Pete_C

Windows Experts
  • Content Count

    1675
  • Joined

  • Last visited

Posts posted by Pete_C

  1. I wouldn't say nuclear power is a dead end, it is one of the best and safest alternatives.

    If it had not been for the anti nuke movement in the seventies we would not now be so heavily reliant on coal for electric generation.  In reality more radioactive elements have been spewed out by coal fired power plants than were spread by Chernobyl and Fukishima combined.   Had we continued with development of thorium reactors (we had a test unit back then but it was canceled) we would have a very safe and stable source of nuclear power which does not require isotopic separation like pressurized water uranium reactors.  Nor do they produce any where near as much radioactive waste (the process carries on to completion rather than dieing off with much of the fuel unburned).  They are also safe from "melt down" in that they require containment of the salt in contact with an 'activator" for the reaction to proceed. If cooling fails it is very simple to have a  plug that melts and pours the liquid salt out in a catch basin where it solidifies very rapidly and the reaction grinds to a halt.

     

     

    I doubt that the  research the Navy was conducting was wide knowledge. It was classified research in their nuclear propulsion and weapons labs.  The physics community was split as to whether this technique could be figured out or if it even really existed.  Much of the research failed to be duplicable because until the NRL discovered the final variable equations did not accurately describe what was happening and because the final variable was unknown it was often incorrect and prevented the process from proceeding.

    This was the case with Flieschman and Pons and their "discovery of cold fusion"  they actually did it back in the seventies, but even for researchers who did duplicate their results, they might try again the next day and be unable to do it again.  Now we have it all mathematically modeled and the final variable identified and controlled and it works like a charm.

     

     

    I suspect that once Google Planetary Ventures and Elon Musk SpaceX have captured their first asteroids for mining they will turn their attention towards mining Helium3 from lunar dust and returning it to Earth as a power source in both hot and cold nuclear fusion plants.

  2. Some of you may recall that I had said at G4 that there was a solution to the problem of Nuclear waste.
    This process known as the Oppenheimer Phillips process or LENR (Low Energy Nuclear Reactions) was known since the fifties but only recently had the final variable in the equations been identified and solved (by US nuclear weapons researchers).
    Well it appears that they have actually done something with it.

    http://coldfusionnow.org/transmutes-radioactive-wastes-now-u-s-navy-and-lenr-energy/

     

     

    The United States of America Navy LENR energy patent is noteworthy. The transmutation of radioactive waste to benign elements through LENR low energy nuclear reactions is of global importance
    Global Energy Corporation is utilizing the LENR nuclear waste remediation technology developed at SPAWAR. Lawrence Parker Galloway Forsley of Global Energy Corporation along with JWK International have worked with SPAWAR developing this technology for decades. Following many years of research and development the Navy patent was filed in 2007.

     

     

    Implications?
    I see this as a potential break through for Nuclear Power generation.
    First, it gives a method of dealing with the spent fuel rods and other contaminated material. Once they get a pilot plant built and processing spent fuel rods it removes one of the major objections to nuclear power (the other can be solved by switching from pressurized water Uranium reactors to liquid salt Thorium reactors - LIFTR technology).

    The nice thing about this technology is that it does not require separating out individual radioactive isotopes.  Each isotope will have a narrow "cross section"  to which the device must be tuned to interact.  Any other isotope will be unaffected. Hence they could just treat  contaminated material or spent fuel by tuning to first one isotope and processing until the reaction halts, then changing the settings to deal with another.

     

    The other interesting implication is that Cold Fusion using Deuterium and Helium 3 becomes practical.  The only drawback is that Helium 3 is rare on Earth, but it is plentiful in lunar dust.  This reaction would create Helium 4 and a high speed proton. Nice since the energy of the proton can be harnessed directly using electromagnetic forces (Magneto Hydro Dynamic energy conversion) to convert it to electric potential at a very high efficiency (with little waste as heat ).

     

     

     

     

     

    http://projectavalon.net/forum4/showthread.php?61046-US-Navy-Releases-Cold-Fusion-and-Transmutation-Patent--breaks-down-radioactive-waste-
    Lots of technical details there.

  3. http://www.im-infected.com/virus/urlmal-virus.html

     

    URL:Mal virus is a generic detection for malicious URL or web page. The detection of URL:Mal covers web site that is infected with virus, Trojan, and other types of malware. The same will also pop-up if a harmful Java Script file is spotted on the web site.

