Feeds

Attention tweeters: Your chance to win undying GLORY

10,000th follower to bag VERY SPECIAL prize!!!

Have you ever dreamed of having your name mentioned in the same breath as the titans of the tech world? Ever aspired to see yourself alluded to in the company of such colossi as dead cult idol Steve Jobs, chair-flinging pottymouth biz tyrant Ballmer, lovable shill dunderhead Stephen Fry – even the very BOFH himself?

Then yearn no more, my friend, for all you need is a Twitter account and a modicum of luck and timing: we on the social media desk here at Vulture Central are happy to report that El Reg is closing in on 10,000 Twitter followers.

Our official account is @regvulture* AND the person who becomes the 104(th) follower of that account wins a glorious prize.

***Drum roll***

The winner will have their nom-de-Twit added to the headline of a story confirming that we've hit that milestone at last. Even though it could be argued that we're not exactly Stephen Fry when it comes to social-media prominence, the Register front page at least is viewed by millions.

And we know you all want in.

So come on, dears, get following for your chance to feature in a classic headline on the world's best tech redtop. ®

*We have other accounts, too, but @regvulture is the place we truly call home.

Given the general nature of our beloved readerbase, there are those in the office who now confidently anticipate our follower total hanging paralysed for months at 9,998 - but we're sure these curmudgeons have misjudged you all.

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.