Feeds

Runaway hydroponic fungus attacks real-world Starship Voyager

'Mould in transporter' horror caused by below-decks dope farm

Seven Steps to Software Security

The Leicestershire Trekkie who turned his flat into a replica of the Starship Voyager spent two years battling an alien mould attack, unaware that it was caused by a dope farm in the property below.

Tony Alleyne, 57, spunked £30k to convert his Hinckley gaff* into a homage to Star Trek, but was forced to do some serious onboard maintenance as fungus threatened the ship's operations.

He told the Leicester Mercury: "I had no idea what was causing it but there was mould in the bathroom and the transporter. It was a nightmare. I've had to remove the panelling and replace some lighting. I sugar-soaped the surfaces but nothing worked."

The matter was resolved in November, when cops busted the downstairs flat. Alleyne explained: "The police came and knocked on the door of the place below and took away 25 cannabis plants and the equipment. I couldn't believe there was something like that going on right below me.

"When the police took the hydroponics away, all that stuff looked as hi-tech as my place. It takes a lot of heat and humidity to grow cannabis and having that going on below me was causing the problem with the mould."

Alleyne is now repainting and repanelling the ship, which will probably cost him "a few thousand pounds". Back in 2006, his love of Star Trek ended in the bankruptcy court, after a failed attempt to launch a interior design business for fellow Trekkies.

Voyager is actually owned by his ex-wife, who's given up trying to flog the peculiar property.

TV companies have shown rather more interest, though. Alleyne said: "A French crew came and saw the problems I was having with the mould. They even filmed me going to Focus in Hinckley to buy paint to try to sort it." ®

Bootnote

* It wasn't until today that I learned that "gaff" also refers to male underwear (link NSFW) designed to conceal one's wedding tackle. I'm delighted to have plugged this particular gap in my vocabulary.

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.