Her Light Materials, Volume I

The Lost Magic Golden Closing Curly Bracket


Stob 'So that's how I came to be mysteriously orphaned and, on my ninth birthday, just three years ago today, sent to work as a junior grader at the Ah-Poo! Toilet Tissue reclamation factory at Fort Wirth', explained Jo, our heroine, a feisty, scruffy and independently-minded young tomboy whose more mature, more feminine side we won't really encounter until volume three.

'Are you intending to make a career of it?' asked the mysterious, bearded, twinkly, old Sage (current CRB certificate available on application), who had interrupted Jo during her lunch break.

'Oh, yes. I'm terribly lucky to be apprenticed to chief grader Mistress Skidly. She's the best. Only she can put the puppy huggability back into a six-sheet strip of Andrex, even after it has been...'

'I am always forgetting that you don't yet have sarcasm in this part of Pascalia. I wasn't being serious, my child. I was hoping to interest you in a different kind of work. '

'What sort of work?' asked Jo.

'Tell me, child. Have you heard of the Background Dæmon of Life? The program that, by its very running, sustains existence not just in Pascalia, but throughout all creation?'

'Yes, of course.'

'Naturally the BDoL is coded in Pascal...'

'Naturally?' said Jo.

'Yes, child. What else would do? You'll be doubting the Supreme Being is an Englishman next. The BDoL is written in Pascal, and its opening, and indeed only comment, is {enclosed in curly brackets}.'

'What does the comment say?' asked Jo.

'Who knows? Keep your nappy on tight, it gets pretty hairy in here or some such pleasantry, I dare say. Anyway, the point is that the magic golden closing curly bracket has gone missing. The comment is unterminated!'

'So? Put in another curly bracket.'

'Shush. You do not understand the import of the situation. The next time the Supreme Being chooses to take a compile, the whole of the universe will disappear into a syntax error. The magic golden closing curly bracket must be recovered at all costs.'

'And how is that to be done?'

'Why, the usual way, of course. All hope for the survival of everything are to be entrusted to an inexperienced and under-briefed minor, who will set out on a series of interminable adventures and battle any number of monsters, the latter all being easily rendered using modern CGI effects, in the event of the film rights being picked up.'

Jo sighed. 'I'll get my coat.'

'Hurry up,' said the Sage. 'I've booked you in for a 4 o'clock with the Perly King at CPAN. Oh, and be sure to wear this amulet around your neck from now on. It's called the Wizard's Genuine Advantage. If ever you find yourself in danger, wherever you are, day or night, simply press this button on its side.'

'And that will bring you to my aid instantly, wherever I am, day or night?'

The Sage had the grace to look embarrassed. 'I'm afraid not. It just texts our insurance people a warning that a large claim is likely pending...'


Other stories you might like

  • The future: Windows streaming through notched Apple screens

    Choice is the word for Jamf's Dean Hager

    Interview As Apple's devices continue to find favour with enterprise users, the fortress that is Windows appears to be under attack in the corporate world.

    Speaking to The Register as the Jamf Nation User Conference wound down, the software firm's CEO, Dean Hager, is - unsurprisingly - ebullient when it comes to the prospects for Apple gear in the world of suits.

    Jamf specialises in device management and authentication, and has long been associated with managing Apple hardware in business and education environments. In recent years it has begun connecting its products with services such as Microsoft's Azure Active Directory as administrators face up to a hybrid working future.

    Continue reading
  • There’s a wave of ransomware coming down the pipeline. What can you do about it?

    AI can help. Here’s how…

    Sponsored The Colonial Pipeline attack earlier this year showed just how devastating a ransomware attack is when it is targeted at critical infrastructure.

    It also illustrated how traditional security techniques are increasingly struggling to keep pace with determined cyber attackers, whether their aim is exfiltrating data, extorting organisations, or simply causing chaos. Or, indeed an unpleasant combination of all three.

    So, what are your options? More people looking for more flaws isn’t going to be enough – there simply aren’t enough skilled people, there are too many bugs, and there are way too many attackers. So, it’s clear that smart cyber defenders need to be supplemented by even smarter technology incorporating AI. You can learn what this looks like by checking out this upcoming Regcast, “Securing Critical Infrastructure from Cyber-attack” on October 28 at 5pm.

    Continue reading
  • Ransomware criminals have feelings too: BlackMatter abuse caused crims to shut down negotiation portal

    Or so says infsec outfit Emsisoft

    Hurling online abuse at ransomware gangs may have contributed to a hardline policy of dumping victims' data online, according to counter-ransomware company Emsisoft.

    Earlier this month, the Conti ransomware gang declared it would publish victims' data and break off ransom negotiations if anyone other than "respected journalist and researcher personalities" [sic] dared publish snippets of ransomware negotiations, amid a general hardening of attitudes among ransomware gangs.

    Typically these conversation snippets make it into the public domain because curious people log into ransomware negotiation portals hosted by the criminals. The BlackMatter (aka DarkSide) gang's portal credentials (detailed in a ransom note) became exposed to the wider world, however, and the resulting wave of furious abuse hurled at the crims prompted them to pull up the virtual drawbridge.

    Continue reading

Biting the hand that feeds IT © 1998–2021