Feeds

Calling Doctor Caroline Langensiepen of Nottingham Trent uni

Your student Tom Watson's assignment to write in the style of the Register

The Power of One eBook: Top reasons to choose HP BladeSystem

Dear Dr Langensiepen: We learned with interest that one of the assignments you set your students studying Computer Systems (Forensics & Security) at Nottingham Trent University is to write an article in the style of The Register.

We were also interested to note that only one of your students, Tom Watson by name, considered trying to game that system by getting his article actually published on The Register.

He sent it to us, but it was about a historical subject (the Estonian/Russian 2011 click fraud botnet) meaning that it's not really suitable for publishing in its entirety here. Furthermore an article truly in The Register style is the product not only of its writer but also of sub-editors, editors and usually some time spent writing for us beforehand.

Nor is it our job to overrule your judgment on Mr Watson's article by telling you whether or not it is truly in el Reg style.

So we aren't running it, and nor are we going to say here how it compares in our view with our own stuff for style, thoroughness etc.

But we do feel that Mr Watson showed commendable initiative and a suitably twisty mindset for a career in computing security by trying to social-engineer his way to a solid outside confirmation that his assignment had been satisfactorily completed - before you had even seen it.

And we thought he deserved a little bit of public glory for that.

We'd note that Mr Watson was cunning to think of this for the first time, but would caution others that copying him, now that the idea is out, would be merely to waste our time and one's own. ®

Reducing security risks from open source software

More from The Register

next story
Carlos: Slim your working week to just three days of toil
'Midas World' vision suggests you retire later, watch more tellie and buy more stuff
Motorist 'thought car had caught fire' as Adele track came on stereo
'FIRE' caption on dashboard prompts dunderheaded hard shoulder halt
Brit Rockall adventurer poised to quit islet
Occupation records broken, champagne corks popped
Accused! Yahoo! exec! SUES! her! accuser!, says! sex! harassment! never! happened!
Allegations were for 'financial gain', countersuit claims
Yahoo! Japan! launches! service! for! the! dead!
If you're reading this email, I am no longer alive
Plucky Rockall podule man back on (proper) dry land
Bold, barmy Brit adventurer Nick Hancock escapes North Atlantic islet
NSA man: 'Tell me about your Turkish connections'
Spooks ask Dabbsy to suggest a nice hotel with pool
Japanese artist cuffed for disseminating 3D ladyparts files
Printable genitalia fall foul of 'obscene material' laws
prev story

Whitepapers

Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Reducing security risks from open source software
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.