Thursday, December 27, 2001

Sunday, December 23, 2001

TIME.com: Inventions of the Year -- The best inventions of 2001 Electric bikes have never been cool. After all, what self-respecting rider would let a battery do all the work? But fuel-cell technology, which uses pollution-free hydrogen gas to generate an electric current, could ignite electric-bike sales. The first prototype, from Italian bikemaker Aprilia, stores compressed hydrogen in a 2-liter metal canister housed in the frame. With a top speed of 20 m.p.h., the bike won't win the Tour de France. But it weighs 20% less than regular electrics and travels twice as far, about 43 miles, before it needs more gas. Now that's cool.

Availability: In 2003, for approximately $2,300
To Learn More: www.apriliaenjoy.com

TIME.com: Inventions of the Year -- The best inventions of 2001 The wind in your hair, the sun in your eyes, the smell of salt in the air—and then you get seasick. If you love boating but hate all that bouncing around, the OutRider may be for you. Mounted on a funny-looking ski and shock absorber, the flat-bottomed boat lightly skims the surface of the water for an ultrasmooth ride. Side hulls and an aerodynamic design help keep the thing steady while you zip over waves at speeds of up to 80 m.p.h.

Availability: February 2002, for $60,000
To Learn More: www.klemflyingboats.com

TIME.com: Inventions of the Year -- The best inventions of 2001 Senator John Glenn is not the only civilian who would enjoy rocketing into space, but chances are the rest of us won¹t be hitching a ride on a space shuttle anytime soon. We¹ll have to wait until private companies can take us there. Jeff Greason of Mojave, Calif., has done his part by creating the first low-cost, reusable rocket engines. Greason¹s EZ-Rocket prototype, which took flight this fall, is powered by twin engines that burn isopropyl alcohol and liquid oxygen to generate 400 lbs. of thrust. Greason¹s engines should be able to carry passengers 65 miles above the earth‹too low to go into orbit but high enough to give space tourists a spectacular view of the planet. Greason estimates that planes powered by his engines could someday cost as little as $900 per flight to operate. The planes would cost as much as a Lear jet ($10 million), but Greason figures that¹s a bargain considering that Lear jets can¹t fly high enough and the cheapest boosters start at $100 million.

Availability: Opened Sept. 2001
To Learn More: www.xcor.com


Next: Gyroplane >>

TIME.com: Inventions of the Year -- The best inventions of 2001

Friday, December 21, 2001

The NPR Basic Jazz Record Library: Duke Ellington "I never heard so musical a discord, such sweet thunder." So says Puck in William Shakespeare's A Midsummer Night's Dream, and so says Duke Ellington, who wrote that music, "Such Sweet Thunder." A.B. Spellman, why should it be part of our NPR Basic Jazz Record Library?

Brawn (thing)@Everything2.com

Ars Technica: The PC enthusiast's resource Posted 12/20/2001 - 3:37PM, by Caesar
This Washington Post story let the cat out of the bag: WinXP's Universal Plug 'n Play support contains a flaw that essentially allows malicious users to seize control of any unpatched XP system on the 'net. This flaw is also present in the Internet Connection Sharing client that can be installed in Win98 and WinME. In other words, everyone using a Microsoft OS should get the patch. From the story:
A Microsoft official acknowledged that the risk to consumers was unprecedented because the glitches allow hackers to seize control of all Windows XP operating system software without requiring a computer user to do anything except connect to the Internet.
There is no KB article yet, although Microsoft said that information will be available within 24 hours under KB article Q315000. Most egregious, in my view, is the fact that this bug was discovered five weeks ago, yet we're only learning about it now, yet not from Microsoft, but from the media. Also note that the patch has not appeared on WindowsUpdate yet, so you'll need to grab it and install it the old fashioned way. Update: I've just received a copy of the security bulletin that Microsoft sent out over e-mail. It contains much more in-depth information than is currently available elsewhere. I've posted it up here for those interested.

Thursday, December 20, 2001



Largest Human Chromosome Unraveled


Dec. 20 — Scientists said on Wednesday they have deciphered the third human chromosome that contains a treasure trove of information about diseases ranging from obesity and eczema to dementia and cataracts.



With more than 727 genes and nearly 60 million DNA letters, chromosome 20 is the largest human chromosome to be finished so far.
Thirty-two of the genes are linked to genetic illnesses including the brain wasting Creutzfeldt-Jakob disease, severe immune disorders and illnesses such as heart disease, diabetes and dermatitis.

"This is one more completed chapter of our genomic anatomy textbook — medical research will be using this information for decades to come in its quest to tackle our common diseases," said Dr. Mike Dexter, the director of the Wellcome Trust, the world's largest medical charity.

Scientists from The Wellcome Trust Sanger Institute in Cambridge, England, led by Dr. Panos Deloukas, completed the sequence which is reported in the science journal Nature.

All of the information is freely available to scientists around the globe.

"It is a unique piece of the puzzle," Deloukas told Reuters. "We have probably annotated more than 95 percent of this chromosome."

Chromosome 20 is the first chromosome to be deciphered since scientists from Britain, China, France, Germany, Japan and the United States working on the Human Genome Project sequenced all the estimated 40,000 or more genes in humans earlier this year.

"In two years' time we should see the sequence of the remaining chromosomes being finished," Deloukas added.

Each chromosome is made up of a molecule of DNA in the shape of a double helix which is composed of four chemical bases represented by the letters A (adenine), T (thymine), G (guanine) and C (cytosine). The arrangement, or sequence, of the letters determines the cell's genetic code.

Chromosome 20 comprises about two percent of the three billion letters that make up the human genetic code. It is much bigger than chromosome 21, the smallest and first chromosome, mapped by Sanger scientists in 1999. Chromosome 22, the second smallest human chromosome, was sequenced in 2000. It has genetic components linked to 35 diseases and syndromes.

One of the interesting aspects of chromosome 20 is that scientists found an extra chunk of DNA containing at least one gene. They estimate 37 percent of Caucasians have the additional DNA chunk.

"For the moment we don't know whether this gene is truly functional in these humans and if it is functional what are the consequences for the people who have it. That was a bit of a surprising finding," he said.

Chromosome 20 also contains 30,000 SNPs — single nucleotide polymorphisms — which are the variations in human DNA that make people unique. SNPs contain clues about why some people are susceptible to diseases like cancer or diabetes, the best way to diagnose and treat them and how they will respond to drugs.

Any two humans are 99.9 percent similar. The 0.1 percent difference in DNA is what makes an individual unique.

"As with the Harry Potter series, we already know how long the complete works of the human genome will be -- 24 installments -- and we can't wait to get our hands on them all," Masahira Hattori and Todd Taylor of the RIKEN Yokohama Institute in Japan said in a commentary on the research. "We have already had a few glimpses of what's to come but there are many mysteries and secrets to be revealed."

