's back, with another example...

Another PC case exterior caked in dust

...and a shaken anonymous correspondent shows an amorphous dust creature isolated from a workstation in a West Midlands hospital:

Large dust puppy removed from workstation

I personally would have nailed that to the desk before whipping out the camera. It looks like it's waiting to clamp itself to someone's face.

Anthony Hegedus also risked life and limb to bring us images of a customer's PC - "about the worst we've seen", he notes:

PC case and cover with much, much dust

Those of you with nerves of steel are invited to turn the page for further horror from Anthony. It's less a PC interior...

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.