Feeds

White House warns El Reg over kitten-killing content

Vulture Central hack runs for reinforced bunker complex

Seven Steps to Software Security

I fear this may be the last copy I ever file, following a chilling warning from the White House regarding stories I may or may not write next week, and which could have devastating consequences for the future of humanity.

Earlier today, I ill-advisedly posted a rather tasty flame from "cockhead@dickhead.com", pre-objecting to Rik Myslewski's piece on the Microsoft/Barnes & Noble scandal.

I concluded by offering readers the chance to pre-protest any output to spurt from the Iberian bureau keyboard from next Monday. This was evidently a bad idea, as this email from "president@whitehouse.gov" demonstrates:

Dear Lester,

I feel that what you may or may not write about next week is too controversial even for El Reg. It may cause irreparable harm to the security of the US, other countries and allies. All those young men might die because of what you write. The potential damages to the entertainment industry are truly unlimited. Counterfeit music, movies and musical notes can cause irreparable harm and may lead to increase in unemployment, poverty and kittens' deaths. We need to make the world a safer, better place. We know where you live. And if we're wrong, we'll find out sooner or later.

Yours, Barack.

Well, there's no way I'm risking an encounter with Obama's terrifying black chopper – a beast so stealthy it can creep up on an al Qaeda fanatic who's using a nanolaser to inscribe verses from the Koran on a grain of ricin and doesn't even realise he's got a huge weapon of US vengeance hovering over his head until it disgorges a huge quantity of special ops seamen.

Accordingly, I'm off to my own reinforced bunker complex until the dust settles. Readers concerned for my welfare should rest assured that I'm taking the missus with me to act as a human shield should Navy SEALs penetrate the defensive cordon and catch me with my pants down. Adios. ®

Seven Steps to Software Security

More from The Register

next story
Delaware pair nabbed for getting saucy atop Mexican eatery
Burrito meets soft taco in alleged rooftop romp outrage
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Apple: No, China. iPhone is NOT public enemy number 1
Beijing fears it could beam secrets back to America
Canuck reader threatens suicide over exact dimensions of SPAAAACE!
How many As? Reg hack's writing cops a shoeing
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.