Thursday, December 13, 2001

Daily comic strip Pewfell Porfingles: fantasy adventure humor dragons wizards

TechWeb > News > Moot Court Tries Anti-Spam Laws > February 20, 1998

OTAQ Alternative Fuels Home Page

Hawai'i is an ideal lab for wind, solar energy

ABCNEWS.com : Revival of an Old but Efficient Engine

SolarAccess.com | REAccess News

Scientist: Moon Power Could Solve Energy Crunch

OMNICLUSTER

Racemi to offer ultra-thin server based on Sun processors

Netcraft Web Server Survey

The Skinny on Server Blades

The Industry Standard | Compaq to kick off software strategy

Welcome to t13.org

XBOXHACKER

Microsoft crax down on Xbox hax

icronticforums.com - powered by vBulletin

The Salt Lake Tribune -- Rolly and Wells: Short Again In a Tussle With Officials

Server blades set to invade enterprise nets, 10/15/01

Wednesday, December 12, 2001

Tuesday, December 11, 2001

Largest Fossil Cockroach Found: Site Preserves Incredible Detail

PBS - Scientific American Frontiers:The Gene Hunters:A Passion for DNA

Zhang Lab: Computational Biology and Bioinformatics

Cold Spring Harbor Laboratory

Lawrence Livermore: News and Public Affairs: News and Media: NR-01-11-05

Lawrence Livermore: Astronomers Unveil First Detection of Dark Matter Object in the Milky Way

NR-01-12-02

ESO - The European Southern Observatory Homepage

Whitaker News: Sonic Flashlight

Megamouth Shark Home Page for FLMNH

Lab Notes

Lab NotesThe Heart of the (Programmable) Matter

ScienceDaily Magazine -- Gene Triggers Stem Cell Differentiation

ScienceDaily Magazine -- University Of Colorado Researchers Identify Switch That Controls Aging In Worms

www.BakaNeko.com

BAKA [news]

Baka Homepage

Planet 3D

"Planète Mars"

Scientific American: Feature Article: A Vertical Leap for Microchips: January 2002

Sunday, December 09, 2001

Thursday, December 06, 2001

Monday, December 03, 2001

Seti Logs







DateUnitsPercentile RankTotal UsersRankUsers at Rank
12/04/01337099.461%3408068183697
12/04/01336699.460%3407215183987
12/01/01334299.457%3401963184808

Seti@Home

Gene Catlow - 13

Miami Herald: War has been declared on the humble sea cow

Argentina close to collapse after run on banks

InformationWeek > Innovation > Get The Bugs In > November 30, 2001



In a few years, microrobotic creatures just millimeters in diameter may do everything from creating materials with new molecular properties to performing military reconnaissance flights. They'll duplicate the wing motions of the housefly to become hard-to-detect surveillance tools or take 200,000 measurements per second to unlock the mysteries of DNA.

Special Report: Pace Of Linux Change About To Accelerate November 26, 2001

CNN.com - Team tapped to design Pluto probe - December 1, 2001

Ananova - Cloning laws in Japan to allow human-animal mix

Welcome to Undoubtedly Kawaii-kawaiicomics.com

TIME.com: Reinventing the Wheel

The Belfry: Furry Comics Online

News: Got hacked? Blame it on the software

Ginger Booth's Homepage

Mysterious IT is a motor scooter - Tech News - CNET.comYa right, this is anticlimatic after all the hype.

Monday, November 26, 2001

nV News - A great source for NVIDIA related news...

Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/25/01329799.450%33932511866611

Seti@Home

Virtual Astronomy: Now Anyone Can Make a Discovery

After `hot' start, Linux now is `realistic' about China inroads (11/24/2001)

Sunday, November 25, 2001

Seti Logs






DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/25/01329399.449%3391771186958
11/21/01325699.445%3384317187645

Seti@Home

Fermi's Paradox II: What's Blocking Galactic Civilization? Or Are We Just Blind To It?

Wednesday, November 21, 2001

Mythology of the Seven Sisters (Pleiads)

MACHO Project Home Page

AAVSO Discussion Mail Archives

RTMC -- History 98

Nixie Tubes








Counting & display tubes

Galaxy Neat page, does not do anything but looks beautifull.

Tuesday, November 20, 2001

OpenBeOS Project - News

Yahoo - Red Hat Proposes to Enhance Microsoft Settlement Offer By Providing Open Source Software to All U.S. School Districts

This is great




Red Hat Proposes to Enhance Microsoft Settlement Offer By Providing Open Source Software to All U.S. School Districts
Open Source leader proposes to provide software to every school district in the United States if Microsoft provides computing hardware for the 14,000 poorest school districts
RESEARCH TRIANGLE PARK, N.C.--(BUSINESS WIRE)--Nov. 20, 2001-- Red Hat, Inc. (Nasdaq:RHAT - news) today proposed an alternative to the settlement announced today of the class-action lawsuit against Microsoft. Red Hat offered to provide open-source software to every school district in the United States free of charge, encouraging Microsoft to redirect the money it would have spent on software into purchasing more hardware for the 14,000 poorest school districts. Under the Red Hat proposal, by removing Microsoft's higher-priced software from the settlement equation, Microsoft could provide the school districts with many more computers--greatly extending the benefits Microsoft seeks to provide school districts with their proposed settlement.

Microsoft had proposed that, in settlement of class-action claims of price-gouging, the company donate computer hardware, software and support to 14,000 poor school districts throughout the United States. Under the proposed settlement, a substantial part of the value provided to schools would be in the form of Microsoft software.

The Red Hat's alternative proposal includes the following:

Microsoft redirects the value of their proposed software donation to the purchase of additional hardware for the school districts. This would increase the number of computers available under the original proposal from 200,000 to more than one million, and would increase the number of systems per school from approximately 14 to at least 70.
Red Hat, Inc. will provide free of charge the open-source Red Hat Linux operating system, office applications and associated capabilities to any school system in the United States.
Red Hat will provide online support for the software through the Red Hat Network.
Unlike the Microsoft proposal, which has a five-year time limit at which point schools would have to pay Microsoft to renew their licenses and upgrade the software, the Red Hat proposal has no time limit. Red Hat will provide software upgrades through the Red Hat Network online distribution channel.
A Win-Win Approach

The Red Hat proposal achieves two important goals: improving the quality and accessibility of computing education in the nation's less-privileged schools, and preventing the extension of Microsoft's monopoly to the most-vulnerable users.