    This detection by Avast Antivirus that recognizes risky web site warns computer user in advance. It impedes the malware from infecting the computer. Thus, URL:Mal represents the dangerous web address and not the type of virus that exists on that location.

     

     

    Generally when you get this in a cached file as you have it means that after you visited the site (it was safe at the time of visit) the site itself has been hacked or one of its ad servers has. IT does not mean that your computer is infected.

  4. He had a clearance in order to know about  and work with this information.

    That means he signed a non disclosure agreement and was warned of the consequences of disclosing any classified material.

    There are paths available if he felt that the program was doing anything illegal, but they do not include disclosing classified material to the public or foreign nationals.

    He committed the crime of espionage and deserves to be punished to the fullest extent of the law.

     

    The activities of the NSA were approved by Congress when they passed the Patriot act and followup legislation. They were approved by a court set up to review such activities.  They were approved by the supreme court.  Those Senators and Representatives with appropriate clearance were briefed on and aware of these activities.

     

    Anyone who paid attention and read the language of the Patriot act, or even just read what others warned about knew that this was a potential consequence. 

     

    But none of that gave him immunity to ignore his NDA, and violate national security.

  5. Modern and clean.

    At first I wondered if I was not logged in or something, then I realized things had been updated.

    Good job on a smooth transition.

    Might have to change my "no squint" settings as it seems that some of the layout sizes changed.

    Looks like 120% zoom with 100% text blows out. Gonna change them to 100% and 150% text zoom.

     

    Yes much better there. Works out perfectly for me at 100% page zoom with 150% text zoom.

     

    I like the "recent" section on the upper right. Makes it simple to check what's up.

    Nice job.

  6. Well with government austerity and cutbacks they cannot afford the experts they need to solve crimes like this. It is good to know that Microsoft stepped up and took on the burden and that the FBI was willing to accept the help.

  7. Microsoft says that rumors of non backward compatability are false rumors designed to impact their sales. They also said that the rumors of single install are also false.

    Remember they still have competition and do not want to alienate loyal fans.

  8. My condolences for your loss. Few people live to 93, hope she gave you some tips

    From the few people that old I know I think the most important thing is staying mentally active and having a hobby to occupy your free time. Interestingly few of them seem to watch much TV, but that may well be due to their early years being TV free.

    Good to see you still around.

    Have a nice day.

  9. Okay, often when you have a problem uninstalling something the simplest fix is to download and install it again, then uninstall it.

    This way damaged or missing registry entries and install logs needed by the uninstaller are present.

    The other possibility is that it was indeed uninstalled but the uninstall entry is still there.

    http://support.microsoft.com/kb/310750

    I normally just use Add / Remove programs cleaner

    http://download.cnet.com/Add-Remove-Program-Cleaner/3000-2096_4-10572853.html

    Cautionary note, use this on programs that have been removed or where the entry is causing a problem with installing a new version; once you run it the entry is gone and you may find that the only way to uninstall the program is to reinstall it first.

  10. http://answers.microsoft.com/en-us/windows/forum/windows_7-system/blue-screen-with-this-error-code/03276fa2-6dcb-44d0-a778-499d5d00b65d

    The error code KERNEL_DATA_INPAGE_ERROR STOP: 0x0000007A states that the requested page of kernel data from the paging file could not be read into memory. It appears that there are some issues with the hard disk.

    Use check disk command for any errors on hard disk -

    Warning: Microsoft does not recommend interrupting the CHKDSK process. Microsoft does not guarantee the integrity of the disk if the CHKDSK program is interrupted. For safety you can back up your data before using the check disk command.

    Use the check disk commands as follows:

    1. Click Start.

    2. In search window type 'cmd' and ENTER. Right click and select 'Run as administrator'.

    3. Type at the command prompt CHKDSK /P and press ENTER to scan the disk.

    4. Then type CHKDSK C: /F /R and press ENTER to repair corrupt sectors, if there are any.

    NOTE: The root drive has to be C: and the command may schedule a task at the system startup, if it does, then press Y to schedule a task and restart the computer to perform chkdsk.

    Once chkdsk completes, boot to the desktop and then check.

    You may refer to the below mentioned link for more details -

    http://msdn.microsoft.com/en-us/library/ms793989.aspx

    Hope this helps. Let us know the results.

