* take nothing for granted    
Unless otherwise indicated all photos © Richard McKie 2005 - 2021

Who is Online

We have 19 guests and no members online

 

 

With the extraordinary revelations coming out of England’s regarding ‘The News of the World’, personal privacy had suddenly hit the headlines; at least in the non-Murdock papers.  

But of more concern than having one’s telephone tapped, is the risk of having one’s computer tapped.  Private papers, photographs and other files as well as your bank accounts and other ecommerce connections are particularly vulnerable to anyone with direct or remote access to our computers and/or personal devices.           

How might we prevent a ‘private investigator’, ‘investigative journalist’, ‘hacker’ or other criminal getting access to our files and invading our privacy?    

And how secure is the Internet that most of us use everyday?

 

 

 

 

Over the years I have written many small applications and utilities.

 

In order of sophistication these include:

  • Simple HTML web pages
  • Command line scripted utilities and batch (BAT) files
  • Embedded Java code in web pages
  • Word and Excel macros typically written in Visual Basic for Applications VBA
  • Simple databases with VBA or Visual Basic (VB) VB frontends
  • Database related SQL queries batch data manipulators, templates and structures
  • Simple stand-alone utilities in in VB
  • Windows utilities written in plain C++ or using the Microsoft Foundation Classes (MFC)
  • Fully featured relational databases using SQL Server and VB
  • Complex applications written in C++

 

Some examples include:

  • Automatic footers and metadata updater code for Word and Excel; optionally to bring up a dialog to ensure file naming conforms to a standard.
  • A utility to process business financial data to reveal a variety of comparable ratios indicative of business health.
  • An applications to change registry settings and to install and run files on desktops and servers across a network.
  • A library (DLL) of simple encryption routines that add no overhead (don't change the file size) that can be used on any file; or encrypt in URL friendly characters to secure URL strings sent to web pages.
  • Several applications based around this library that can easily be called by applications written in languages other than C (VB, VBA, Java, C# etc).
  • File manipulation software for archiving, file moving and general file management; providing scripted batch processing archiving and reporting.

 

I'm happy to provide more information on any of these on applications or tools.  Use the contact facility on this website.


    Have you read this???     -  this content changes with each opening of a menu item


Travel

Burma (Myanmar)

 

 

This is a fascinating country in all sorts of ways and seems to be most popular with European and Japanese tourists, some Australians of course, but they are everywhere.

Since childhood Burma has been a romantic and exotic place for me.  It was impossible to grow up in the Australia of the 1950’s and not be familiar with that great Australian bass-baritone Peter Dawson’s rendition of Rudyard Kipling’s 'On the Road to Mandalay' recorded two decades or so earlier:  

Come you back to Mandalay
Where the old flotilla lay
Can't you hear their paddles chunking
From Rangoon to Mandalay

On the road to Mandalay
Where the flying fishes play
And the Dawn comes up like thunder
out of China 'cross the bay

The song went Worldwide in 1958 when Frank Sinatra covered it with a jazz orchestration, and ‘a Burma girl’ got changed to ‘a Burma broad’; ‘a man’ to ‘a cat’; and ‘temple bells’ to ‘crazy bells’.  

Read more ...

Fiction, Recollections & News

Skydiving

 

 

On the morning of May1st 2016 I jumped, or rather slid, out of a plane over Wollongong at 14,000 feet.

It was a tandem jump, meaning that I had an instructor strapped to my back.

 


Striding Confidently Before Going Up

 

At that height the curvature of the earth is quite evident.  There was an air-show underway at the airport we took off from and we were soon looking down on the planes of the RAAF  Roulette aerobatic display team.  They looked like little model aircraft flying in perfect formation.  

Read more ...

Opinions and Philosophy

Carbon Capture and Storage (original)

(Carbon Sequestration)

 

 

 


Carbon Sequestration Source: Wikimedia Commons

 

At the present state of technological development in NSW we have few (perhaps no) alternatives to burning coal.  But there is a fundamental issue with the proposed underground sequestration of carbon dioxide (CO2) as a means of reducing the impact of coal burning on the atmosphere. This is the same issue that plagues the whole current energy debate.  It is the issue of scale. 

Disposal of liquid CO2: underground; below the seabed; in depleted oil or gas reservoirs; or in deep saline aquifers is technically possible and is already practiced in some oil fields to improve oil extraction.  But the scale required for meaningful sequestration of coal sourced carbon dioxide is an enormous engineering and environmental challenge of quite a different magnitude. 

It is one thing to land a man on the Moon; it is another to relocate the Great Pyramid (of Cheops) there.

Read more ...

Terms of Use                                           Copyright