Feeds

How to kill your computer

When the kernel panics once too often...

Choosing a cloud hosting partner with confidence

Run it over

Has your hard drive run you down recently? Why not get revenge?

You may remember the Apple Powerbook G3 advert - well, wouldn't it be nice to copy it and steamroll over a few computers yourself?

These guys thought so. "A feisty one" indeed - the cameraman's optimism is hilarious.

Can't see the videos? Download Flash Player from Adobe.com

Whack it off your desk with the keyboard

OK, you probably recollect the viral video Bad Day that perpetually circulated our emails back in 1997. Yes, it was fake, but in reality it probably happened to many a Windows 95 machine. Careful though, sometimes they strike back.

Can't see the videos? Download Flash Player from Adobe.com

Fun smashing Windows

Feel like killing an office computer without pissing off management? Have a play on this Flash game and discover eight different ways to destroy your PC. You may still lose your job for slacking, but at least you wont get sued for damage costs.

And finally...

Do you know any more ingenious ways to destroy a computer? If so, send us a message. Alternatively, video yourself breaking your own. Get cracking! ®

Secure remote control for conventional and virtual desktops

Whitepapers

Driving business with continuous operational intelligence
Introducing an innovative approach offered by ExtraHop for producing continuous operational intelligence.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.