Feeds

Reg hack uncovers perfect antidote to internet

A profound, earth-moving experience

SANS - Survey on application security programs

I was on holiday last week, and as is the local custom, I took the chance to disconnect completely from cyberspace, shut down the PC, and retire to the alfresco chillax zone of the Special Project Bureau's mountaintop headquarters for a few well-deserved beers.

Mercifully, I don't suffer from internet withdrawal jitters or nomophobia, and can effortlessly survive for more than 20 minutes without accessing my email/checking Facebook/tweeting inanities to an indifferent world.

If I do venture forth from my country estate for a few days, a mobile phone is begrudgingly taken on board purely in case of emergencies such as vehicle breakdown, Taliban roadside ambush, flying cow strike, and so forth. Evidently, my vacations have little in common with those of peripatetic tech-comms hub Alistair Dabbs.

I'm not one for dossing about on a beach, either - even one where cop-dodging Chinese masseuses offer "happy ending" treatment under a towel for €10, while a Brazilian female beach volleyball team limbers up as a bikini-clad Paris Hilton cavorts with a spicy BBQ burger.

My internet detox requires something more hands-on, or rather, rather more of my own hands-on than a Chinese masseuse's hands-on. Accordingly, I didn't even make it past the first couple of Saturday morning cold ones before I decided to whip out the strimmer and attack the what was left of the grass.

My field's in a pretty sorry state at the moment, after four months in which more rain has fallen in the Atacama Desert than in this corner of sun-baked Spain.

After 20 minutes contemplating the parched yellow wilderness where once my mutt pack gambolled gaily amid wild flowers and the gentle gurgle of mountain streams, I'd had enough. "Fuck this," I thundered. "Let's dig a bloody well and be done with it."

A couple of quick calls later, and the deal was done. At 10am on Monday morning, a distant rumbling heralded the imminent arrival of my mate Ramon, who trundled imperiously into view aboard what is undoubtedly some proper hardware:

Ramon and the excavator trundle through the gates

The cunning plan was simple enough: dig hole, insert three 1m long, 80cm diameter concrete tubes, backfill hole, retire to bar. There's always plenty of water just below the surface round here, so I reckoned three metres would be more than enough to have irrigation water permanently on tap.

As Ramon got stuck in, though, it became clear I may have slightly underestimated the size of cavity required for this particular operation...

Four photos showing Ramon beginning to dig the hole for the well

...and Portuguese builder Rui - he of our LOHAN REHAB rocket motor tests - was starting to get a tad nervous as a mountain of stone and soil threatened to engulf the village:

Rui contemplates a big hole next to an enormous pile of earth, as Ramon continues to dig

When Ramon hit a depth of over three metres, and seemed intent on pushing on through the Earth's crust in search of our beloved mother planet's iron core, Rui and I briefly considered tasing him to a standstill. He did, though, finally stop digging before the mighty pit swallowed him and his excavator whole.

With water already seeping into the chasm, we rapidly chucked in a load of stone to form a solid base for the first length of tube, and also to allow water to percolate into the tube from below:

The really big hole for the well, with some stone at the bottom

Cue first section of tube...

Ramon lowers the first section of tune into the pit

...which then had to be levelled by someone insane enough to descend into the stygian depths armed with nothing more than a crowbar and a spirit level:

Rui in the pit, levelling the first tube

3 Big data security analytics techniques

More from The Register

next story
So, just how do you say 'the mutt's nuts' in French?
Vital linguistic question interrupts LOHAN spaceplane mission
95 floors in 43 SECONDS: Hitachi's new ultra-high-speed lift
Guangzhou skyscraper denizens to hold on to hats
Most Americans doubt Big Bang, not too sure about evolution, climate change – survey
Science no match for religion, politics, business interests
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
LOHAN and the amazing technicolor spaceplane
Our Vulture 2 livery is wrapped, and it's les noix du mutt
Liftoff! SpaceX Falcon 9 lifts Dragon on third resupply mission to ISS
SpaceX snaps smartly into one-second launch window
STEALTHY NANOROBOTS dress up as viruses, prepare to sneak into YOUR BODY
Cloaking techniques nicked from viruses tackle roadblocks on way to medical frontier
prev story

Whitepapers

Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.