New Images: blackdogCRM

blackdogCRM is currently still in Beta, and no official announcements have yet been made. blackdogCRM will run on Mac OSX as well as Windows. In addition companion applications are available for iPad, iPhone and Android Tablets.

stevencholerton.com

Here are some pre-release screenshots of 0.9.5 running on Mac OSX Mountain Lion, 10.8.4. Note that these are potentially subject to change before the final product ships.

blackdogcrm

blackdogcrm

stevencholerton.com

Sales,Distributor and Dealer Enquiries to: 762@zombielabs.net

New Support Forum Coming Very Soon: zombielabs.net/forum

###

Common Sense Search

Searching Your Contacts

blackdogCRM features a very powerful and intuitive facility for searching your contacts. One of the many (almost[1]) unique features of blackdogCRM is that the search text you enter will automatically search all fields in the contact record.

www.stevencholerton.com

Basically this means that if you enter steve as your search string, you will receive in the results data records that contain information that:

  • begins with steve (or Steve, or sTEVE or STEVE etc)
  • or ends with steve (or Steve, or sTEVE or STEVE etc)
  • or contains steve (or Steve, or sTEVE or STEVE etc)

We can do that and still maintain speed and performance due to implementing our own primary proprietary indexing and searching mechanism.

In addition we add something we call Common Sense Search. Basically this lets you type IBM and the contacts will be returned that include I.B.M or I B M. This works with first and last names as well, so for example: stevenchol would return my contact record even though Steven and Cholerton are actually separate fields in the database.

[1] I first used this technique in ContaxCRM, one of my previous software products.


www.stevencholerton.com

Sales,Distributor and Dealer Enquiries to: 762@zombielabs.net

New Support Forum Coming Very Soon: zombielabs.net/forum

###

Dropbox Tips

Anyone with a computer or similar device needs DropboxWith that out the way here are a couple of tips to help you with Dropbox.

The first tip concerns apps from your iPad or iPhone that you have given access to Dropbox. Over time it’s easy to forget what app has what access and this opens up potential security concerns.

Logon to the Dropbox website and select the ‘My apps’ tab. Here you can control all apps that have Dropbox access and what level of access they have. It’s worth reviewing this list every once in a while.

www.stevencholerton.com

As with apps the same issue can occur over time with devices. How many devices have you got hooked up to Dropbox ?

www.stevencholerton.com

Finally, keep an eye on your Storage. A tip to get a little extra storage is to invite someone else to a Shared Folder.

www.stevencholerton.com

Look after your Dropbox and it will look after you  🙂

stevencholerton.com

@stevechol 

New Images: blackdogCRM

blackdogCRM is currently still in Beta, and no official announcements have yet been made. blackdogCRM will run on Mac OSX as well as Windows. In addition companion applications are available for iPad, iPhone and Android Tablets.

stevencholerton.com

Here are some pre-release screenshots of 0.9.4 running on Mac OSX Mountain Lion. Note that these are potentially subject to change before the final product ships.

blackdogCRM

blackdogCRM

blackdogCRM

blackdogCRM

blackdogCRM

stevencholerton.com@stevechol 

First Images: New Product

These are the first couple of images I have released of my new Windows and Mac OSX software product. More to follow over the next few weeks. 

The first customers for this new product will receive it in the next couple of weeks or so – with a general public release to follow in September.

stevencholerton.com

stevencholerton.com

@stevechol

Harley Night Rod Special

Review From the Archives, originally published: 4th April 2007

This was the picture that convinced me I had to have a Harley Davidson Night Rod Special. The black, lowered, stretched look combined with the Porsche designed Revolution V-Twin and the 10 inch wide back tire – I was smitten.

Harley VROD stevechol

I picked up my 2007 Harley Davidson Night Rod Special from Robin Hood Harley Davidson on a Monday afternoon. Cheers to Alain for a smooth and easy buying experience☺ I had seen this actual bike 8 days previously and had managed to wait until the following Tuesday before ordering it. So, in great anticipation I arrived to do do the deal and pick up the keys. 

