Feeds

Filthy PCs: The X-rated circus of horrors

Grotesque dust creatures and mummified frogs

Internet Security Threat Report 2014

Mercifully, some PC invaders are purely terrestrial in origin, although that doesn't make them any less destructive. Ben Wilshaw whipped open a monitor case to find this...

Ants inside monitor case

...which on closer inspection turned out to be roasted ants:

Close-up of ants inside monitor

Another close-up of ants inside monitor

There are no ants inside Jim McNelis's machine, because the cockroaches ate them:

Cockroaches inside PC case

Another view of roaches inside PC

Remote control for virtualized desktops

More from The Register

next story
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Ford's B-Max: Fiesta-based runaround that goes THUNK
... when you close the slidey doors, that is ...
prev story

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.