``While we applaud Microsoft for raising the idea of helping poorer schools as part of the penalty phase of their conviction for monopolistic practices, we do not think that the remedy should be a mechanism by which Microsoft can further extend its monopoly,'' said Matthew Szulik, CEO of Red Hat. ``Through this proposal all of the states and all of the schools can win, and Microsoft will achieve even greater success for its stated goal of helping schools. By providing schools with a software choice, Red Hat will enable Microsoft to provide many more computers to these schools. At the same time, the schools can accept this offer secure in the knowledge that they have not rewarded a monopolist by extending the monopoly. It's now up to Microsoft to demonstrate that they are truly serious about helping our schools.''

General information about Red Hat's support for education is available at www.redhat.com/opensourcenow/.

About Red Hat, Inc.

Red Hat is the leader in developing, deploying and managing solutions built on the benefits of an open source platform. The open source platform includes the Red Hat Linux operating system for mainframes, servers, workstations and embedded devices, GNUPro tools for developers, database, e-Commerce, secure Web server, high availability server and run-time solutions like eCos and RedBoot. For this platform, Red Hat provides end-to-end professional services including Professional Consulting, Engineering services, Technical Support services, and Global Learning services. Red Hat Network is the premier Internet based service that simplifies and integrates the deployment and management of these offers. More information about Red Hat is available at www.redhat.com. Red Hat is headquartered in Research Triangle Park, N.C. and has offices worldwide. For investor inquiries, contact Gabriel Szulik at Red Hat, (919) 547-0012, x439.

LINUX is a trademark of Linus Torvalds. RED HAT is a registered trademark of Red Hat, Inc. All other names and trademarks are the property of their respective owners.

FORWARD-LOOKING STATEMENTS

Forward-looking statements in this press release are made pursuant to the safe harbor provisions of Section 21E of the Securities Exchange Act of 1934. Investors are cautioned that statements in this press release that are not strictly historical statements, including, without limitation, management's plans and objectives for future operations, and management's assessment of market factors, constitute forward-looking statements which involve risks and uncertainties. These risks and uncertainties include, without limitation, reliance upon strategic relationships, management of growth, the possibility of undetected software errors, the risks of economic downturns generally, and in Red Hat's industry specifically, the risks associated with competition and competitive pricing pressures, the viability of the Internet, and other risks detailed in Red Hat's filings with the Securities and Exchange Commission, copies of which may be accessed through the SEC's Web site at http://www.sec.gov.


--------------------------------------------------------------------------------
Contact:

Red Hat, Inc. Schwartz Communications
Melissa London Maribel Lopez/Josh Slobin
(919) 547-0012 (781) 684-0770
melissa@redhat.com redhat@schwartz-pr.com

Sunday, November 18, 2001

Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/18/01322599.438%3379088189709

Seti@Home

Saturday, November 17, 2001

Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/17/01321599.441%33764071884519

Seti@Home

Friday, November 16, 2001

HotHardware - The Leadtek GeForce 3 Ti500 TD

CNN.com - Volunteers needed for Mars expedition - November 14, 2001

Aquarius Rising: a conventional approach

Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
11/16/01320299.438%3374246189539

Seti@Home

It's a memory card; it's a camera; it's a cell phone!
By Nancy Lang
(11/15/01)

Eyeball Chat 2.0 - Downloads - CNET.com


Description
Eyeball Chat allows you to communicate face-to-face over the Internet for free. All you need is an Internet connection and a Webcam to connect with friends and family worldwide. The Contact List allows you to see which of your contacts are online at anytime, so you can instantly engage in live video chat.
This release features support for AIM, MSN, and Yahoo messengers, support for integrated chat rooms with improved privacy, the ability to record and send video messages, file transfer, SSL encryption, and more. Please make sure that you have Windows 98, ME, or 2000. Eyeball Chat does not support Windows 95 or NT.

Thursday, November 15, 2001

Wednesday, November 14, 2001

Iwill XP333 Motherboard Review @ t-break

Sustainable Energy delivers turnkey small-scale wind solutions. Recent installations include a 20kW turbine to provide electricity for a business located in Swansea Enterprise Park. Sustainable Energy also has experience in financing and managing wind turbine installations.

The Woo-Woo Credo

The Register


Do-it-yourself Internet anonymity
By Thomas C Greene in Washington
Posted: 14/11/2001 at 12:46 GMT


Along with the recent government hysteria over terrorists, we've seen legislative measures and 'emergency powers' inviting law-enforcement agencies worldwide to conduct Internet surveillance on an unprecedented scale. But because the state-of-the-art of electronic dragnets makes it difficult if not impossible to exclude the comings and goings of innocent citizens, we thought this a good time to run down the basic techniques for ordinary, law-abiding folk to come and go anonymously on the Net, and keep their private business private.

How do you make a truly anonymous post to a newsgroup or a BBS? How do you keep the Web sites you visit a secret? How do you send e-mail and ensure that its contents can't be read by someone who intercepts it? How do you chat anonymously?

We'll invoke our foil, Windows addict Harry Homeowner, and lay it out in terms the average user can profit from, though with hopes that even you power users might learn a thing or two in the process.

Proxies
These are your first line of defense, so let's start with them. Proxies provide a useful layer of mediation between your machine and the Internet. There are several types, but Web proxies and Socks proxies are the two most relevant to our purposes.

Grossly oversimplified, a proxy is a remote machine which you connect through to the Net, which forwards your IP traffic, and which you then appear to be originating from. When you contact a Web site via an anonymous proxy, it's the proxy's IP which shows in their logs.

You can use either Web or Socks proxies with your browser, and Socks proxies with other Net clients to obscure your IP from prying eyes. But you do have to choose them with care.

Socks proxies are the best, general-purpose proxies. This is so because Socks are non-caching, which means, for example, that there won't be a record of the Web pages you fetched while connecting through one, except on your own machine -- and this you can fix rather easily (more on that in 'Browser Settings'). It also means they're slow, but if you want anonymity, you shouldn't quibble.

But Internet Explorer doesn't support Socks. What to do? It's not brain surgery. You can simply download an application called SocksCap, and use it to 'socksify' any IP client you use. It will work with browsers, e-mail clients, telnet, SSH, chat clients, even your l4me e-mail bomber. Test it; socksify your e-mail client and send a message from one of your accounts to another. Check the header. Is the originating IP your proxy? If so, your e-mail now appears to originate from the proxy's IP. This can be extremely useful, as we'll see below.

Useful but not foolproof. Of course the proxy machine's admin can easily learn that you connected to it after perusing his logs, so a proxy doesn't actually conceal you; it just adds a layer between you and whatever you're contacting on the Net. This layer can be thick or thin, depending on where the proxy machine is physically located. If your proxy is located in a country unlikely to cooperate with requests for their logs from foreign officials, or a country where your mother tongue is rarely spoken, it can be, in practical terms if not theoretical terms, quite an effective layer of protection.

It's easy to determine a proxy's country of origin with the $20.00 Patrick Project DNS utility, which will resolve IPs to addresses and vice versa, and a good deal more to boot. You cheapskates out there can go to SamSpade.org and do it all for free.