    Thanks,

    Meghmala – Microsoft Support

    Note that chkdsk /p is only available in recovery console, not when you are booted to windows

    http://en.wikipedia.org/wiki/CHKDSK

  11. Other than avoiding total crap ones, My advice is that whatever you buy it is obsolete before you get out the door.

    So don't sweat it too much, get what does what you need on your budget.

    Do not overlook "refurbished" units, they are in general unused units, which a major retailer did not sell before the new model came out. They are then returned to the manufacturer for credit on the next shipment of the new model. Under Federal law, they can no longer be sold as new. They must be unboxed, inspected, tested (and this means every one, unlike new units where you are lucky if one in a hundred is actually tested), and repackaged in a box labeled refurbished.

    Wife bellowing, have to go.

    She wanted me to uninstall / reinstall her facebook games. Amazing how frustrated some people get when something free and of no value fails to work.

    Darn, where did I see the list of top ten PCs to buy.

    I think they concluded that the most reliable one was to buy a Mac and run windows on it (not as easy as it sounds but doable).

    Ah that was all I needed to remember to find the article

    http://www.zdnet.com/want-the-most-reliable-windows-pc-buy-a-mac-or-maybe-a-dell-7000014469/

    Also now, Laptops are no longer an expensive alternative which appeals to students and businessmen; they are more and more reliable replacements for the bulky PC if you do not plan on component changes.

    Remember, if you opt for windows 8 that it was really designed for the touch screen / tablets so if you are opting for a standard PC try to get one with windows 7.

  12. Remember the Steve Martin movie "The Jerk" where he invents a thing called "The Opti Grab" which messes up everyones vision (makes them all cross eyed)

    Hmm, can't get insert media link to work

    Okay that was it, just had to close the tab with the link chuck posted. Odd.

    ku-medium.jpg

    No that is an idea, people could start posing in various locations with their eyes crossed, they could call it "Jerking"

  13. Can't help you there. I have not used Youtube to upload any of my vids (I really should) I put them on Photobucket.

    There is a guy who does great stuff with a GO PRO HD and posting them on Youtube on the Dogsnharmony site I belong to. I know a couple folks there who always seem to post short videos, but he does some really long impressive edits with fades and music and all.

  14. Hi Dragon. Who were you on G4?

    Most of the OT crew is hanging out at Mike's (Mlegg) forums, the more tech oriented folks hang out here.

    There are a couple of other forums started by AOTS and Xplay fans.

  15. Ditto that, I am glad to see he passed away at the hospital and did not die alone in his cabin.

    After the last time (when he was discovered unconscious in his arm chair by the UPS man) I worried that he would die alone and they would discover the body months later. He was a very private person who was married to his career.

    If I recall correctly he was a diabetic (which explains the coma incident, low blood sugar or high).

    I signed the guestbook.

  16. http://mashable.com/2013/03/27/biggest-cyberattack/

    A cyberattack originally targeting a single company is now being described by experts as one of the biggest Distributed Denial of Service (DDoS) attacks in Internet history. The assault, which recently began impacting elements of the Internet's physical infrastructure, has been dragging down Internet speeds

    ...

    The computers involved in DDoS attacks have often been previously infected with malware that gave a hacker control of the machine without the legitimate owner's knowledge. Hackers use malware (often sent via email spam) to amass large networks of infected computers, called "botnets," for DDoS operations and other purposes.

    ....

    These attacks, however, have evolved into a complex and ferocious beast, pointing up to 300 gigabits per second at an expanding list of targets.

  17. The reality is that the North Korean internet has very limited connectivity to the outside world. They do not want anyone , government trained computer specialists included, finding out what the outside world really is.

    The last big "hacker attack by the North Koreans" against some South Korean banks turned out to be that they were running a free version of AVG and had not updated it in months and they caught a virus when an employee was surfing porn on company time and it spread throughout the network.

  18. I would try the icebox method

    Remove old drive

    Do a clean install on new drive

    Take old drive and place it in an external enclosuer.

    Place this in a zip lock bag with a cooler gel pack, small slits to let the power and data cable through

    seal with duct tape.

    Place in freezer overnight.

    Then connect it to your computer, and copy what you can to a "recovery" folder on your new drive.

    You can worry about taking possession of etc later.