Feeds

How to kill your computer

When the kernel panics once too often...

Beginner's guide to SSL certificates

Many people simply ignore the rule "if it aint broke, don't fix it" and end up annihilating their computer through a burst of static electricity or dodgy DIY.

Back in 2002, El Reg ran a few pieces on the obscurer ways to kill a computer. Most of the links are dead, so we thought we'd have an updated look into this wacky world of tech sadism and inspire you to destroy your own PC, perhaps.

Don't forget that Vulture Central takes no responsibility for damage or loss of equipment, limbs, life or self-respect. Don't ask us for help if it all goes wrong - we will only laugh at you.

Here's a handful of methods.

Turn your computer into an art project

What's worse than finding a worm in your Apple? Finding out that its been smashed up in the name of art perhaps...

Destructive artist Michael Tompert has done exactly that for his gallery show that ran in San Francisco recently. Tompert buys Apple products and annihilates them with blowtorches, handguns, saws and sledgehammers, then captures the aftermath in stunning high-res images.

103 ways to kill your computer

Shoots Apples better than William Tell

The idea came about after Tompert saw his kids fight over an iPod Touch. To show them it was just a silly gadget, he smashed one up in front of them, much to the despair of the entire household. It was then that Tompert saw the beauty in what he'd done and decided it could inspire consumers to think more about their relationship with these popular devices.

After enlisting the help of photographer friend Paul Fairchild, Tompert recreated product shots Apple uses in its adverts with an additional dollop of damage.

While shooting his way through an iPhone and leaving iPod Nanos on a railway line brought instant extinction, the "practically indestructible" iPad withstood sledgehammer blows and various other attacks. He eventually managed to make the tablet go boom after heating it with a soldering torch.

103 ways to kill your computer

What happens when you melt my iPad? iScream

Ironically, Tompert is an ex-employee of Apple, but insists the shots are not meant to be disrespectful and has nothing but admiration for its products.

Tompert buys all his products new and has so far murdered iPhones, an iPad, iPod Nanos and MacBook Airs. Needless to say, his art has cost him quite a lot. An iPhone 4 was purchased on eBay and already had a cracked screen but still set him back $800. A few swings of the sledgehammer later though and Tompert had turned it into an art piece entitled "Must Have". Must have lost the plot.

Of course this isn't the only time computers have been shot in the name of art.

Hire a hitman

While Apple fans have gunned Windows machines for quite some time now, the weapon-obsessive PC assassins at killacomputer.com have literally been gunning computers for over eight years. Check out their site for flicks of desktops in despair and laptops levelled with lead. Only in America, eh?

Can't see the videos? Download Flash Player from Adobe.com

Intelligent flash storage arrays

Next page: Cook it

More from The Register

next story
Hi-torque tank engines: EXTREME car hacking with The Register
Bentley found in a hedge gets WW2 lump insertion
Trousers down for six of the best affordable Androids
Stylish Googlephones for not-so-deep pockets
What's MISSING on Amazon Fire Phone... and why it WON'T set the world alight
You fought hard and you saved and earned. But all of it's going to burn...
Fujitsu CTO: We'll be 3D-printing tech execs in 15 years
Fleshy techie disses network neutrality, helmet-less motorcyclists
Intel's LAME DUCK mobile chips gobbled by CASH COW
Chipzilla won't have money-losing mobe unit to kick about anymore
prev story

Whitepapers

10 ways wire data helps conquer IT complexity
IT teams can automatically detect problems across the IT environment, spot data theft, select unique pieces of transaction payloads to send to a data source, and more.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Business security measures using SSL
Examines the major types of threats to information security that businesses face today and the techniques for mitigating those threats.