Now you know how to determine your proxy's location. The more exotic the better: Korea is better than Japan; Thailand is better than Korea; Indonesia is better than Thailand; Papua New Guinea is pure gold. Kenya is better than Morocco; Ghana is better than Kenya; Guinea is better than Ghana; Burkina Faso is pure gold. You get the picture.

Now you need to test the proxy for anonymity. Some of them can leak appalling amounts of information, like your true IP, for example. There are several environmental variables checkers on line which will tell you just what information your proxy is leaking to the world, and a nice links page to a heap of them is located at Proxys4all.com.

And what do env checkers tell you? The chief variables you need to know about are:

REMOTE_ADDR: Your apparent IP, which should be the proxy. If not, use another proxy.
REMOTE_HOST: Your apparent address, which should resolve to the proxy IP. or better yet not be resolvable at all. If it resolves to you, use another proxy.
HTTP_X_FORWARDED_FOR: Sometimes your true IP is revealed -- get another proxy.
HTTP_USER_AGENT: Your browser type -- unimportant.
FORWARDED: Reveals the fact that you're using a proxy; not fatal, but better if blank.
VIA: Reveals the fact that you're using a proxy; not fatal, but better if blank.
CLIENT_IP: Sometimes your IP is revealed -- use another proxy.
HTTP_FROM: Sometimes your IP is revealed -- use another proxy.

You can use a free application called ProxyHunter to scan ranges of IPs and find your own proxies. These you can evaluate, determining location and anonymity according to the guidelines above.

Socks proxies are located on port 1080, so always use that in your search with ProxyHunter. HTTP proxies on ports 80, 3128 and 8080 are useful, and can be loaded directly into your browser, but they're not quite as secure.

You can load a good Socks in your chat clients like IRC and ICQ; and with SocksCap you can run your telnet and e-mail clients and browser through one as well.

For even more anonymous surfing, you can give yourself an added measure of security by connecting to a Web proxy like SafeWeb or Anonymizer through a Socks (or even a decent HTTP proxy). Feel free to e-mail me if you can't figure all this stuff out -- but please, I beg you, give it a fair go on your own first. I'm a humble news reporter, not a help desk.

When you find a Socks proxy with ProxyHunter, or by perusing the many public Web sites where they're listed, and you get satisfactory results from the env check, and your proxy is located on some God-forsaken corner of the Earth, then you've acquired a decent layer of protection. Congratulations. But that's far from the whole shebang.

Anonymous dialups
Whenever you dial in to an Internet connection, your ISP can determine your phone number with caller ID. This information is recorded, and can be turned over to nosy Feds on request with an administrative subpoena, which doesn't require a judge's approval.

If you've got a regular ISP account billed to a credit card, your ISP knows perfectly well who and where you are, so concealing your phone number from them is hardly an obstacle to associating you with your Net activity.

However, there are free ISPs like NetZero on which you can register with totally fictitious personal information, and to which you can connect with caller ID disabled. This isn't a solution in itself, but combined with the judicious use of good proxies, it can add a second, thick layer of anonymity to your comings and goings.

These ISPs don't allow you much free surfing time -- usually something like ten hours a month; and they feed adverts to you and they're slow (made slower still by proxy use); but they can be a superb means of connecting when you need to be even more anonymous than usual, such as when you make a controversial post to a newsgroup or BBS, or send a sensitive e-mail.

Get your ducks in a row: first, go to an Internet cafe or a library. If they require identification, go elsewhere. When you find a public place where you can surf anonymously, set up an account with NetZero using fictitious personal information. Even better, go through a Web proxy while you're at it.

Record your login, password, and a dialup number convenient for your home location. Now go home, and disable caller ID (contact your phone company for instructions), and dial in to your new fictitious account. And always dial in with caller ID disabled.

Finally, use an anonymous Socks proxy with your e-mail client for newsgroups, and a Socks along with a Web proxy for BBS posts. Theoretically, you can still be traced because the phone company knows what you're up to; but unless you're under active surveillance by the Feds, you can safely gamble that no one from NetZero is ever going to peg you.

You're getting very close to true anonymity, and you still haven't gone beyond what our friend Harry Homeowner can handle.

There are other things you can do with this caller-ID-off+Netzero+Socks+Web-proxy setup. You can, for example, open a Web-based e-mail account with fictitious personal information and send and receive anonymously, so long as you set up your NetZero account properly, and always connect to it with caller ID disabled, always use a Socks with your browser, and/or always use a Web proxy.

You've got ten hours a month. Spend them wisely, and you can surf almost anywhere or post almost anything on line with no repercussions.

But what if your e-mail is intercepted by something hideous like the FBI's packet sniffer Carnivore? Unless you stupidly identify yourself in your mail, you're almost certain not to be identified -- but you still may not want the contents read by anyone but the intended recipient. You don't have to be a criminal to desire privacy, much as the Feds like to pretend otherwise.

Crypto
Now this is funny. If you use a nice, free crypto program like PGP, you can easily encrypt your e-mail. Just follow the instructions -- there's really nothing to it.

The problem here is that the Feds, if they happen to be watching, can gather that you sent an encrypted message to Recipient X, a fact which you may not wish them to know.

If you follow the scheme above, you can send a message anonymously via a Web-based account. But unless I'm missing something, you can't use PGP to encrypt Web-based e-mail messages.

So how do you have your cake and eat it too? It's quite simple: you create an encrypted text file and attach it to your Web-based anonymous e-mail. In the body of the message and in the From: field you give away nothing about yourself. In the encrypted attachment you spill your guts.

Now all the Feds can determine is that Recipient X got an e-mail message with an encrypted attachment from Monica_Lewinski666@hotmail.com or whatever.

Easy peasy, even for our Harry.

Browser settings
Proxy or not, your browser can leak ghastly amounts of information about you. Fortunately, tightening it up is easy when you know what to do.

Since our Harry almost certainly uses MS Internet Explorer, we'll deal with that, though Netscape users should find this information easy to apply to their own setups.

Get into Tools/Internet Options/Security. Go to 'Custom Level' and disable 'Download unsigned ActiveX Controls' and 'Initialize and script ActiveX Controls not marked safe for scripting'; set 'Java permissions' to 'High Safety'; disable 'Meta Refresh'; disable 'Launching programs and files in an IFRAME'; set 'Software Channel permissions' to 'High Safety', disable 'Userdata persistence'; disable 'Active scripting', 'Allow paste operations via script', and 'scripting of Java applets'.

Accept session cookies but not stored cookies. Never use in-line auto-complete, and never allow Windows to save any of your passwords.

Now go to Tools/Internet Options/Advanced and clear 'Enable Profile Assistant', select 'Do not save encrypted pages to disk', clear 'Enable page hit counting', and select 'Empty Temporary Internet Files folder when browser is closed'.

