Feeds

How to kill your computer

When the kernel panics once too often...

Top three mobile application threats

Run it over

Has your hard drive run you down recently? Why not get revenge?

You may remember the Apple Powerbook G3 advert - well, wouldn't it be nice to copy it and steamroll over a few computers yourself?

These guys thought so. "A feisty one" indeed - the cameraman's optimism is hilarious.

Can't see the videos? Download Flash Player from Adobe.com

Whack it off your desk with the keyboard

OK, you probably recollect the viral video Bad Day that perpetually circulated our emails back in 1997. Yes, it was fake, but in reality it probably happened to many a Windows 95 machine. Careful though, sometimes they strike back.

Can't see the videos? Download Flash Player from Adobe.com

Fun smashing Windows

Feel like killing an office computer without pissing off management? Have a play on this Flash game and discover eight different ways to destroy your PC. You may still lose your job for slacking, but at least you wont get sued for damage costs.

And finally...

Do you know any more ingenious ways to destroy a computer? If so, send us a message. Alternatively, video yourself breaking your own. Get cracking! ®

Seven Steps to Software Security

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.