Feeds

The Girl with the NSObject Class Reference tattoo

Verity tackles Swedish noir

Protecting users from Firesheep and other Sidejacking attacks with SSL

Police Inspector Kurt Wallander lives in Ystad, Sweden (although, to judge from his television appearances, he was born on the planet Gallifrey in the constellation of Kasterborous, as he is rarely seen twice played by the same actor). He is a miserable old bloke.

At this point, I am obliged to confess that half way through I accidentally knocked my paperback into the bath, fusing the last three hundred pages into a papier-mâché brick. Fortunately, I found a Swedish language film of this book on iPlayer's BBC4 site and, with myopic squinting at the subtitles, have been able to piece together the plot.

The baddies are eco-anarchists who are bent on bringing down the world's financial systems, rather than waiting for bankers to do it anyway. They are headquartered in Africa. The word 'Africa' is pronounced something like 'Orfrica' in Swedish, with the corners of one's mouth turned down. It sounds very solemn and impressive. Inspector Wallander knows this, and makes sure he says it a lot in his fine, rumbling, baritone voice. 'Orfffrica.'

Rather than trouble the police department's IT department - I suspect they are fed up with him getting Tipp-Ex in his keyboard - Inspector Wallander employs a teenage consultant called Modin to examine the baddies' computer. Modin so-named, I suspect, to suggest the word 'modem'. In this story, this amounts to an authentic, technical detail.

Modin is initially referred to in the dialogue, and throughout the original book, as male, but in the flick eventually turns out to be a teenage kinky-kooky, gothy-genius computer crackerette. Perhaps the director noticed the popularity of TGWTDT halfway through the shoot, and was able to recast just in time. Modin astonishingly discovers that the baddies have encrypted their secrets, and opines that retrieving them may take a little longer.

While Modin ponders at his-or-her keyboard, Wallander helps out, by finding the key password, which someone has obligingly recorded in a tattoo, in defiance of good security policy (it would be a sod to change every month) and providing further circumstantial evidence that the director was borrowing ideas from Dragon. The password is a babyish word something like 'Binky-bee', and Wallander sounds a bit undignified saying it. But Wallander was not made an inspector for nothing. He counters the Binky-bee problem by referring again to the continental origin of the anarchist plot. 'Orfffrica. Orrrrrfffricahhh.'

While Wallander is still saying 'Africa', the baddies kidnap Modin. Oh no - how will Wallander stop them now? They have overrun and infected the whole internet with their worms, the worms.

Fortunately, to activate the BACS Armageddon, the anarchists must put their ATM card into a particular biddely-bong cashpoint machine outside the Ystad Building Society. I think the anarchists need to put more thought into their requirements specifications: this is the sort of bug it is best to remove before it gets into the implementation. A little more effort here, please, and less time spent on the 3D visualisation of the worm infecting the internet.

Now Wallander has merely to pitch up at the ATM and stop them. Does he do so promptly? No, he does not. He is worried he may have to say ' biddely-bong', which is even worse than Binky-bee.

Anyway, in the end Wallander extracts his digit - in fact, his first digital action in the whole business - and rushes to the ATM. Baddies shot, Modin freed, banking system safe, phew.

Not that Inspector W needed to have bothered, I reckon. Those cash machines go down all by themselves. A few years ago, I was standing in the queue behind this lady, she put her card in, the machine ate it, blue-screened, and rebooted. And do you know what it was running? Windows NT 4! Don't know what the banks think they are playing at, using an elderly domestic operating system for a job like that.

You know, I think The Man They Call The Stieg may have a point after all...®

Security and trust: The backbone of doing business over the internet

More from The Register

next story
'Windows 9' LEAK: Microsoft's playing catchup with Linux
Multiple desktops and live tiles in restored Start button star in new vids
New 'Cosmos' browser surfs the net by TXT alone
No data plan? No WiFi? No worries ... except sluggish download speed
iOS 8 release: WebGL now runs everywhere. Hurrah for 3D graphics!
HTML 5's pretty neat ... when your browser supports it
Mathematica hits the Web
Wolfram embraces the cloud, promies private cloud cut of its number-cruncher
Google extends app refund window to two hours
You now have 120 minutes to finish that game instead of 15
Intel: Hey, enterprises, drop everything and DO HADOOP
Big Data analytics projected to run on more servers than any other app
Mozilla shutters Labs, tells nobody it's been dead for five months
Staffer's blog reveals all as projects languish on GitHub
SUSE Linux owner Attachmate gobbled by Micro Focus for $2.3bn
Merger will lead to mainframe and COBOL powerhouse
iOS 8 Healthkit gets a bug SO Apple KILLS it. That's real healthcare!
Not fit for purpose on day of launch, says Cupertino
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.