That should about do it.

While you're about it, pop over to Control Panel/Network and ensure that File and Printer sharing are disabled.

Spyware
While you're on the job, never do anything with your company's computer that you wouldn't want your Grandmother to know about. Spyware is ubiquitous in the work place. Don't even mess with a company-issued laptop, which may well contain 'remote administration' features which will enable a company admin to connect to it. If you want to be anonymous, use your own equipment. If you're using anyone else's hardware, assume that anonymity is impossible.

You can get a fab program for detecting Trojans called The Cleaner for $30.00 from Moosoft. A number of Trojans fail to be detected by the fine products of the popular anti-virus companies, in spite of their powerful suggestions to the contrary. Moosoft picks up most of them.

Most software firewalls are notoriously bad at stopping, or even notifying you, when a malicious program sends data out from your machine. An application like The Cleaner can go a long way towards assuring you that no such contaminant exists on your box.

PC Hygiene
There's a crucial difference between deleting a file and wiping it. A deletion leaves a file's entire contents on your disk, until the space it occupied happens to be overwritten by a subsequent file. In the mean time, the data can be recovered with forensic techniques. A proper wipe, on the other hand, overwrites that space immediately so the file's contents can't be recovered. Utilities capable of this include BCWipe, Norton Wipeinfo, Evidence Eraser, and PGP.

The only certain way to keep your machine free of incriminating files and alien malware is to wipe your HDD periodically and clean-install your OS from original media while preserving those files and progies you can't do without. If you're serious about anonymity and file preservation, then you'll cough up the $200.00 or so needed to maintain two HDDs, because nothing beats a spare, non-removable magnetic storage device; and nothing beats a true file wipe, which is the only insurance against forensic probing.

This is how I do it -- and I do it frequently: I have two HDDs in my Windows box. When I get ready to wipe my primary, I've already done an fdisk and format /u and a thorough 'government wipe' on the secondary using Norton Wipeinfo. I simply copy all the files and progies I wish to preserve onto that thoroughly-wiped secondary disk. I then switch the primary and secondary, and install Windows from original media onto the wiped disk, from which I'll boot. I install Norton Utilities, naturally.

I then fdisk and format /u the former primary and do a thorough 'government wipe' using Norton Wipeinfo. Thus it's ready, and spotless, whenever I need it. I tend to do this every two or three months, depending on what I've been up to.

As soon as I get a sense that my current primary contains material I'd rather not preserve for posterity, I repeat the process. With two HDDs, it all takes about forty-five minutes. With this method you wipe not only your files, but your registry and swap file too. Forensics, as it's normally practiced, becomes futile.

If this seems too extreme, a utility called the Evidence Eliminator Eliminator (E3) by Radsoft (not to be confused with Robin Hood Software's lame 'Evidence Eliminator') will wipe a good many of your messes and excesses for a cool $80.00. It's considerably cheaper than a spare HDD, and pretty thorough. It doesn't merely delete files, it wipes them properly. To add to its effectiveness, you can use a proper file wipe utility like BCWipe or Norton Wipeinfo to eliminate your swap file, where a good deal of what you've been up to is stored. The file is in your C:\ directory and is named Win386.swp.

Follow these basic guidelines, and you'll be quite safe, though not perfectly safe. It's a bit like copulation -- there are quite effective birth control methods, but the only way to be absolutely certain you won't ever get pregnant is not to do the deed.

But that's no fun. And neither is never using a computer. So practice safe computing and stop fretting. As with the pill, the odds are immensely in your favor. So smile, relax, and enjoy. ®

Personal note
In an 18 October article entitled SafeWeb ain't all that I'd promised to post this follow-up in a week's time. Unfortunately a family emergency intervened, and subsequent news demanded my attention. My apologies to those who've been waiting. -- tcg

NoLogo: the book that became part of a movement

WTO | World Trade Organization: WTO / GATT Home page

Motherboards ASUS A7M266-D Double Performance with Dual Athlon Processors

Scientific American: Feature Article: The Electronic Paper Chase: November 2001

Seiko-Epson and CDT Develop Worldâs First Ink-Jet Printed Full Colour LEP Display

Science & Research

UA researchers develop new foldable monitors - Thursday April 12, 2001 - The Arizona Daily Wildcat

University of Arizona scientists are using a standard inkjet printer to produce light-emitting sheets of plastic that could soon be used as lights and signs

developerWorks: Linux | Open source projects : RunTime: Pipes in Linux, Windows 2000, and Windows XP

Honda 'Asimo' Robot Becomes More Human-Like

Friday, November 09, 2001

eMOTION! REPORTS.NET | The Path to Hypersonics : Scramjets are Go

e MOTION REPORTS.NET PRESENTS ...

FLUG REVUE Home Page Germany's leading aerospace magazine!

Sonic Cruiser


Jane's at Paris Airshow 2001- Sonic Cruiser details leak out

The key issue that Boeing really faces is how radical should it be in developing this new design. There are two programmes currently being assessed – a Mach 0.95/0.98 aircraft and a Mach 1.2 design.

Boeing: Sonic Cruiser

Chicago Tribune | Turbulence lifts Boeing Sonic Cruiser

Boeing has refused to confirm or deny widespread industry talk that the aircraft is being tested to go even faster, which would make it a supersonic rather than sonic cruiser.

eMOTION! REPORTS.NET | The Black Technology that Makes Sonic Cruiser a Real Possibility

McDonnell Douglas, Lockheed, and Boeing all feature strongly amongst the companies that have been involved in advanced aircraft studies for the USAF from the 1960s onwards. McDonnell Douglas in 1985, examined the possibility of a 305 passenger long-range aircraft, capable of speeds up to Mach 5, and powered by regenerative air turboramjet engines. The company has since been acquired by Boeing.

Boeing Mulls All Out War with Sonic Cruiser






Boeing's Sonic Cruiser Skirts The Edge Of The Sound Barrier

Boeing gambles on speed with Sonic Cruiser
Roundhill also confirmed reports that an unnamed engineer had come up with a breakthrough that helped make the jet possible. He wouldn't identify the breakthrough or even the engineer.

Howstuffworks "How Sonic Cruisers Will Work"

Europe Hits Out At Boeing's Sonic Cruiser

The European Commission has accused the Boeing Co of risking environmental damage with its planned 'sonic cruiser', raising transatlantic tensions over how to combat climate change.

Environment Commissioner Margot Wallstroem said Boeing vice-chairman Harry Stonecipher has 'nonchalantly' neglected environmental concerns, adding that a one-hour time saving on a transatlantic flight is not worth 'a significant increase in carbon dioxide emissions'.

