*take nothing for granted!
Unless otherwise indicated all photos © Richard McKie 2005 - 2015

Who is Online

We have 77 guests and no members online

Translate to another language

 

 

With the extraordinary revelations coming out of England’s regarding ‘The News of the World’, personal privacy had suddenly hit the headlines; at least in the non-Murdock papers.  

But of more concern than having one’s telephone tapped, is the risk of having one’s computer tapped.  Private papers, photographs and other files as well as your bank accounts and other ecommerce connections are particularly vulnerable to anyone with direct or remote access to our computers and/or personal devices.           

How might we prevent a ‘private investigator’, ‘investigative journalist’, ‘hacker’ or other criminal getting access to our files and invading our privacy?    

And how secure is the Internet that most of us use everyday?

 

 

 

 

Over the years I have written many small applications and utilities.

 

In order of sophistication these include:

  • Simple HTML web pages
  • Command line scripted utilities and batch (BAT) files
  • Embedded Java code in web pages
  • Word and Excel macros typically written in Visual Basic for Applications VBA
  • Simple databases with VBA or Visual Basic (VB) VB frontends
  • Database related SQL queries batch data manipulators, templates and structures
  • Simple stand-alone utilities in in VB
  • Windows utilities written in plain C++ or using the Microsoft Foundation Classes (MFC)
  • Fully featured relational databases using SQL Server and VB
  • Complex applications written in C++

 

Some examples include:

  • Automatic footers and metadata updater code for Word and Excel; optionally to bring up a dialog to ensure file naming conforms to a standard.
  • A utility to process business financial data to reveal a variety of comparable ratios indicative of business health.
  • An applications to change registry settings and to install and run files on desktops and servers across a network.
  • A library (DLL) of simple encryption routines that add no overhead (don't change the file size) that can be used on any file; or encrypt in URL friendly characters to secure URL strings sent to web pages.
  • Several applications based around this library that can easily be called by applications written in languages other than C (VB, VBA, Java, C# etc).
  • File manipulation software for archiving, file moving and general file management; providing scripted batch processing archiving and reporting.

 

I'm happy to provide more information on any of these on applications or tools.  Use the contact facility on this website.


    Have you read this???     -  this content changes with each opening of a menu item


Travel

Istanbul

 

 

Or coming down to earth...

 

When I was a boy, Turkey was mysterious and exotic place to me. They were not Christians there; they ate strange food; and wore strange clothes. There was something called a ‘bazaar’ where white women were kidnapped and sold into white slavery. Bob Hope and Bing Crosby, or was it Errol Flynn, got into all sorts of trouble there with blood thirsty men with curved swords. There was a song on the radio that reminded me over and over again that ‘It’s Istanbul not Constantinople Now’, sung by The Four Lads, possibly the first ‘boy band’.

 

Read more ...

Fiction, Recollections & News

A Twisted Pigs Tale

 

This is a little exercise in creative writing.  The brief was to reimagine the Three Pigs from a different perspective.   The original is a parable about the virtues of forward thinking, providence and hard work, so that only the most abstemious pig survives the metaphorical wolf.  I thought it was a bit tough on the middle pig who is just trying to find a balance between work and play.   So here is my version:

 


Read more ...

Opinions and Philosophy

Science, Magic and Religion

 

(UCLA History 2D Lectures 1 & 2)

 

Professor Courtenay Raia lectures on science and religion as historical phenomena that have evolved over time; starting in pre-history. She goes on to examine the pre-1700 mind-set when science encompassed elements of magic; how Western cosmologies became 'disenchanted'; and how magical traditions have been transformed into modern mysticisms.

The lectures raise a lot of interesting issues.  For example in Lecture 1, dealing with pre-history, it is convincingly argued that 'The Secret', promoted by Oprah, is not a secret at all, but is the natural primitive human belief position: that it is fundamentally an appeal to magic; the primitive 'default' position. 

But magic is suppressed by both religion and science.  So in our modern secular culture traditional magic has itself been transmogrified, magically transformed, into mysticism.

Read more ...

Terms of Use                                           Copyright