What Keys. This bike just has a small circular plastic device that you keep in your pocket. As you approach the bike it disarms the alarm and immobiliser. You turn an ignition switch on and hit the ‘Start’ button. When you get off the bike, switch the engine and ignition off and walk away, the keyfob device works on proximity and will arm the alarm and immobiliser for you. No keys involved. A good start for a bike from Harley, a company many people dismiss as producing ‘agricultural’ bikes.

The Handling

The first ten minutes of riding the bike were … interesting … the bike feels very alien, it’s long length and massive mismatch between the slim front tyre and giant rear type (the largest of any production bike) make for an interesting experience. It grows on you though as you re-learn how to go around corners, it then becomes incredibly stable in the bends and very confidence inspiring. It is however a nightmare on a backroad with lots of repairs and holes, the small front tyre tries to steer the massive rear through and around them which is a nerve racking experience. The bike is heavy, but never feels it when upright, unless maneuvering it backwards, the low centre of gravity helps enormously in giving the rider a user friendly experience.

The Engine

The bike feels powerful but not scary. The superb fuelling and fuel injection setup means that you won’t ‘accidentally’ give it too much throttle and do anything dramatic. If you want to ride it quickly it is allegedly capable of keeping up with most litre sports bikes up to 100mph, when aerodynamics start to take their toll, and a low 11 second quarter mile, I say allegedly because I haven’t raced any sports bikes, or been down a drag strip ! The engine sounds and feels superb in the way that only a twin can, it is full of character and torque and I find it excellent. It has as much power (around 125bhp) as I will ever need.

VROD stevechol

The Riding Position

This also felt very alien for around ten minutes, however I find I prefer it. It is a slightly more aggressive forward leaning position than the standard VROD and with the feet forward controls it looks uncomfortable, but as I’ve said I now love it and find it very comfortable and natural.

The Build Quality

Superb. Beautiful. Thick paint, lovely machined parts. It reeks of quality. I have a Swedish car and another bike, Japanese. Neither of these is a patch on the quality of this bike.  Update: It didn’t like Winter … having furry nuts is not nice !  My fault I guess I should have kept it cleaner 🙁

VROD stevechol

The Image

The Image … not sure … not the traditional Harley that’s for sure, but neither does it fit in any other traditional category. What I do know however is that people can’t stop looking at the bike and coming up to talk to me about it. From a little old woman with her shopping bags, to a Kawasaki sports bike rider who turned around, parked up and came over for a chat – it seems to be (almost) universally admired !

The Pillion Experience

On smooth roads both the rider and pillion have easy, comfortable experiences. On anything else the very low and very hard suspension can be painful. I may be able to adjust this to compensate in the future though. Update: Nope, not really 🙁

The Practicality

The bike holds around 5 gallons, the tank accessed by lifting the seat. A digital ‘miles remaining’ gauge is built into the speedometer. Being mainly black it is be relatively easy to keep clean, and there is space on the handlebars to easily fix my Garmin Zumo satnav system. So far, so good.

stevechol VROD

Summary

I love this bike. It needs to have my babies. I’ve just ridden 15 miles or so in the dark on some country roads and loved every minute, not pushing it, but not hanging around either as the guy in the car attempting to keep up will testify … it was comfy, stable, responsive and great fun. Judging by people’s reactions it’s the kind of bike that makes people want to ride. And that is a good thing.

@stevechol

Software Help: R10Cipher

Software:            R10Cipher
Author:                Steven Cholerton
Last Update:        July 2013


Registering R10Cipher

After downloading R10Cipher and deciding that you would like a full working copy, you can purchase this directly at the following web address:


Once you have done this we are automatically notified of your purchase and a User Name and Serial Number are sent out to you via email.  The Serial Number is tied to your Name and the two must be used in conjunction.

Note: R10Cipher 5 needs a different serial number to previous versions.  Existing users can upgrade at reduced cost for a limited period.  Please contact upgrade@artenscience.com for further details.

When you receive the serial number email you should follow the included instructions.  In a few seconds R10Cipher will be fully licensed and ready to use.

Our licensing allows one purchase to be installed on two computers that you own, for example your desktop and also your laptop.  Please respect our efforts and purchase additional licenses if you need to install on multiple computers.  We also offer discounted licenses for families, corporations, charities and educational establishments.

Any problems with registration, please email us at: support@artenscience.com


Introduction

R10Cipher is a simple but extremely powerful Cross Platform Encryption / Decryption tool.

