Feeds

Halloween Hardware

Spooks to be had

Top three mobile application threats

Radio Controlled Tarantula

They've been around for quite some time and are hardly going to wow RC fans with their technical achievements, however a remote controlled creepy crawly like this is bound to have arachnophobes running for their lives. With a spider this big, they'll be way too scared to try stamp on it too. I know I would be.

Yeah, yeah, the RC Tarantula is a bit gimmicky, but for that price, it'll hardly dent the wallet. You'll probably spend more on Haribo anyway.

Radio Controlled Tarantula

SkullPrice £16
More Info Pixmania

Scary Mary haunted mirror

You'll need cash to burn in order to purchase one of these scary mirrors, but the inevitable shock would be priceless.

An LCD display is hidden craftily behind two-way mirrored glass. Connected to a DVD player by HDMI, the screen can be set up to play anything you like.

It does come with a DVD player, HDMI cable, wall mount and portrait light, so there's at least a bit of bang for your buck. There's also an optional remote control which dictates when the clip is activated, be it through a step-on mat, PIR sensor or manually with a switch.

For the other 11 months of the year, it could be programmed to tell you you're the fairest of them all. And who doesn't love a Snow-White inspired ego boost?

Scary Mary Haunted Mirror

SkullPrice $1700 (£1060)
More Info The Horror Dome

Seven Steps to Software Security

Next page: Shower Curtains

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.