Text this: Constructions of some secret sharing schemes based on linear codes