Feeds

Prisoners cannibalise mice for mobile power

USB cables hacked to charge phones

Beginner's guide to SSL certificates

Convicts at a hi-tech Scottish prison are swiping computer mice from IT classes.

It turns out the mice's USB cable can be used to charge up lags' covert mobile phones. Rip the cord out of the mouse, plug it into a PlayStation and, with a bit of re-wiring, you have a power source for your handset.

PlayStations? It seems the jailbirds spending time at Her Majesty's pleasure in Addiewell, West Lothian have games consoles and HD TVs to play with, and, according to Scottish newspaper the Daily Record, are able to order their meals by computer.

While searching for the missing mice, warders at the prison found a large number of unconnected cables dangling from the PS3s, the paper reports.

The game was up, and now no one is allowed to leave computer, maths or English classes until every mouse has been accounted for.

Inmates are not allowed mobile phones. So naughty relatives will now have to smuggle in the cables too - presumably the same way the phones arrived. ®

Security for virtualized datacentres

More from The Register

next story
PEAK APPLE: iOS 8 is least popular Cupertino mobile OS in all of HUMAN HISTORY
'Nerd release' finally staggers past 50 per cent adoption
Tim Cook: The classic iPod HAD to DIE, and this is WHY
Apple, er, couldn’t get the parts for HDD models
Apple spent just ONE DOLLAR beefing up the latest iPad Air 2
New iPads look a lot like the old one. There's a reason for that
Google Glassholes are UNDATEABLE – HP exec
You need an emotional connection, says touchy-feely MD... We can do that
Caterham Seven 160 review: The Raspberry Pi of motoring
Back to driving's basics with a joyously legal high
prev story

Whitepapers

Choosing cloud Backup services
Demystify how you can address your data protection needs in your small- to medium-sized business and select the best online backup service to meet your needs.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Top 5 reasons to deploy VMware with Tegile
Data demand and the rise of virtualization is challenging IT teams to deliver storage performance, scalability and capacity that can keep up, while maximizing efficiency.
The hidden costs of self-signed SSL certificates
Exploring the true TCO for self-signed SSL certificates, including a side-by-side comparison of a self-signed architecture versus working with a third-party SSL vendor.