Feeds

The Girl with the NSObject Class Reference tattoo

Verity tackles Swedish noir

Top 5 reasons to deploy VMware with Tegile

Police Inspector Kurt Wallander lives in Ystad, Sweden (although, to judge from his television appearances, he was born on the planet Gallifrey in the constellation of Kasterborous, as he is rarely seen twice played by the same actor). He is a miserable old bloke.

At this point, I am obliged to confess that half way through I accidentally knocked my paperback into the bath, fusing the last three hundred pages into a papier-mâché brick. Fortunately, I found a Swedish language film of this book on iPlayer's BBC4 site and, with myopic squinting at the subtitles, have been able to piece together the plot.

The baddies are eco-anarchists who are bent on bringing down the world's financial systems, rather than waiting for bankers to do it anyway. They are headquartered in Africa. The word 'Africa' is pronounced something like 'Orfrica' in Swedish, with the corners of one's mouth turned down. It sounds very solemn and impressive. Inspector Wallander knows this, and makes sure he says it a lot in his fine, rumbling, baritone voice. 'Orfffrica.'

Rather than trouble the police department's IT department - I suspect they are fed up with him getting Tipp-Ex in his keyboard - Inspector Wallander employs a teenage consultant called Modin to examine the baddies' computer. Modin so-named, I suspect, to suggest the word 'modem'. In this story, this amounts to an authentic, technical detail.

Modin is initially referred to in the dialogue, and throughout the original book, as male, but in the flick eventually turns out to be a teenage kinky-kooky, gothy-genius computer crackerette. Perhaps the director noticed the popularity of TGWTDT halfway through the shoot, and was able to recast just in time. Modin astonishingly discovers that the baddies have encrypted their secrets, and opines that retrieving them may take a little longer.

While Modin ponders at his-or-her keyboard, Wallander helps out, by finding the key password, which someone has obligingly recorded in a tattoo, in defiance of good security policy (it would be a sod to change every month) and providing further circumstantial evidence that the director was borrowing ideas from Dragon. The password is a babyish word something like 'Binky-bee', and Wallander sounds a bit undignified saying it. But Wallander was not made an inspector for nothing. He counters the Binky-bee problem by referring again to the continental origin of the anarchist plot. 'Orfffrica. Orrrrrfffricahhh.'

While Wallander is still saying 'Africa', the baddies kidnap Modin. Oh no - how will Wallander stop them now? They have overrun and infected the whole internet with their worms, the worms.

Fortunately, to activate the BACS Armageddon, the anarchists must put their ATM card into a particular biddely-bong cashpoint machine outside the Ystad Building Society. I think the anarchists need to put more thought into their requirements specifications: this is the sort of bug it is best to remove before it gets into the implementation. A little more effort here, please, and less time spent on the 3D visualisation of the worm infecting the internet.

Now Wallander has merely to pitch up at the ATM and stop them. Does he do so promptly? No, he does not. He is worried he may have to say ' biddely-bong', which is even worse than Binky-bee.

Anyway, in the end Wallander extracts his digit - in fact, his first digital action in the whole business - and rushes to the ATM. Baddies shot, Modin freed, banking system safe, phew.

Not that Inspector W needed to have bothered, I reckon. Those cash machines go down all by themselves. A few years ago, I was standing in the queue behind this lady, she put her card in, the machine ate it, blue-screened, and rebooted. And do you know what it was running? Windows NT 4! Don't know what the banks think they are playing at, using an elderly domestic operating system for a job like that.

You know, I think The Man They Call The Stieg may have a point after all...®

Remote control for virtualized desktops

More from The Register

next story
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
First in line to order a Nexus 6? AT&T has a BRICK for you
Black Screen of Death plagues early Google-mobe batch
Microsoft adds video offering to Office 365. Oh NOES, you'll need Adobe Flash
Lovely presentations... but not on your Flash-hating mobe
You stupid BRICK! PCs running Avast AV can't handle Windows fixes
Fix issued, fingers pointed, forums in flames
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Security and trust: The backbone of doing business over the internet
Explores the current state of website security and the contributions Symantec is making to help organizations protect critical data and build trust with customers.