"Can it be true that you have brushed aside environmental concerns around new aircraft so nonchalantly?" Ms Wallstroem said in a letter to Mr Stonecipher released last Friday by the EU. "I find it hard to believe that anyone today could afford himself the luxury of a 'let's-not-think-about-tomorrow' attitude which runs diametrically opposed to the aims of sustainable development."

The European Union has clashed with the US on climate change after President George Bush rejected the Kyoto global warming treaty. At a meeting with Mr Bush last week, EU leaders said they will ratify the treaty by 2002 even without his support.

Aircraft emissions contribute about 3.5 percent of man-made gases said to cause global warming, and are expected to double over the next 10 to 15 years, Ms Wallstroem said.

Mr Stonecipher said there is 'plenty of fuel still around' and talked about an 'environmental bandwagon' in an interview with the Times of London, according to Ms Wallstroem.

The 15-nation EU and the US have also accused each other of failing to adhere to agreements limiting government help for commercial plane development.

At a meeting this month, EU Trade Commissioner Pascal Lamy responded to US questions about funding for the planned Airbus A380 'superjumbo' by asking how much support Boeing got from the National Aeronautics and Space Administration to help develop the sonic cruiser.

Sonic Cruiser completes wind tunnel tests - 2001-09-17 - Puget Sound Business Journal (Seattle)







Sonic Cruiser

  • Speed - 0.95 Mach (703 mph/1131 kph)
  • Engines - Twin 777-class
  • Cruising Altitude - 40,000 feet (13,000 m)
  • Range - 9,000 nautical miles (16,668 km)
  • Seating - 100-300


Concorde


  • Mach 2 (1,350 mph/2,172 kph)
  • 4 Rolls Royce/Snecma Olympus 593 (18.7 tons/17 metric tons of thrust)
  • 60,000 feet (18,300 m)
  • 4,067 nautical miles (6,200 km)
  • 100


747-400


  • 0.84 Mach (560 mph/901 kph)
  • 4 Pratt & Whitney PW4062 (63,300 lbs/26,945 kg of thrust)
  • 35,000 feet (10,668 m)
  • 7,325 nautical miles (13,570 km)
  • 416-568





Turns of Phrase: Sonic cruiser

BBC News | SCI/TECH | Water off a beetle's back


see your world from 132,000 feet

U.S. Naval Academy Alumni Association

IBM to build smaller supercomputer

News: Terrorism fears aid Iridium relaunch

Downloads

Earthlink Sucks

Thursday, November 08, 2001

ATM links

ATM's Resource List

Why binoculars?

Telescope

PS - eyepieces p1

The Taipei Times Online: 2001-11-08The Taliban are slaughtering Hazara Afghans who try to flee the country, gunning them down in cold blood, claim refugees who have made it to Pakistan.

Defectors Cite Iraqi Training for Terrorism

Friday, November 02, 2001

Mount Olympus - Navigation

BBspot - Justice Department, Microsoft Near Deal



...
The deal places the software maker under supervision by the US government for the next five to seven years, but allows it to maintain its software products as is. In return, the government has agreed to establish Redmond as a new state, and has offered Microsoft a controlling interest in both the Senate and the House of Representatives for the next five to seven years. In addition, John Ashcroft will receive $2 billion in cash and stock in exchange for harassing Oracle, Sun and AOL-TW for the next 5 years.

Attorneys General for the states also prosecuting the case said that they would oppose any deal that didn't protect the rights of consumers, however, for $3 billion dollars they "may reconsider their priorities."

President Bush was pleased with the news. "America must move ahead with the task at hand. Our country faces a great danger and with the help of Windows XP we can have an army of flying soldiers to help with the war on terrorism," said Bush.

Attorney General John Ashcroft dismissed criticism that the government was selling out citizen's rights to corporate America. "That's ridiculous," said Ashcroft, "I'm a citizen. Look how good of a deal I'm getting."

A recent poll showed that Americans were evenly divided on the issue. When asked what they thought of the Microsoft settlement half of Americans didn't care and the other half were worried about anthrax.

Wednesday, October 31, 2001

Monday, October 29, 2001

Geek.com Geek News - Linux security patches withheld from American coders

KAYA

Audrey Flack

ScienceDaily Magazine -- Physicists Advance Theory For New Class Of Quantum Phase Transition

ScienceDaily Magazine -- Gene-Rich Pufferfish DNA Decoded

Sarcosuchus imperator



The Nando Times: Scientists discover fossil of monster crocodile



Fossils Indicate. . .Wow, What a Croc!: Science News Online, Oct. 27, 2001



Huge fossil crocodilian discovered in Sahara Best Writeup





You WILL experience the Ninja Burger difference!

Common User Agent Problems

SiliconValley.com - Dan Gillmor's eJournal


Tim Berners-Lee on Microsoft's Latest Browser Tricks

Posted on Friday, October 26, 2001

Yesterday, Microsoft disabled use of MSN with many non-IE browsers. It was a clumsy move, and it has plainly backfired.

I asked the World Wide Web Consortium's Tim Berners-Lee for his views on the situation. Here are my questions and his answers (edited very slightly, such as putting in hyperlinks):

DG: What is your reaction to Microsoft's decision to disable non-IE browsers from access to MSN?

TBL: I have fought since the beginning of the Web for its openness: that anyone can read Web pages with any software running on any hardware. This is what makes the Web itself. This is the environment into which so many people have invested so much energy and creativity. When I see any Web site claim to be only readable using particular hardware or software, I cringe - they are pining for the bad old days when each piece of information need a different program to access it.

Cliff Notes - Custom Resolutions and TimingsHow to connect your PC to your Digital/HDTV
By Wayne Harrelson

Upgrading to eXtreme Performance


AMD's latest showpiece has been baptized Athlon XP, with XP standing for eXtreme Performance... It is no surprise that AMD's latest and greatest performs very well, as the Athlon XP is a higher clocked version of the same "Palomino" core found in the Athlon MP. As you read in our Athlon MP vs Pentium 4 Xeon shootout, the Workstation Battle Royal, the 1.2 GHz Athlon MP delivered stunning performance, outperforming Intel's 1.7 GHz Pentium 4 Xeon in almost all cases. In fact, the first AMD workstation processor walked all over Intel's best CPUs in current workstation software.

Thursday, October 25, 2001

BeOS

MSN.com rejects non-MS browsers


Oct. 25 — Users trying to access Microsoft’s MSN.com with a non-Microsoft browser are finding themselves locked out. While the software leviathan’s Internet Explorer easily reaches MSN, other browsers—such as Netscape Navigator, Opera and Mozilla—run into trouble.Staff writer Joe Wilcox contributed to this report.

Copyright © 1995-2001 CNET Networks, Inc. All rights reserved



Wednesday, October 24, 2001

New Scientist


Non-metallic magnet could be dream computer memory

19:00 17 October 01
Justin Mullins

A transparent, flexible magnetic material made from an exotic form of carbon could turn out to be the dream computer memory. The substance, which was discovered accidentally by a Russian physicist hunting for high-temperature superconductors, is the first non-metallic magnet to work at room temperature.