R10Cipher takes text or files and encrypts them using up to 384 bit Blowfish encryption.

These files can be Word files, Excel files, MP3 files – almost any kind of file.

These encrypted files can be copied elsewhere, even to a different operating system and unencrypted by anyone in possession of the Shared Secret that was used for the encryption. If encrypting text, the Cipher Text can then be copied into an email, saved as a file and attached to an email or just copied elsewhere.

The recipient can use R10Cipher to open the file and view the encrypted contents, assuming they are in possession of the Shared Secret that was used to encrypt the document in the first place.

If encrypting a file the encrypted file can be stored or sent in the full knowledge that the contents are not visible to anyone without access to R10Cipher or cuteCipher and the Shared Secret.

Decryption can be carried out just by double clicking the encrypted file and entering the Shared Secret.

R10Cipher supports batch encryption by drag and drop to make encryption fast and painless, even when dealing with dozens of files.

As R10Cipher does not require installation you can for example copy the Mac, Windows and Linux versions of R10Cipher to a USB drive along with your encrypted documents and files.  Your documents and files are secure ,but available whenever and wherever you require them.

R10Cipher does not make any alterations to your computer and stores the configuration files within its own folder.

Many people do not realise that sending an email is the equivalent of sending a postcard, it’s contents are easily visible. For many companies, individuals and markets this is totally unacceptable and with the potential complexity and setup issues with the Public Key Encryption systems it makes sense to encrypt using R10Cipher.

R10Cipher, like all software, is a work in progress.  We need your feedback to keep R10Cipher the best Cross Platform Encryption Tool available.  Contact us with your suggestions and comments.

R10Cipher 5 is a major rewrite with additional functionality that was asked for by our customers.  5 is also slicker, faster and easier to use than ever before.  Encryption has never been so painless.


Text Encryption

Enter your Shared Secret (this is your encryption key) into the area at the bottom left of the screen.  This can be between 4 and 56 characters.  For example:  yuetrtytpl*565r0.  Enter your Shared Secret again in the area directly below to confirm that you did not make any typing errors.

Important Note:  The strength of the encryption is directly related to the length of your encryption key.

Enter the message or text you wish to encrypt into the large text area to the right.  You can right click and Paste the text, or use Drag and Drop if you wish.

Select the Encrypt button (There is also a Menu Option and a Hot Key Shortcut).  You will see the encrypted text shown in the text area on the left of the screen.

You now have a number of options:

1. Click the Email button and an email will be opened for you with the encrypted text as the message.

2. Click the Clipboard button and the Encrypted text will be copied to clipboard, ready to be pasted elsewhere.

3. Click the SMS button and the Encrypted text will be sent to the phone number you input.  This option assumes you have purchased SMSRelay or subscribed to the SMSRelay service.

4. Use the Save option on the File Menu and save the Encrypted text as a document.


Text Decryption

To Decrypt a message or text use any of the following options:

1. Open an Encrypted document using the Open option on the File Menu

2. Paste the Encrypted text into the cipher text area to the left of the screen.

3. Drag the Encrypted text into the cipher text area to the left of the screen.

Enter the Shared Secret and Select the Decrypt button (A Menu Option and Keyboard Shortcut are also available) to view the Decrypted contents.

You can then do any of the following:

1. Select the Print button on the Toolbar and output the Decrypted Text

2. Select the Speak button on the Toolbat and listen to the Decrypted Text as it is read to you by your computer.


File Encryption

Enter your Shared Secret (this is your encryption key) into the area at the bottom left of the screen.  This can be between 4 and 56 characters.  For example:  yuetrtytpl*565r0.

Drag and Drop your files over the large text area on the right of the window. Your documents will be Encrypted and placed on the Desktop.

The filename for the Encrypted files remains the same but the file extension is changed to .r10Enc.

This activity will be logged to the Activity Log. Following the encryption, this will show you details of the encryption process. The Activity Log can be viewed by using the option on the View Menu.

Optionally the Log can be saved to the database by activating the option within the Preferences screen.

For average size documents and files the encryption will be virtually instantaneous.


File Decryption

There are three ways to Decrypt files with R10Cipher.

