* take nothing for granted    
Unless otherwise indicated all photos © Richard McKie 2005 - 2021

Who is Online

We have 22 guests and no members online

 

 

With the extraordinary revelations coming out of England’s regarding ‘The News of the World’, personal privacy had suddenly hit the headlines; at least in the non-Murdock papers.  

But of more concern than having one’s telephone tapped, is the risk of having one’s computer tapped.  Private papers, photographs and other files as well as your bank accounts and other ecommerce connections are particularly vulnerable to anyone with direct or remote access to our computers and/or personal devices.           

How might we prevent a ‘private investigator’, ‘investigative journalist’, ‘hacker’ or other criminal getting access to our files and invading our privacy?    

And how secure is the Internet that most of us use everyday?

 

 

 

 

Over the years I have written many small applications and utilities.

 

In order of sophistication these include:

  • Simple HTML web pages
  • Command line scripted utilities and batch (BAT) files
  • Embedded Java code in web pages
  • Word and Excel macros typically written in Visual Basic for Applications VBA
  • Simple databases with VBA or Visual Basic (VB) VB frontends
  • Database related SQL queries batch data manipulators, templates and structures
  • Simple stand-alone utilities in in VB
  • Windows utilities written in plain C++ or using the Microsoft Foundation Classes (MFC)
  • Fully featured relational databases using SQL Server and VB
  • Complex applications written in C++

 

Some examples include:

  • Automatic footers and metadata updater code for Word and Excel; optionally to bring up a dialog to ensure file naming conforms to a standard.
  • A utility to process business financial data to reveal a variety of comparable ratios indicative of business health.
  • An applications to change registry settings and to install and run files on desktops and servers across a network.
  • A library (DLL) of simple encryption routines that add no overhead (don't change the file size) that can be used on any file; or encrypt in URL friendly characters to secure URL strings sent to web pages.
  • Several applications based around this library that can easily be called by applications written in languages other than C (VB, VBA, Java, C# etc).
  • File manipulation software for archiving, file moving and general file management; providing scripted batch processing archiving and reporting.

 

I'm happy to provide more information on any of these on applications or tools.  Use the contact facility on this website.


    Have you read this???     -  this content changes with each opening of a menu item


Travel

More Silk Road Adventures - The Caucasus

 

 

 

Having, in several trips, followed the Silk Road from Xian and Urumqi in China across Tajikistan and Uzbekistan our next visit had to be to the Caucuses.  So in May 2019 we purchased an organised tour to Azerbaijan, Georgia and Armenia from ExPat Explore.  If this is all that interests you you might want to skip straight to Azerbaijan. Click here...

Read more ...

Fiction, Recollections & News

Dan Brown's 'Origin'

 

 

 

 

 

The other day I found myself killing time in Chatswood waiting for my car to be serviced. A long stay in a coffee shop seemed a good option but I would need something to read - not too heavy. In a bookshop I found the latest Dan Brown: Origin. Dan might not be le Carré but like Lee Child and Clive Cussler he's a fast and easy read.

Read more ...

Opinions and Philosophy

Overthrow and the 'Arab Spring'

 

 

Back in April 2007 I was in Washington DC and wandered into a bookshop for a coffee.  On display was Stephen Kinzer's  National Best Seller: Overthrow: America's Century of Regime Change from Hawaii to Iraq.  So I bought it to read, before bed and on the plane. 

It is a heavily researched and work; very well described by the New York Times as: "A detailed passionate and convincing book... with the pace and grip of a good thriller."  And like a good thriller it was hard to put down.  I can recommend it.

Read more ...

Terms of Use                                           Copyright