Magic Cipher Video: Additional Features

http://www.magiccipher.com

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher Video: Steganography (Hiding Data in Images)

http://www.magiccipher.com

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher Video: File and Folder Encryption

http://www.magiccipher.com

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Version Numbering

Since the dawn of time I have been using one of the more traditional types of version numbering systems for all my software developments. Recently however I have ‘enhanced’ my methodology and now use something slightly different.

To the outside world not a lot will appear to have changed, the N.N.N methodology will still be used, albeit with a slightly different interpretation. Internally however I will be using the full version numbering system shown below:

Aside from building the release date and time into the version number and swapping out Revision Number for Restricted Release Number, the main benefits to me are building an ascending Feature Number and Fix Number into the version number.

These numbers will only ever increase, regardless of the program status changing from (for example) Version 1 to Version 2. This means that at a glance I can see how  features and fixes have been applied to this particular program since day one, without having to go to Version Control for this information.

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Magic Cipher: Usage Scenarios and Examples

Example 1: One to One Private Communications

Bill and Ted are ready to start making plans for their next Excellent Adventure. Knowing that their email discussions could be intercepted and easily read, they use the Magic Cipher Shared Secret Generator with it’s Strength Meter to create a Shared Secret they can use together.

They type their discussions into Magic Cipher and email the contents as encrypted text directly from within Magic Cipher. They are now secure in the knowledge that no­-one can obtain access to their plans and attempt to put a spanner in the works!

Example 2: One to Many Private Communications

Bill and Ted decide they want to involve the Historical Babes in some of their plans, but not all. The four of them agree a Shared Secret and now Bill and Ted can communicate between themselves using their own Shared Secret and if they wish to include the Historical Babes they use the second Shared Secret previously agreed between the four of them.

Example 3: One to Many Private Communications over a Public Medium

Frodo is setting off on his next adventure and as is the fashion nowadays he wants to update the world with his travels via an online blog. With his new Macbook Pro this will be easy enough, however there is certain information he wishes only to be read and understood by Merry and Pippin who are holding the fort for him back in Hobbiton.

Before he sets off the three of them agree on a Shared Secret and as Frodo updates the world via his blog he uses Magic Cipher to append an encrypted entry on the end of his posts, in a separate paragraph, knowing that the world can see but not read or understand his instructions, which are only for the eyes of Merry and Pippin. Frodo uses the built in Virtual Keyboard to add a little bit of extra security to his posts.

Example 4: The Benefits of Cross Platform

Unfortunately, small, slim and gorgeous though it is, the Macbook Pro is just a little bit too big ­ and let’s face it, expensive ­ to take across Middle Earth, what with the danger from the Orcs and other dark forces.

At the last minute Frodo decides to switch to a small Linux notebook which he obtained free of charge with his mobile broadband card. Luckily Magic Cipher works as well on Linux as it does on macOS or Windows, so Frodo has no need to change his plans, or his choice of encryption software.

Example 5: Magic Cipher, Not Just for Men

While Frodo is off on his travels his wife, feeling lonely, takes a lover. Knowing that the local Hobbiton ISP takes quite an interest in emails to and from the villagers, they both use Magic Cipher to arrange their rendezvous. Even hobbits need loving.

Besides it was rather selfish of Frodo to disappear like that for months at a time ­ and who knows what he got up to with Sam on that epic journey?

Example 6: A Picture is Worth a Thousand Words …

Sat on his sofa safe back at home several months after his epic journey to Mordor, Frodo dreams of his next challenge. With Sam on board, who now lives several miles away in Bree, Frodo and Sam use the Steganography features of Magic Cipher to enable them to swap ideas and plans which they have hidden in pictures which they upload to their Facebook pages.

With no evidence that their pictures are anything more than rather boring pictures of Sams garden or Frodos wine collection, nobody has any clue that there is another adventure being planned. In fact nobody has any reason to suspect Sam and Frodo are even in communication regularly. Problem Solved!

Magic Cipher Video: Text / Email Encryption

http://www.magiccipher.com

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us

Syncing Your Email to Your CRM

A recent chat with a customer reminded me that there are still many companies out there running their own in-house CRM, or similar, and facing the very real problem that their email is received and stored separately to the rest of their customer information, which is accessible in their CRM.

A product of mine from ‘back in the day’, ContaxCRM, solved this problem with email sent and received being synced into the CRM, against the correct Customer / Supplier / Prospect – and it did this on both Windows and macOS.

In this post I am demonstrating part of this solution for macOS only, using Apple Mail.  Of course this can easily be modified and extended to work with other email packages should you wish to do so.  This post basically covers how to extract the received emails and store them in such a fashion that your CRM can read, parse and save this information to the CRM database the next time the CRM is launched.

The first thing to do is to install the Apple Script that does all of the heavy lifting.  You can see the Script below, and Download it from here.

capture1

This script needs to be stored in the appropriate location on your Mac.  You can see the location in the image below, generally ~/Library/Application Scripts/com.apple.mail/

capture2The second step is to open your Apple Mail Preferences and navigate to the Rules Tab.  From here you need to setup a new rule to execute the script whenever a new email is received.  See the image above.

That’s it !  A text file will be created (if necessary) and appended to with the full contents of every email received.  You can setup the Name and Path for the text file from within the Apple Script.

Parsing the text file, extracting the email address of the sender and saving this to your CRM is straightforward but will differ depending on your application, development software and requirements.

Hopefully this will be of use to someone out there 🙂

Looking for an App creating for your Windows or Mac Computer? What about an App for your iOS or Android Tablet or Phone, or A Web App? Bespoke, Custom, High Quality Applications. Contact Us