Dave McKay

Dave McKay first used computers in the industry when punched paper tape was in vogue and he has been programming ever since. His use of computers pre-dates the birth of the PC and the public release of Unix. He has programmed in everything from 6502 assembly to Lisp, and from Forth to C#.

Don't let his six years at two different Universities fool you. He isn't a theoretical academic sheltered from the stark realities of the modern digital world. He has over 30 years of front-line experience working with IT in demanding business and industrial settings. His first IT technology article was published in Personal Computer World in 1985.

Dave has worked as a freelance programmer, manager of an international software development team, and an IT services project manager. Latterly he was the Data Protection Officer for a managed services provider, responsible for the data protection and regulatory compliance of businesses ranging in size from tens of users up to multiple thousands of users.

He is now a technology journalist and independent Data Protection and Compliance consultant.

Dave is a Linux evangelist, an open-source advocate, and an inveterate tinkerer.

What is Whistleblowing, and How to Remain Anonymous

Whistleblowing is a catch-all term for disclosing wrongdoing in an organization. Not everyone will agree it’s for the greater good, so to be safe you need to be anonymous....

How to Protect Yourself From Invasive Network Security

Know that thing connected to your broadband master socket? It’s got the Wi-Fi key on it---you reboot it when your broadband dies. Your router is the most important electronic...

How to Set Up TrueNAS CORE and Connect to it From Ubuntu

TrueNAS CORE is a class-leading network-attached storage system. It's fantastic but can be overwhelming. Here's how to get a basic setup configured and running, and how to connect to...

The Vulnerabilities of Electronic Voting Systems

Electronic voting systems must perform one of the toughest jobs on the planet. It’s not counting votes. That’s easy. The toughest part is convincing people that the results are...

Five Great Free Security Tools You Should Check Out

As important as it is, cybersecurity is still constrained by budget. Thankfully there are some fantastic free tools that you can add to your cybersecurity arsenal to help you...

Latest posts

A metal referee's whistle

What is Whistleblowing, and How to Remain Anonymous

Whistleblowing is a catch-all term for disclosing wrongdoing in an organization. Not everyone will agree it’s for the greater good, so to be safe...
RAID distributes data between hard drives

What is RAID? Everything You Need to Know

RAID is an acronym for Redundant Array of Independent Disks (or Inexpensive Disks, depending on the source) and is combining multiple physical disks to...
Domestic broadband Wi-Fi router

How to Protect Yourself From Invasive Network Security

Know that thing connected to your broadband master socket? It’s got the Wi-Fi key on it---you reboot it when your broadband dies. Your router...
QNAP NAS in the initial physical setup process

How to Set Up and Get Started with a QNAP NAS

QNAP made their NAS products as user-friendly as possible, but the initial set up of the NAS can still be a bit intimidating for...
wall of server racks

How to Set Up TrueNAS CORE and Connect to it From Ubuntu

TrueNAS CORE is a class-leading network-attached storage system. It's fantastic but can be overwhelming. Here's how to get a basic setup configured and running,...