Example 1: One to One Private Communications
Bill and Ted are ready to start making plans for their next Excellent Adventure. Knowing that their email discussions could be intercepted and easily read, they use the Magic Cipher Shared Secret Generator with it’s Strength Meter to create a Shared Secret they can use together.
They type their discussions into Magic Cipher and email the contents as encrypted text directly from within Magic Cipher. They are now secure in the knowledge that no-one can obtain access to their plans and attempt to put a spanner in the works!
Example 2: One to Many Private Communications
Bill and Ted decide they want to involve the Historical Babes in some of their plans, but not all. The four of them agree a Shared Secret and now Bill and Ted can communicate between themselves using their own Shared Secret and if they wish to include the Historical Babes they use the second Shared Secret previously agreed between the four of them.
Example 3: One to Many Private Communications over a Public Medium
Frodo is setting off on his next adventure and as is the fashion nowadays he wants to update the world with his travels via an online blog. With his new Macbook Pro this will be easy enough, however there is certain information he wishes only to be read and understood by Merry and Pippin who are holding the fort for him back in Hobbiton.
Before he sets off the three of them agree on a Shared Secret and as Frodo updates the world via his blog he uses Magic Cipher to append an encrypted entry on the end of his posts, in a separate paragraph, knowing that the world can see but not read or understand his instructions, which are only for the eyes of Merry and Pippin. Frodo uses the built in Virtual Keyboard to add a little bit of extra security to his posts.
Example 4: The Benefits of Cross Platform
Unfortunately, small, slim and gorgeous though it is, the Macbook Pro is just a little bit too big and let’s face it, expensive to take across Middle Earth, what with the danger from the Orcs and other dark forces.
At the last minute Frodo decides to switch to a small Linux notebook which he obtained free of charge with his mobile broadband card. Luckily Magic Cipher works as well on Linux as it does on macOS or Windows, so Frodo has no need to change his plans, or his choice of encryption software.
Example 5: Magic Cipher, Not Just for Men
While Frodo is off on his travels his wife, feeling lonely, takes a lover. Knowing that the local Hobbiton ISP takes quite an interest in emails to and from the villagers, they both use Magic Cipher to arrange their rendezvous. Even hobbits need loving.
Besides it was rather selfish of Frodo to disappear like that for months at a time and who knows what he got up to with Sam on that epic journey?
Example 6: A Picture is Worth a Thousand Words …
Sat on his sofa safe back at home several months after his epic journey to Mordor, Frodo dreams of his next challenge. With Sam on board, who now lives several miles away in Bree, Frodo and Sam use the Steganography features of Magic Cipher to enable them to swap ideas and plans which they have hidden in pictures which they upload to their Facebook pages.
With no evidence that their pictures are anything more than rather boring pictures of Sams garden or Frodos wine collection, nobody has any clue that there is another adventure being planned. In fact nobody has any reason to suspect Sam and Frodo are even in communication regularly. Problem Solved!
As the title says: ‘Software Cannot Grow Old Gracefully‘. It is with this in mind that I am no longer selling or further developing any of the following products:
Custom or bespoke versions as well as joint venture editions will continue to be supported for the foreseeable future. I’ll be sad to see them go, macVCR was the first application I ever wrote for Mac OSX back in 2007 and here we are 9 years later … still, everything comes to an end. RIP.
If you have any questions or if you are interested in acquiring source code etc. then please click here to email me, or contact me via telephone: +44 1773 252 007
I have the following eBooks that I have written which are available for Free download.
- Securing the Network: An eBook on Corporate Security Issues for the Non Technical (40 Pages)
- Oracle Database 10g Exam Cram (70 Pages)
Please confirm your Name and Email Address, and select the book you would like from the dropdown menu, and your book will be with you shortly.
1.0.1 was released earlier today and I'm very pleased to say that there
was not a single bug fix 🙂 Surely a testament to the guys and girls who
participated in the Beta program earlier this year. So a very big 'thanks'
to them 🙂
This update consists of a change to the way the SQL Keywords mechanism works. Previously the file SQLKeywords.sjc was loaded from the application folder or the SupportFiles folder and all the SQL keywords were loaded into an array and this array was accessed after each keystroke when typing occured in the SQL Text Area. If a match was found then the appropriate action was taken, ie: the word was capitalised, or coloured etc.
In version 1.0.1 the array of SQL keywords is built internally without reference to the SQLKeywords.sjc file. However if this file is present any words within this file are added to the SQL keywords array. So for example any words that you wish to be treated as keywords for your own purposes, or any keywords you find that I have missed when building the keyword array, can be added in a file called SQLKeywords.sjc which needs to be located in the same folder as the oneSql application or in the SupportFiles subfolder.
In addition to the changes described above there are half a dozen small interface tweaks which just tidy things up very slightly.
We now have a Pinterest account. Still in it’s infancy and only a few dozen images so far, but if you want a peek, here it is: