* take nothing for granted    
Unless otherwise indicated all photos © Richard McKie 2005 - 2021

Who is Online

We have 68 guests and no members online

 

 

With the extraordinary revelations coming out of England’s regarding ‘The News of the World’, personal privacy had suddenly hit the headlines; at least in the non-Murdock papers.  

But of more concern than having one’s telephone tapped, is the risk of having one’s computer tapped.  Private papers, photographs and other files as well as your bank accounts and other ecommerce connections are particularly vulnerable to anyone with direct or remote access to our computers and/or personal devices.           

How might we prevent a ‘private investigator’, ‘investigative journalist’, ‘hacker’ or other criminal getting access to our files and invading our privacy?    

And how secure is the Internet that most of us use everyday?

 

 

 

 

Over the years I have written many small applications and utilities.

 

In order of sophistication these include:

  • Simple HTML web pages
  • Command line scripted utilities and batch (BAT) files
  • Embedded Java code in web pages
  • Word and Excel macros typically written in Visual Basic for Applications VBA
  • Simple databases with VBA or Visual Basic (VB) VB frontends
  • Database related SQL queries batch data manipulators, templates and structures
  • Simple stand-alone utilities in in VB
  • Windows utilities written in plain C++ or using the Microsoft Foundation Classes (MFC)
  • Fully featured relational databases using SQL Server and VB
  • Complex applications written in C++

 

Some examples include:

  • Automatic footers and metadata updater code for Word and Excel; optionally to bring up a dialog to ensure file naming conforms to a standard.
  • A utility to process business financial data to reveal a variety of comparable ratios indicative of business health.
  • An applications to change registry settings and to install and run files on desktops and servers across a network.
  • A library (DLL) of simple encryption routines that add no overhead (don't change the file size) that can be used on any file; or encrypt in URL friendly characters to secure URL strings sent to web pages.
  • Several applications based around this library that can easily be called by applications written in languages other than C (VB, VBA, Java, C# etc).
  • File manipulation software for archiving, file moving and general file management; providing scripted batch processing archiving and reporting.

 

I'm happy to provide more information on any of these on applications or tools.  Use the contact facility on this website.


    Have you read this???     -  this content changes with each opening of a menu item


Travel

South Korea & China

March 2016

 

 

South Korea

 

 

I hadn't written up our trip to South Korea (in March 2016) but Google Pictures gratuitously put an album together from my Cloud library so I was motivated to add a few words and put it up on my Website.  Normally I would use selected images to illustrate observations about a place visited.  This is the other way about, with a lot of images that I may not have otherwise chosen.  It requires you to go to the link below if you want to see pictures. You may find some of the images interesting and want to by-pass others quickly. Your choice. In addition to the album, Google generated a short movie in an 8mm style - complete with dust flecks. You can see this by clicking the last frame, at the bottom of the album.

A few days in Seoul were followed by travels around the country, helpfully illustrated in the album by Google generated maps: a picture is worth a thousand words; ending back in Seoul before spending a few days in China on the way home to OZ. 

Read more ...

Fiction, Recollections & News

To Catch a Thief

(or the case of the missing bra)

 

 

 

It's the summer of 2010; the warm nights are heavy with the scent of star jasmine; sleeping bodies glisten with perspiration; draped, as modestly requires, under a thin white sheet.  A light breeze provides intermittent comfort as it wafts fitfully through the open front door. 

Yet we lie unperturbed.   To enter the premises a nocturnal visitor bent on larceny, or perhaps an opportunistic dalliance, must wend their way past our parked cars and evade a motion detecting flood-light on the veranda before confronting locked, barred doors securing the front and rear entrances to the house.

Yet things are going missing. Not watches or wallets; laptops or phones; but clothes:  "Did you put both my socks in the wash?"  "Where's my black and white striped shirt?" "I seem to be missing several pairs of underpants!"

Read more ...

Opinions and Philosophy

The race for a SARS-CoV-2 vaccine

 

 

 

 

As we all now know (unless we've been living under a rock) the only way of defeating a pandemic is to achieve 'herd immunity' for the community at large; while strictly quarantining the most vulnerable.

Herd immunity can be achieved by most people in a community catching a virus and suffering the consequences or by vaccination.

It's over two centuries since Edward Jenner used cowpox to 'vaccinate' (from 'vacca' - Latin for cow) against smallpox. Since then medical science has been developing ways to pre-warn our immune systems of potentially harmful viruses using 'vaccines'.

In the last fifty years herd immunity has successfully been achieved against many viruses using vaccination and the race is on to achieve the same against SARS-CoV-2 (Covid-19).

Developing; manufacturing; and distributing a vaccine is at the leading edge of our scientific capabilities and knowledge and is a highly skilled; technologically advanced; and expensive undertaking. Yet the rewards are potentially great, when the economic and societal consequences of the current pandemic are dire and governments around the world are desperate for a solution. 

So elite researchers on every continent have joined the race with 51 vaccines now in clinical trials on humans and at least 75 in preclinical trials on animals.

Attachments:
Download this file (Bad News Wrapped in Protein 2.pdf)Bad News Wrapped in Protein: Inside the Coronavirus Genome[Detailed virus structure]1437 kB
Read more ...

Terms of Use                                           Copyright