Decrypt a File from Within R10Cipher

Enter your Shared Secret (this is your encryption key) into the area at the bottom left of the screen.  This can be between 4 and 56 characters.  For example:  yuetrtytpl*565r0.

The first way is to open R10Cipher and choose the Open option on the File Menu. R10Cipher will then ask you to select the file that you wish to Decrypt.

Once selected R10Cipher will ask you for the name you would like to call the decrypted file, the original name is used as the default.  The decrypted file will be saved with the name, and at the location, you chose.

Drag and Drop Decryption

Enter your Shared Secret (this is your encryption key) into the area at the bottom left of the screen.  This can be between 4 and 56 characters.  For example:  yuetrtytpl*565r0.

Drag and Drop your encrypted files over the smaller text area on the left of the window. Your documents will be Decrypted and placed on the Desktop.

Double Click a File to Decrypt

R10Cipher 5 attempts to make working with encrypted files as simple as possible.  Therefore any encrypted file can be decrypted just by double clicking the encrypted file.

Following the double click you see the R10Cipher File Decrypt window.

Enter the Shared Secret that was used to encrypt the file and press the Continue button.  R10Cipher will save the decrypted file to your desktop with the original file name.

NOTE:  Before you use this feature for the first time you may need to associate the R10Enc files with the R10Cipher Software.  How you do this depends on your Operating System.  We have instructions in the Manual Addendum for Mac OSX and Windows XP.


Key Creation

The creation of keys is done by selecting the following Menu Option:

     Key Management
          Key Creation and Administration

You will see the Key Creation and Administration window.

This is where you setup your clients/contacts and your/their Shared Secrets.  In addition, for each client you setup you can assign two passwords, a Master password and a Usage Password.  For an explanation of the two passwords see the Key Management Introduction section.

To Insert a contact, just start typing and fill in the five information fields, from Name to Usage Password.  When complete press Save, and Save again to confirm.

To Edit a contact, select the contact from the list on the left hand side of the screen.  You will see the Name and Email Address but the Shared Secret and the Passwords are encrypted and not readable.  To view this data and edit it you need to input the Master Password for this contact into the Decode Password area of the screen and press the Decode button.  You can then edit the information and save it using the Save button.

To Delete a contact, select the contact from the list on the left hand side of the screen.  You will need to input the Master Password for this contact into the Decode Password area of the screen and press the Decode button.  You can then press the Delete button to erase the record.

Note:  Deleted records are gone and cannot be retrieved.

If you intend entering a number of clients or contacts you may already have them stored in a database or spreadsheet somewhere.  If that is the case then you should Import the records which will save you time and increase information accuracy.

Note:  You will need to edit each record later to apply the Shared Secret and Password(s).

To Import records you have three choices which can be selected using the Radio buttons on the bottom left of the window.  When you have selected the type of import you require press the Import button.  The three choices are Tab Delimited, Apple Address Book and the ContaxCRM Database.


Key Retrieval

Scenario 1: Encrypting or Decrypting Text or a File from within R10Cipher

In these circumstances instead of having to remember and enter the Shared Secret for the contact you can instead select the Keys View (from the View Menu) and input the Master or Usage Password for the appropriate contact.  Then choose the contact from the list.  You can search for the contact and filter the list using the search box on the bottom left of the screen.

Select the contact in the list.  If you have entered the correct Password the indicator will change from red to Green and the Shared Secret fields will be populated.

You can now encrypt text or files without having to enter the Shared Secret.

Another Advantage of retrieving the Shared Secret from the Key Management Database is that if you are sending an encrypted email, R10Cipher will know the email address and fill in the email header appropriately.

So instead of having to remember lots of Shared Secrets and Email Addresses, you only, using the Key Management Database, have to remember a minimum of one Password.

Scenario 2: Double Clicking an Encrypted File to Decrypt It

When double clicking an encrypted file you now see the R10Cipher File Decrypt window.

In these circumstances instead of having to remember and enter the Shared Secret for the contact you can instead input the Master or Usage Password for the appropriate contact.

You can search for the contact and filter the list using the search box on the bottom left of the screen.

Select the contact in the list.  If you have entered the correct Password the indicator will change from red to Green and the Shared Secret fields will be populated.

Click Continue to decrypt your file.

###