Rodney Wirtz

Industrial Programmer

RWirtz@bxxe.us

My Programs

Password Maker

There are key points of password security that users must know in order to reduce the likelihood of a hacker cracking their password and thus gaining access to their device. Most importantly, passwords must be long and complex. Long and complex passwords require more effort and time for a hacker to guess.  My program will help you make more complex passwords.

Messagebox Creator

Ever wanted to make a REAL dialog Messagebox in Windows Visual Basic Program instead of using a form? This is the program you want!

Features:

   - Capability to create different kinds of Messageboxes.

   - Real pop-up box with working buttons.

   - Make it say whatever you want and it’s super easy to copy into your program!

 

Test Email Server

While working in your development environment, you can add email capability.  I recommend that you use this program to test your SMTP server.  This will confirm the following:


    - Checks for successful email deliveries.


    - View how emails you sent appear to recipients prior to go live.


You can either set up your own SMTP server or use a third-party service. Once you have your SMTP server ready,  you can input your credentials and test the server.

Timed Computer Reboot

Rebooting your server computer at night helps keep it running efficiently and can often speed up performance if you've been having issues.

The combination of things such as flushing the RAM and clearing up temporary files and processes helps keep “computer cobwebs” from forming and as a result your PC can perform at peak speed.

Webapps (Web Applications)

Web Applications are programs that run on a web server.  Unlike computer-based software programs that are run locally on the device’s operating system, web applications are accessed by the user through a web browser with an active network connection.  


I use three technologies to program my webapps:  Javascript in the browser (front-end), PHP on the server (back-end) and Ajax for communication between the browser and the web server.   


Webapps can be placed on the Windows desktop as a shortcut to the webapps URL.  The same is true for the iPhone and Android phone.  Once placed on the desktop, they behave just like a regular application.

Convert these Webapps to Progressive Web Applications

I build my webapps with addition support so they can be converted into a Progressive Web Apps (PWA).   This means they can be installed as a Mobile App on a Smart Phone or a Desktop App on a Windows Computer.   The neat feature of a PWA is that they can run without an Internet connection.  I would say all of my Webapps do not required an internet connections so they will run as a stand alone app.  To learn more about this new technology click on the PWA button.

Computer Information and Ping Program

This program is used to Ping websites and other computers on your network.  It is also used to get IP type information about your computer.  


It’s such a hassle opening a command shell and typing in Ping and the website or another’s computer’s IP addresses.  This program automates this by remembering the IP addresses that have been pinged and saves them in a combobox.


This program also gives information about your computer, its IP addresses and its IP address on the Internet.

UL508a Short Circuit Current Rating (SCCR) Introduction

Today, the majority of electrical components have the SCCR marked on the component itself by the manufacturer or a combination rating on the UL website. 


If the SCCR is not available, a default value can be assigned by referencing Table SB4.1 in the UL508a standard. Taking these values and the time needed to completely understand the circuit design being used, you realize that basically the component with the smallest SCCR in certain circuits determines the electrical panel SCCR rating.


This is a short presentation on the overall view of what SCCR is and how it is calculated.

Simple Javascript String Obfuscator

In software development, obfuscation is the deliberate act of creating source or machine code that is difficult for humans to understand.


Like obfuscation in natural language, it may use needlessly roundabout expressions to compose statements. Programmers may deliberately obfuscate code to conceal its purpose (security through obscurity) or its logic or implicit values embedded in it, primarily, in order to prevent tampering, deter reverse engineering, or even to create a puzzle or recreational challenge for someone reading the source code. 


This can be done manually or by using an automated tool, the latter being the preferred technique in industry.

Proportionality Calculator

I always have a tough time doing proportional calculations.  Worse, when I need the answer, I usually don't have time to figure out the calculation.

So, I wrote a little program to ease my proportional calculations.  I'm passing it along to you hoping that you will find it useful as well.

Stop Microsoft Compatibility Telemetry Program

The Windows Compatibility Telemetry (CompatTelRunner.exe) is a service in Windows 10 which carries technical data regarding the usage and performance of computer and Windows 10 software. It regularly collects the data from your computer and sends it to Microsoft to improve the user experience.


The reason why the Windows Compatibility Telemetry service draws users' attention is that it consumes too much if the computers resources, particularly the CPU uaage.  As such,  the computer becomes sluggish and slow. If you find that the computer inexplicably slows down and even freezes, one possible reason is Microsoft Compatibility Telemetry.  Click Ctrl-Alt-Del to open Task Manager, and you can see how much of the computer’s resources are being used by this program.


This program can stop other processes, if you choose to do so.  Therefore, you should use this program carefully.

Program Monitor (Program)

Have you ever had your program quit unexpectedly, you've lost data and you received a complaint from your customer?  


If so, then Program Monitor program may be just the ticket for you.  With this program, you can keep your program running in good health.  I wrote it mainly for programmers, but anyone can use it.  It's mainly for anyone who absolute must keep their program running.


This is an excellent program for remote or cloud Windows server or virtual machine on a shared server.  When it is imperative your program continues to be online, running and performing its function, this is the program for you.


All the Important Commands for Visual Basic .Net 

Microsoft ListView Control  

The ListView control is similar to the ListBox control except that it can display its items in many different ways. 


To use the ListView control in your project, place an instance of the control on a form and then set its basic properties.  The common properties are: number, size and headings of columns.  Also, show grid, complete row selection and only one row at a time are configured. 


The syntax of the Listview control is different compared to the Listbox control.   In addition, the  commands to deal with the Listview control are not easily found on the web.  It can be more then confusing trying to figure out how to use the Listview control.


So, I have written a program that shows the simplest ways to control the Listview.  The main form is show on the left and the code for the form is display when the button at the bottom of the form is clicked.  


This should save you a lot of time if you are not very familiar with the Listview Control.

All the Important Commands for Visual Basic .Net 

Microsoft ListBox Control  

As long as I presented the Listview control, I thought I should present the Listbox as well.

RSA File Encryption Exchange Program.  Free as in Free Beer

You and a Friend can use this program to exchange encrypted files between you.  Since no one has access to your Private Keys, no third person can decrypt your files.


1 - Make Your RSA Keys: Start by making your key pair. This button makes your Public and Private Key Pair.


2 - Locate Your Public Key File To Send to Friend:  This is the path to your Public Key.  Email this file to your friend.


3 - Decrypt Friends Message File:  Your friend will use this same program and your Public Key file to encrpt a text file to you.  Only you can Decrypt your Friend's file using your Private Key.


4 - Get Friends Public Key:  Your friend will email you their Public Key file.  Locate that file with this button selection.


5 - Encrypt My File for Friend:  Select the file you want to encrypt for your Friend.  Use their Public Key.  Once encrypted, email the file to them and they can decrypt the file with their Private Key.