Dave McKay
Dave McKay first used computers in the industry when punched paper tape was in vogue and he has been programming ever since. His use of computers pre-dates the birth of the PC and the public release of Unix. He has programmed in everything from 6502 assembly to Lisp, and from Forth to C#.
Don't let his six years at two different Universities fool you. He isn't a theoretical academic sheltered from the stark realities of the modern digital world. He has over 30 years of front-line experience working with IT in demanding business and industrial settings. His first IT technology article was published in Personal Computer World in 1985.
Dave has worked as a freelance programmer, manager of an international software development team, and an IT services project manager. Latterly he was the Data Protection Officer for a managed services provider, responsible for the data protection and regulatory compliance of businesses ranging in size from tens of users up to multiple thousands of users.
He is now a technology journalist and independent Data Protection and Compliance consultant.
Dave is a Linux evangelist, an open-source advocate, and an inveterate tinkerer.
Don't let his six years at two different Universities fool you. He isn't a theoretical academic sheltered from the stark realities of the modern digital world. He has over 30 years of front-line experience working with IT in demanding business and industrial settings. His first IT technology article was published in Personal Computer World in 1985.
Dave has worked as a freelance programmer, manager of an international software development team, and an IT services project manager. Latterly he was the Data Protection Officer for a managed services provider, responsible for the data protection and regulatory compliance of businesses ranging in size from tens of users up to multiple thousands of users.
He is now a technology journalist and independent Data Protection and Compliance consultant.
Dave is a Linux evangelist, an open-source advocate, and an inveterate tinkerer.
How to Install ZFS and Create a ZFS Pool on Ubuntu
ZFS is a stable, robust, and fault-tolerant file system with built-in RAID-like properties and drive pools. We show you how to create a ZFS drive pool and control access...
What is a VPN? Security and Privacy, Up To a Point
Virtual Private Networks (VPN) have been around for roughly thirty years. They provide secure communication between two networks, even over the public internet. What is a VPN? It’s how...
What is a Trojan Virus? A Master of Disguise
What is a Trojan virus? An impostor, a saboteur, and a master of disguise. But it isn’t actually a virus. Find out how this masquerading malware operates, and keep...
How Cybercriminals Are Exploiting COVID-19
Cybercriminals are opportunistic and nimble. They can re-skin existing cyberthreats extremely quickly. They’ll pick whatever is in the news and camouflage their scams under that hot topic. How are...
What is Cyber Security? Definition, Threats, and Defenses
As threats in the cyber world continue to grow, so does our need to protect ourselves from these threats. When discussing ways to virtually protect ourselves from these threats,...
Latest posts
A Practical Guide to Small Business Network Security in 2025
This article provides a clear roadmap for implementing crucial cybersecurity measures to safeguard your company's digital assets.
What is Btrfs? The Better (than most) File System
Btrfs may be a "better" file system next to everything except ZFS, but what Btr actually stands for is not "better", or "butter", but...
A Brief History of the Floppy Disk
Ah, the floppy disk. How I miss thee. How I don't. There was a certain tactile pleasure to inserting you into your drive, and...
How to Install ZFS and Create a ZFS Pool on Ubuntu
ZFS is a stable, robust, and fault-tolerant file system with built-in RAID-like properties and drive pools. We show you how to create a ZFS...
What is UnRAID? Outstanding Capacity with Parity
There are a number of NAS operating systems out there, including several based on the BSD (Berkeley System Development) operating system. Most are proprietary...