Feeds

Why Borland trashed its spreadsheet

Finds hidden meaning

SANS - Survey on application security programs

Myths and legends Always remember, the compiler is your friend. Programming is stressful but no matter how many f**ks and b***ocks you might occasionally feel the need to insert into the comments, the compiler will always strip them out. It's great.

Of course, it doesn't actually go looking for rude words. So it would be a mistake to use them haphazardly. But that's OK because programmers who work for large, well-established companies would never make that mistake.

Let me take you back to September 1992, when "collaboration" software was known as productivity software, ISVs wrestled with the decision of whether to support a relatively new thing called Windows from Microsoft, and when Borland Software shipped the mighty Quattro Pro for Windows version 1.0.

As one of the first Windows-based spreadsheets, Quattro Pro - since sold to Corel and now part of WordPerfect Office - was a fabulous product, way ahead of its time. Certainly ahead of Microsoft's then-young Excel and Office.

It featured multiple pages and right-click access to a properties menu, both of which are common features now but were staggeringly innovative then. It also, predictably, had a button bar but even this had a twist: it was fully customizable and you could create your own. Each new button bar was stored as a file on disk so if you created a bar called Penguin, for example, a file called PENGUIN.BAR appeared.

This was in the days of the change over from DOS to Windows, so it was still common to use the DOS prompt as well as the GUI. One of the commands available in DOS is "Type", which displays on screen the typeable characters in any file. Now there was no good reason to "Type" one of the .BAR files but, if you did so, the name of the file appeared - so it must have been embedded into the file header - followed by an assortment of random characters.

Borland supplied several sample button bars with arty names like PICASSO.BAR and MONET.BAR and also one called SECOND.BAR. The latter name seemed like an odd choice beside its artistic brethren so, in a moment of boredom, I "Typed" it. Instead of the expected SECOND appearing, the characters "FUCKME" appeared. I was shocked. No, that doesn't really cover it: I was traumatised.

At the time I was completing a review of the product and had been in daily contact with the UK product manager, the charming and unflappable Frances Reay (now Fawcett). I rang her immediately to share the trauma.

Mark Whitehorn: Hi, Frances, do you happen to have Quattro Pro installed?

Frances Reay: Of course, what else would you expect from the product manager?

MW: OK, would you do me a favour and pop down to DOS for a moment?

(Clattering of fingers on keyboard heard down the phone).

FR: OK, I'm there.

MW: Can you swap to the QPW directory?

(More clattering of fingers).

MW: Now "Type" SECOND.BAR.

(Even more clattering of fingers, followed by a long pause).

FW: Well now, that's interesting.

MW: Does your screen say what mine says?

FR: More than likely. I suppose I'd better make some calls.

I may have been the first to report this to Borland, but I certainly wasn't alone in discovering it. Before I could publish the story in a magazine (the long defunct PC User) the news was rapidly spreading via email.

Frances passed the news on to Borland US with the result that the production lines in Ireland and the States were shut down and, as I was later told, Borland had to trash all those boxed copies that hadn't escaped the warehouses. Early copies of 1.0 instantly became collector's items.

Ah, such happy days, but that kind of thing could never happen now, of course.

Oh, wait a minute

3 Big data security analytics techniques

More from The Register

next story
Next Windows obsolescence panic is 450 days from … NOW!
The clock is ticking louder for Windows Server 2003 R2 users
This time it's 'Personal': new Office 365 sub covers just two devices
Redmond also brings Office into Google's back yard
Ubuntu 14.04 LTS: Great changes, but sssh don't mention the...
Why HELLO Amazon! You weren't here last time
Half of Twitter's 'active users' are SILENT STALKERS
Nearly 50% have NEVER tweeted a word
Ditch the sync, paddle in the Streem: Upstart offers syncless sharing
Upload, delete and carry on sharing afterwards?
Microsoft TIER SMEAR changes app prices whether devs ask or not
Some go up, some go down, Redmond goes silent
Batten down the hatches, Ubuntu 14.04 LTS due in TWO DAYS
Admins dab straining server brows in advance of Trusty Tahr's long-term support landing
Red Hat to ship RHEL 7 release candidate with a taste of container tech
Grab 'near-final' version of next Enterprise Linux next week
Windows 8.1, which you probably haven't upgraded to yet, ALREADY OBSOLETE
Pre-Update versions of new Windows version will no longer support patches
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.