*take nothing for granted!
Unless otherwise indicated all photos © Richard McKie 2005 - 2015

Who is Online

We have 96 guests and no members online

Translate to another language

 

 

With the extraordinary revelations coming out of England’s regarding ‘The News of the World’, personal privacy had suddenly hit the headlines; at least in the non-Murdock papers.  

But of more concern than having one’s telephone tapped, is the risk of having one’s computer tapped.  Private papers, photographs and other files as well as your bank accounts and other ecommerce connections are particularly vulnerable to anyone with direct or remote access to our computers and/or personal devices.           

How might we prevent a ‘private investigator’, ‘investigative journalist’, ‘hacker’ or other criminal getting access to our files and invading our privacy?    

And how secure is the Internet that most of us use everyday?

 

 

 

 

Over the years I have written many small applications and utilities.

 

In order of sophistication these include:

  • Simple HTML web pages
  • Command line scripted utilities and batch (BAT) files
  • Embedded Java code in web pages
  • Word and Excel macros typically written in Visual Basic for Applications VBA
  • Simple databases with VBA or Visual Basic (VB) VB frontends
  • Database related SQL queries batch data manipulators, templates and structures
  • Simple stand-alone utilities in in VB
  • Windows utilities written in plain C++ or using the Microsoft Foundation Classes (MFC)
  • Fully featured relational databases using SQL Server and VB
  • Complex applications written in C++

 

Some examples include:

  • Automatic footers and metadata updater code for Word and Excel; optionally to bring up a dialog to ensure file naming conforms to a standard.
  • A utility to process business financial data to reveal a variety of comparable ratios indicative of business health.
  • An applications to change registry settings and to install and run files on desktops and servers across a network.
  • A library (DLL) of simple encryption routines that add no overhead (don't change the file size) that can be used on any file; or encrypt in URL friendly characters to secure URL strings sent to web pages.
  • Several applications based around this library that can easily be called by applications written in languages other than C (VB, VBA, Java, C# etc).
  • File manipulation software for archiving, file moving and general file management; providing scripted batch processing archiving and reporting.

 

I'm happy to provide more information on any of these on applications or tools.  Use the contact facility on this website.


    Have you read this???     -  this content changes with each opening of a menu item


Travel

Bali

 

 

 

 

 

At the end of February 2016 Wendy and I took a package deal to visit Bali.  These days almost everyone knows that Bali is a smallish island off the east tip of Java in the Southern Indonesian archipelago, just south of the equator.  Longitudinally it's just to the west of Perth, not a huge distance from Darwin.  The whole Island chain is highly actively volcanic with regular eruptions that quite frequently disrupt air traffic. Bali is well watered, volcanic, fertile and very warm year round, with seasons defined by the amount of rain.

Read more ...

Fiction, Recollections & News

The new James Bond

 

 

It was raining in the mountains on Easter Saturday.

We'd decided to take a couple of days break in the Blue Mountains and do some walking. But on Saturday it poured.  In the morning we walked two kilometres from Katoomba to more up-market and trendy Leura for morning coffee and got very wet.

After a train journey to Mount Victoria and back to dry out and then lunch in the Irish Pub, with a Cider and Guinness, we decided against another soaking and explored the Katoomba antique stores and bookshops instead.  In one I found and bought an unread James Bond book.  But not by the real Ian Fleming. 

Ian Fleming died in 1964 at the young age of fifty-six and I'd read all his so I knew 'Devil May Care' was new.  This one is by Sebastian Faulks, known for his novel Birdsong, 'writing as Ian Fleming' in 2008.

Read more ...

Opinions and Philosophy

Carbon Capture and Storage

(Carbon Sequestration)

 

 

 


Carbon Sequestration Source: Wikimedia Commons

 

At the present state of technological development in NSW we have few (perhaps no) alternatives to burning coal.  But there is a fundamental issue with the proposed underground sequestration of carbon dioxide (CO2) as a means of reducing the impact of coal burning on the atmosphere. This is the same issue that plagues the whole current energy debate.  It is the issue of scale. 

Disposal of liquid CO2: underground; below the seabed; in depleted oil or gas reservoirs; or in deep saline aquifers is technically possible and is already practiced in some oil fields to improve oil extraction.  But the scale required for meaningful sequestration of coal sourced carbon dioxide is an enormous engineering and environmental challenge of quite a different magnitude. 

It is one thing to land a man on the Moon; it is another to relocate the Great Pyramid (of Cheops) there.

Read more ...

Terms of Use                                           Copyright