Tatiana Makarova, working at Umeå University in Sweden, discovered the material while experimenting with buckyballs, football-shaped molecules made up of 60 carbon atoms. By heating and compressing the molecules, she forced them to join together in layers like sheets of bubble wrap, because she thought these might be able to superconduct.

But to her surprise, she found instead that the new material was magnetic even above 200 °C. Until now, the highest temperature at which a non-metallic material was magnetic was -255 °C. This record was held by a different form of buckyballs.

Organic magnets could be important because they are much lighter than their metallic cousins. Also, Makarova's material is flexible and transparent, properties that could make it useful for storing data when a laser is used to record on it. It might also be possible to record data at unprecedented densities.


Mystery magnetism


Exactly why the material is magnetic is not yet clear. Makarova believes that unpaired electrons may play a crucial role, since they can sustain a magnetic field when their spins are aligned. One possibility is that the magnetism stems from buckyballs bonding in triangular groups of three.

"In this configuration, there can be unpaired spins," she says. Her team is currently comparing buckyball layers made in different ways to try to find out.

Robert Blinc, an expert on molecular magnets at the University of Ljubljana in Slovenia, says the work is a giant step forward. He says it is not yet clear whether the magnetic properties are uniform throughout the structure or occur in clumps. "But in any case it is extremely important," he says.

Journal reference : Nature (vol 413, p 716)


19:00 17 October 01

New Scientist Coral reef missing link found hidden in crevices

Tuesday, October 23, 2001

Israel: We Will Not Pull Forces


JERUSALEM –– Defying the United States, Israeli officials said Tuesday that they will not pull military forces out of six West Bank towns until they have crushed militant Palestinian groups responsible for attacks on Israelis.

In unusually blunt language, the United States urged Israel Monday to withdraw immediately from Palestinian territory and launch no more raids.

US strips Jewish army major of security clearance

'Bin Laden lieutenant' held in solitary


Manufacturer's Links at The Tandem Website - Tandem Bicycle Information - Tours, Travel, Equipment, Classified Ads, Online Magazine

Monday, October 22, 2001

Seti Logs






DateUnitsPercentile RankTotal UsersRankUsers at Rank
10/22/01302899.406%3325839197348
10/18/01300199.402%33203241986013

2001 Mars Odyssey Home Page1 day to arrival
Mars Arrival at 10/24/2001 02:30 Universal Time.

Saturday, October 20, 2001

Top sites for Microsoft Corporation

JC's Home Page


Anyway, I was wondering about what the most reliable server for websites might be, so I decided to consult the maker of the dominant commercial web server, Microsoft. I took a run over to the list of highest uptimes of web servers at microsoft's snail mail address. What did I find out? Microsoft's highest uptime servers
4 out of the top 5 high uptime web servers at Microsoft are Linux or BSD based.
10 out of the top 15 high uptime web servers at Microsoft are Linux or BSD based.
Everything from 15 on appears to be Windows 2000 based, hinting that Microsoft's Linux and BSD servers are all few in number, but in general tend to outperform Windows 2000 and IIS in terms of uptime. I believe that Microsoft is telling us through here that Windows 2000 and IIS are best for short term, non-business web servers, while BSD and Linux are much more optimal for critical environments where server life is of maximum import. I would like to thank Microsoft for this, as I was considering moving from Apache to IIS before I read this.
(Source: fyo)

Thursday, October 18, 2001



Search for Edward Gibbon on:  All the Web - AltaVista - Deja - Google - HotBot - Infoseek - Lycos - Northern Light - Yahoo




news.telegraph.co.uk


War on terrorism factfile - an introduction
(Filed: 27/09/2001)


THE events of September 11 were among the most horrific witnessed in modern times and their implications are potentially devastating.
This factfile provides a constantly-updated archive of events through the eyes of some of the Telegraph's finest writers, from the moment the planes struck the twin towers of the World Trade Centre to the present day.
It also brings together some of the most incisive comment and analysis, examining the implications on world relations, the financial markets and the way events have affected - and continue to affect - millions of innocent lives

news.telegraph.co.uk - Muslim makes bin Laden a laughing matter


Muslim makes bin Laden a laughing matter
(Filed: 18/10/2001)


SHAZIA MIRZA is fast becoming the world's most wanted Muslim woman. She is highly sought after because she tells jokes about Osama bin Laden.

As Britain's only Muslim woman known to be performing stand-up comedy, Mirza, 26, is becoming a favourite with comedy club promoters and radio discussion programmes.

Demand for the Birmingham-born comic is also now coming from two countries at the heart of international events: America and Pakistan.

In America, she has been asked to appear on Oprah Winfrey's television programme and take part in a benefit event to raise money for families of the victims of the World Trade Centre attack.

In Pakistan, where her parents were born, she is wanted for a one-woman show in Lahore. In another career boost, she collected a Young Achiever of the Year prize in this week's GG2 Leadership and Diversity Awards, which recognise success stories within the Asian community.

Mirza, who has been in stand-up comedy for little more than a year, wears a Muslim scarf when performing and speaks with a distinctive deadpan drawl. She says she is a moderate, devout Muslim, placed between two cultures and able to cast a critical, as well as a forgiving, eye on both.

"The whole point of my act," she said yesterday, "is to help reduce Islamophobia in Britain. The reason it took off was that no one had really heard what it's like to be a Muslim woman here.

"There were so many stereotypes. I talked about my life and I allowed people to laugh along with me." The white, male-dominated world of stand-up, so often inhospitable to women comedians, swiftly took her to heart.

"A lot of Muslim men think that it's not the place for a woman to stand on stage in front of a drunken crowd trying to make them laugh. But actually Islam gives women a lot of power.

"We're not all as oppressed as the women in Afghanistan. Just by standing on stage, I'm liberating women and some men clearly fear that means they'll lose the upper hand."

Since September 11, she thought no one would want to listen to her at all. "I cancelled gigs for a week afterwards and on the first night I went back on stage, there was so much tension in the air; people were scared to laugh.

"I could see everyone thinking, 'Is she going to address the situation?' It wasn't until two weeks later that I did. I came on and said: 'My name is Shazia Mirza - at least that's what it says on my pilot's licence.' They stood on their feet and applauded."

Since then, the former bio-chemistry student, who taught physics after leaving university, has expanded the amount of material she devotes to the crisis.

"You have to attack ignorance with humour," she said. "We're not all fanatics. I tell audiences how they can distinguish me from Muslim terrorists: they have bigger moustaches than I do."

She finds Osama "bin Liner" absurd, but the attempts to catch him farcical. "I was amused by comments made by his son that when he gets angry, he becomes invisible.

