Feeds

Flappy Bird becomes massively multiplayer PHOENIX

Even Ernie and Bert from Sesame Street are on the bandwagon

Providing a secure and efficient Helpdesk

This week's technology topic everyone knows something about, Flappy Bird, has risen like a Phoenix in a new, massively multiplayer version.

Flapmmo.com has resurrected the game and also included multiplayer features that let you see not only your own Flappy Bird but also dozens of other players' efforts to navigate a badly-drawn avian through a derivatively-styled set of pipes.

The effect, as the video below shows, is a little un-nerving.

Several online games outfits have also started to offer online Flappy Bird, often in suspiciously portrait-dimensioned windows that suggest they've done as The Reg suggested and accessed the .APK file of the game, then perhaps decompiled it and re-jigged it for their own nefarious purposes.

Such acts include "Flappy Bert", which adapts the game by adding Sesame Street characters Ernie and Bert to the mix.

Whatever the truth of the matter, the frustratingly poor game continues to gather notoriety and will like do so until the next startling example of something odd strikes the internet. ®

Security for virtualized datacentres

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.