*be sceptical - take nothing for granted!
Unless otherwise indicated all photos © Richard McKie 2005 - 2019

Who is Online

We have 56 guests and no members online

 

 

With the extraordinary revelations coming out of England’s regarding ‘The News of the World’, personal privacy had suddenly hit the headlines; at least in the non-Murdock papers.  

But of more concern than having one’s telephone tapped, is the risk of having one’s computer tapped.  Private papers, photographs and other files as well as your bank accounts and other ecommerce connections are particularly vulnerable to anyone with direct or remote access to our computers and/or personal devices.           

How might we prevent a ‘private investigator’, ‘investigative journalist’, ‘hacker’ or other criminal getting access to our files and invading our privacy?    

And how secure is the Internet that most of us use everyday?

 

 

 

 

Over the years I have written many small applications and utilities.

 

In order of sophistication these include:

  • Simple HTML web pages
  • Command line scripted utilities and batch (BAT) files
  • Embedded Java code in web pages
  • Word and Excel macros typically written in Visual Basic for Applications VBA
  • Simple databases with VBA or Visual Basic (VB) VB frontends
  • Database related SQL queries batch data manipulators, templates and structures
  • Simple stand-alone utilities in in VB
  • Windows utilities written in plain C++ or using the Microsoft Foundation Classes (MFC)
  • Fully featured relational databases using SQL Server and VB
  • Complex applications written in C++

 

Some examples include:

  • Automatic footers and metadata updater code for Word and Excel; optionally to bring up a dialog to ensure file naming conforms to a standard.
  • A utility to process business financial data to reveal a variety of comparable ratios indicative of business health.
  • An applications to change registry settings and to install and run files on desktops and servers across a network.
  • A library (DLL) of simple encryption routines that add no overhead (don't change the file size) that can be used on any file; or encrypt in URL friendly characters to secure URL strings sent to web pages.
  • Several applications based around this library that can easily be called by applications written in languages other than C (VB, VBA, Java, C# etc).
  • File manipulation software for archiving, file moving and general file management; providing scripted batch processing archiving and reporting.

 

I'm happy to provide more information on any of these on applications or tools.  Use the contact facility on this website.


    Have you read this???     -  this content changes with each opening of a menu item


Travel

Bolivia

 

 

In October 2011 our little group: Sonia, Craig, Wendy and Richard visited Bolivia. We left Puno in Peru by bus to Cococabana in Bolivia. After the usual border form-filling and stamps, and a guided visit to the church in which the ‘Black Madonna’ resides, we boarded a cruise boat, a large catamaran, to Sun Island on the Bolivian side of the lake.

Read more ...

Fiction, Recollections & News

The Cloud

 

 

 

 

 Chapter 1 - The Party

 

 

 

This morning Miranda had an inspiration - real candles!  We'll have real candles - made from real beeswax and scented with real bergamot for my final party as a celebration of my life and my death. This brief candle indeed!

In other circumstances she would be turning 60 next birthday.  With her classic figure, clear skin and dark lustrous hair, by the standards of last century she looks half her age, barely thirty, the result of a good education; modern scientific and medical knowledge; a healthy diet and lifestyle and the elimination of inherited diseases before the ban on such medical interventions. 

It's ironical that except as a result of accidents, skiing, rock climbing, paragliding and so on, Miranda's seldom had need of a doctor.  She's a beneficiary of (once legal) genetic selection and unlike some people she's never had to resort to an illegal back-yard operation to extend her life. 

Attachments:
Download this file (The cloud.epub)The Cloud (epub) for eBook Readers[Note: 1 This version may not be as current as the on-line version. 2 Some characters have not been transcribed correctly by the conversion software. ]192 kB
Read more ...

Opinions and Philosophy

Gone but not forgotten

Gone but not forgotten

 

 

Gough Whitlam has died at the age of 98.

I had an early encounter with him electioneering in western Sydney when he was newly in opposition, soon after he had usurped Cocky (Arthur) Calwell as leader of the Parliamentary Labor Party and was still hated by elements of his own party.

I liked Cocky too.  He'd addressed us at University once, revealing that he hid his considerable intellectual light under a barrel.  He was an able man but in the Labor Party of the day to seem too smart or well spoken (like that bastard Menzies) was believed to be a handicap, hence his 'rough diamond' persona.

Gough was a new breed: smooth, well presented and intellectually arrogant.  He had quite a fight on his hands to gain and retain leadership.  And he used his eventual victory over the Party's 'faceless men' to persuade the Country that he was altogether a new broom. 

It was time for a change not just for the Labor Party but for Australia.

Read more ...

Terms of Use                                           Copyright