"He has led a ridiculous life. And now this one man has got the whole of the West running after him trying to get him out of a cave. It's quite funny when you think about it."

Prominent Muslim cleric denounces bin Lade


Prominent Muslim cleric denounces bin Lade
ISLAMABAD, Pakistan, Oct. 17 (UPI) -- A prominent Muslim cleric denounced suspected
terrorist mastermind Osama bin Laden Thursday and urged Afghanistan's Taliban rulers
not to risk thousands of lives for him.

"Bin Laden is not a prophet that we should put thousands of lives at risk for,"
said Tahirul Qadri, who heads the Pakistani Awami Tehrik Party.

Qadri, who has thousands of followers in Pakistan and abroad, also criticized the
Taliban for sheltering bin Laden and urged the Muslims to "see the difference between
jihad and acts of terrorism."

He is the first prominent Muslim scholar to condemn bin Laden and the Taliban so
strongly in public. His condemnation could help the Pakistani government defuse tensions
in Pakistan where a small but vocal religious group has launched a nationwide campaign
against its decision to back U.S.-led military strikes into Afghanistan.

"Bombing embassies or destroying non-military installations like the World Trade
Center is no jihad," Qadri said, and "those who launched the Sept. 11 terrorist attacks
not only killed thousands of innocent people in the United States but also put the
lives of millions of Muslims across the world at risk."

"Now the Americans are killing Afghans ... they may go for other targets too. Who
knows how many innocent Muslims will be killed because of those terrorists who attacked
the World Trade Center?"

While urging the United States to stop its airstrikes in Afghanistan, Qadri held
the Taliban rulers responsible "for the death of hundreds of innocent Afghans."

The Taliban, he said, should have handed over bin Laden and other suspected terrorists
to the United Nations or any other neutral international organization before the airstrikes
began. "They can still do it and save their country from further destruction," he
said.

Qadri, whose Pakistan Awami Tehrik emerged as a popular religious party in local
elections earlier this year, also acknowledged that the United States had provided
credible evidence about bin Laden's involvement in acts of terrorism.

"In the light of this evidence, the Taliban had no justification for continuing to
protect bin Laden. Why protect him? Is he a saint or a prophet? He is a man who himself
has admitted arranging car-bomb attacks on U.S. embassies. He is no saint."

Internet Telescope Exchange

The 7 Steps

Based on this, the “plan” for SEE is as follows:



(1) Find and secure the use of a piece of suitable property that is “wild” and rural enough to be challenging, but close enough to high-tech civilization to make development, along the lines of the “vision” stated above, feasible. (A 20-acre tract in Bastrop, Texas was selected and purchased.)


(2) Establish a homestead on this property -- that is, make it possible for one person, then more people, to live there


(3) Develop the property (and the community) ecologically -- this means with full knowledge and use of activities like recycling, composting, sustainable gardening, ecological septic and waste management, indigenous nutrients, etc.


(4) Concomitantly incorporate modern technologies such as hydroponics, aquaculture, aquaponics, alternative energy generation, Internet communications, etc.


(5) When and if we have developed SEE-1 (in Bastrop, Texas) to a point where it satisfactorily demonstrates these ideas, establish SEE-2 at a harsher, more desolate and challenging location -- then SEE-3 . . .


(6) and then to “near” space habitats on artificial satellites, asteroids, the Moon, and Mars . . .


(7) and then to “far” space habitats, envisioned, at this point, as continent-size space vehicles with millions of inhabitants and hundreds of diverse ecosystems, setting out on decades- (even century-) long voyages to other stars.



About YaBBYet another Bulletin Board.

Wednesday, October 17, 2001

Tuesday, October 16, 2001

Techweb > News > missing server > Server 54, Where Are You? > April 9, 2001

Computer Hangs After 49.7 Days (Q216641)

Affordable Space Flight

Jacqueline R. Salek

I will miss her.

Jackie R. Salek, 46, of San Marcos died Tuesday, Oct. 16, 2001 in San Marcos. She was born in Rockne on Jan. 24, 1955, to Steve and Vondell Probst Salek.

She was a 1973 graduate of Bastrop High School and graduated from Texas A&M University in 1984 with a bachelor of science degree in agriculture. She was employed by the Texas Parks and Wildlife Department in Austin.

Every holiday season, she helped out a Fantasia Flowers in Lockhart. She will be remembered for her love of nature and her care of homeless animals. She was preceded in death by her parents; infant sister, Noel Salek; grandfather, Ernest Probst; and lifelong friend Tory Lehman.

Survivors include her grandmother, Nora Probst of Rockne; sister, Terry Salek of San Marcos; uncle, Gordon Probst of Hope, Idaho; uncle and aunt, Lorene and Cliff Redus of Rockne; Jadwiga Salek of Warsaw, Poland; and five cousins.

Father Josef Musiol conducted the graveside service on Friday morning, Oct. 19, in Sacred Heart Cemetery Rockne. Deacon Roger Muehr assisted as a deacon.




Found another article about Jackie.

Posted: Oct 29, 2001

Two more people came back to Rockne to stay this past week in October 2001. Jackie Salek (daughter of the late Steve and Vondell Prosbt Salek and niece of Lorene Probst Redus & Gordon Probst) and Emma (Lehman) Mayo, sister of Irene Bauer, Linda Nolte, Lee Lehman and Clarence Lehman. Jackie and Emma, both natives of the Rockne community, were buried in Sacred Heart Cemetery, Rockne.
Smoky Stover, a treasured friend of both families, was present at the graveside service for Emma Mayo. We went over to talk to him and tell him that we had come in early from Virginia a couple times, especially to see him at parties at Lee' Lehman's Retreat Ranch. Lee sponsored the annual October party for Smoky and their many friends.
Smoky Stover and his Band also performed for the Rockne Historical Association Fundraiser in October 1993 at the Rockne VFW Hall.
AnnaLee invited us to the Peter Goertz reunion. We went and saw a lot of good people. Ate a lot of good food. Talked to babies that are now close to 50 years old with grandbabies of their own.
Life in Rockne - very full and busy!!!!!!!
- Kay & Del Goertz -
* Italics are editor's additions.


Jackie gave Dee and I a plant as a wedding gift, we still have it; it has grown and been re potted many times. It is now is three seperate pots.



Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
10/16/01298999.400%3316433198857

Saturday, October 13, 2001

Friday, October 12, 2001

Seti Logs





DateUnitsPercentile RankTotal UsersRankUsers at Rank
10/11/01297599.394%33075472118213

Project Drop Out, Tune In

SPACE.com: space news, games, entertainment and science fiction

Concrete Homes Welcome Home


HUBBLE TURNS ON MARS

Natural Origami: Identifying Genes In DNA Bases

Edward A. Villarreal. Powered by Blogger.

Labels

Total Pageviews