Feeds

The Girl with the NSObject Class Reference tattoo

Verity tackles Swedish noir

Build a business case: developing custom apps

Police Inspector Kurt Wallander lives in Ystad, Sweden (although, to judge from his television appearances, he was born on the planet Gallifrey in the constellation of Kasterborous, as he is rarely seen twice played by the same actor). He is a miserable old bloke.

At this point, I am obliged to confess that half way through I accidentally knocked my paperback into the bath, fusing the last three hundred pages into a papier-mâché brick. Fortunately, I found a Swedish language film of this book on iPlayer's BBC4 site and, with myopic squinting at the subtitles, have been able to piece together the plot.

The baddies are eco-anarchists who are bent on bringing down the world's financial systems, rather than waiting for bankers to do it anyway. They are headquartered in Africa. The word 'Africa' is pronounced something like 'Orfrica' in Swedish, with the corners of one's mouth turned down. It sounds very solemn and impressive. Inspector Wallander knows this, and makes sure he says it a lot in his fine, rumbling, baritone voice. 'Orfffrica.'

Rather than trouble the police department's IT department - I suspect they are fed up with him getting Tipp-Ex in his keyboard - Inspector Wallander employs a teenage consultant called Modin to examine the baddies' computer. Modin so-named, I suspect, to suggest the word 'modem'. In this story, this amounts to an authentic, technical detail.

Modin is initially referred to in the dialogue, and throughout the original book, as male, but in the flick eventually turns out to be a teenage kinky-kooky, gothy-genius computer crackerette. Perhaps the director noticed the popularity of TGWTDT halfway through the shoot, and was able to recast just in time. Modin astonishingly discovers that the baddies have encrypted their secrets, and opines that retrieving them may take a little longer.

While Modin ponders at his-or-her keyboard, Wallander helps out, by finding the key password, which someone has obligingly recorded in a tattoo, in defiance of good security policy (it would be a sod to change every month) and providing further circumstantial evidence that the director was borrowing ideas from Dragon. The password is a babyish word something like 'Binky-bee', and Wallander sounds a bit undignified saying it. But Wallander was not made an inspector for nothing. He counters the Binky-bee problem by referring again to the continental origin of the anarchist plot. 'Orfffrica. Orrrrrfffricahhh.'

While Wallander is still saying 'Africa', the baddies kidnap Modin. Oh no - how will Wallander stop them now? They have overrun and infected the whole internet with their worms, the worms.

Fortunately, to activate the BACS Armageddon, the anarchists must put their ATM card into a particular biddely-bong cashpoint machine outside the Ystad Building Society. I think the anarchists need to put more thought into their requirements specifications: this is the sort of bug it is best to remove before it gets into the implementation. A little more effort here, please, and less time spent on the 3D visualisation of the worm infecting the internet.

Now Wallander has merely to pitch up at the ATM and stop them. Does he do so promptly? No, he does not. He is worried he may have to say ' biddely-bong', which is even worse than Binky-bee.

Anyway, in the end Wallander extracts his digit - in fact, his first digital action in the whole business - and rushes to the ATM. Baddies shot, Modin freed, banking system safe, phew.

Not that Inspector W needed to have bothered, I reckon. Those cash machines go down all by themselves. A few years ago, I was standing in the queue behind this lady, she put her card in, the machine ate it, blue-screened, and rebooted. And do you know what it was running? Windows NT 4! Don't know what the banks think they are playing at, using an elderly domestic operating system for a job like that.

You know, I think The Man They Call The Stieg may have a point after all...®

The Power of One eBook: Top reasons to choose HP BladeSystem

More from The Register

next story
NO MORE ALL CAPS and other pleasures of Visual Studio 14
Unpicking a packed preview that breaks down ASP.NET
Captain Kirk sets phaser to SLAUGHTER after trying new Facebook app
William Shatner less-than-impressed by Zuck's celebrity-only app
Apple fanbois SCREAM as update BRICKS their Macbook Airs
Ragegasm spills over as firmware upgrade kills machines
Cheer up, Nokia fans. It can start making mobes again in 18 months
The real winner of the Nokia sale is *drumroll* ... Nokia
Mozilla fixes CRITICAL security holes in Firefox, urges v31 upgrade
Misc memory hazards 'could be exploited' - and guess what, one's a Javascript vuln
Put down that Oracle database patch: It could cost $23,000 per CPU
On-by-default INMEMORY tech a boon for developers ... as long as they can afford it
Google shows off new Chrome OS look
Athena springs full-grown from Chromium project's head
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.