Feeds

White House warns El Reg over kitten-killing content

Vulture Central hack runs for reinforced bunker complex

SANS - Survey on application security programs

I fear this may be the last copy I ever file, following a chilling warning from the White House regarding stories I may or may not write next week, and which could have devastating consequences for the future of humanity.

Earlier today, I ill-advisedly posted a rather tasty flame from "cockhead@dickhead.com", pre-objecting to Rik Myslewski's piece on the Microsoft/Barnes & Noble scandal.

I concluded by offering readers the chance to pre-protest any output to spurt from the Iberian bureau keyboard from next Monday. This was evidently a bad idea, as this email from "president@whitehouse.gov" demonstrates:

Dear Lester,

I feel that what you may or may not write about next week is too controversial even for El Reg. It may cause irreparable harm to the security of the US, other countries and allies. All those young men might die because of what you write. The potential damages to the entertainment industry are truly unlimited. Counterfeit music, movies and musical notes can cause irreparable harm and may lead to increase in unemployment, poverty and kittens' deaths. We need to make the world a safer, better place. We know where you live. And if we're wrong, we'll find out sooner or later.

Yours, Barack.

Well, there's no way I'm risking an encounter with Obama's terrifying black chopper – a beast so stealthy it can creep up on an al Qaeda fanatic who's using a nanolaser to inscribe verses from the Koran on a grain of ricin and doesn't even realise he's got a huge weapon of US vengeance hovering over his head until it disgorges a huge quantity of special ops seamen.

Accordingly, I'm off to my own reinforced bunker complex until the dust settles. Readers concerned for my welfare should rest assured that I'm taking the missus with me to act as a human shield should Navy SEALs penetrate the defensive cordon and catch me with my pants down. Adios. ®

3 Big data security analytics techniques

More from The Register

next story
Spanish village called 'Kill the Jews' mulls rebranding exercise
Not exactly attractive to the Israeli tourist demographic
Sleuths find nosy NORKS drones on the Chinternet
UAVs likely to have been made in the Middle Kingdom
Oz bank in comedy Heartbleed blog FAIL
Bank: 'We are now safely patched.' Customers: 'You were using OpenSSL?'
Och aye! It's the Loch Ness Monster – but only Apple fanbois can see it
Fondleslab-friendly beastie's wake spotted... OR WAS IT?
Dorian Nakamoto gets $23,000 payout over Bitcoin invention saga
Maintains he didn't create cryptocurrency, but will join community
Japanese boffin EYES up big bucks with strap-on digi-glasses
AgencyGlass saddles user with creepy OLED display
Forget the beach 'n' boardwalk, check out the Santa Cruz STEVE JOBS FOUNTAIN
Reg reader snaps shot of touching tribute to Apple icon
Happy 40th Playmobil: Reg looks back at small, rude world of our favourite tiny toys
Little men straddle LOHAN, attend tiny G20 Summit... ah, sweet memories...
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.