Monthly archives: June 2011


Sounds of Soldiers Summer Sale! 99c/69p until August

I’ve dropped the ebook price of Sounds of Soldiers for the summer. If you’re looking for an interesting and different story to load onto your ebook reader (or phone, laptop etc.) to read over the holidays, then now’s the time to get it. For the Kindle it’s 99 cents at Amazon US, 0,99 euro at Amazon Germany or 69 pence at Amazon UK. For just about every other ebook reader it’s available from Smashwords as well.

I’m currently working on two new tales in the Irwin Baker series. If you’d like to catch up on the Irwin Baker series so far, just follow the link.


Daily Blog 06/08/2011

  • According to Watts, countries like Russia and China are developing stealth-detection systems that include VHF and UHF radars. There is also a “passive-detection” system that “uses radar, television, cellular phone and other available signals of opportunity reflected off stealthy aircraft to find and track them.” The U.S. is betting big on stealthy aircraft, with the purchase of 1,700 F-35s coming up. (These planes are $100 million a piece). What if they can be detected after all?

    tags: stealth

  • AN Abingdon garage owner might try to keep a full-sized replica Spitfire on his forecourt as a permanent memorial to brave wartime women pilots. The model of the famous Second World War fighter has been catching the eye of passing motorists and passengers since it was installed at Peter Jewson’s Lodge Hill Garage on Oxford Road last month.

    But owner Mr Jewson said the plane did not yet have permission to become a permanent landmark.

    tags: Spitfire ww2

Posted from Diigo. The rest of my favorite links are here.


Daily Blog 06/05/2011

  • A book cipher is a cipher in which the key is some aspect of a book or other piece of text; books being common and widely available in modern times, users of book ciphers take the position that the details of the key is sufficiently well hidden from attackers in practice. This is in some ways an example of security by obscurity. It is typically essential that both correspondents not only have the same book, but the same edition.

    Traditionally book ciphers work by replacing words in the plaintext of a message with the location of words from the book being used. In this mode, book ciphers are more properly called codes.

    This can have problems; if a word appears in the plaintext but not in the book, it cannot be encoded. An alternative approach which gets around this problem is to replace individual letters rather than words. One such method, used in the second Beale cipher, substitutes the first letter of a word in the book with that word’s position. In this case, the book cipher is properly a cipher — specifically, a homophonic substitution cipher. However, if used often, this technique has the side effect of creating a larger ciphertext (typically 4 to 6 digits being required to encipher each letter or syllable).

    tags: cipher

Posted from Diigo. The rest of my favorite links are here.