I finally got around to doing a thorough job on making my site look nice. The last go round was more that I didn't really feel like working on an elaborate template for my site and I just hodge-podged it together. Usually I just focus on the "under-the-hood" stuff, but this time I made it look good. When Di.fm remade their site, I decided I'd give mine an update as well. I copied their look, but I built it into my site on my own, but I doubt they'd mind since this isn't a commercial website and I'm not competing with them or anything. I figured it's only fair to give a link back to them so as not to plagiarize their look.
As for Di.fm, they have a nice variety of more upbeat music. (Techno, Chiptunes, Disco, etc.) I listen mostly to Chiptunes and Techno from them and I've used their site for many years now. It's all free, but you can pay to get rid of the ads they play and stuff. They have phone apps as well apparently.
Today I closed my Facebook, Google+, and Twitter (Not yet a part of PRISM) accounts and I plan on closing many more accounts once I can replace them with something from a company that doesn't spit out all of my confidential information to the government. If you're using a free email service, (Ex. Yahoo, GMail, Live/Hotmail, etc.) your information is reported to the government. Google Drive, Sky Drive, Skype, Google Voice, and others provide them with your personal documents, phone calls, voice mails, and more. Cell phone companies, namely Verizon, are also in the mix. (Phone calls, SMS, email, etc.) If it goes through a major company's server, it goes to the government. Even Google searches are fair game. (Use Duck Duck Go instead.)
What I'm telling you is just the beginnings of what the government's PRISM program is all about. This is actually part of Agenda 21/NWO and is very real. Mass media is also reporting on this in case you're a skeptic. (Check out Washington Post and ABC news.) Do your best to pull free and use less known services for those you really want to keep and close those you can do without.
Eraser doesn't like to install it's context menu in Windows 8, nor does it actually shred anything. I examined the code, but with it using the annoying MSI installer stuff, I ported it to Inno Setup which didn't like my messing with CLSIDs in the registry through it. Windows blocks that stuff for protection, but if setup programs should be running as Trusted Installer, why doesn't Inno Setup? Maybe only MSI can do that? Perfectly pointless as anyone can sign a package and deploy it with MSI to gain access to Trusted Installer as long as they know how to create an MSI. Maybe I'm missing something, but there are work arounds to run things as Trusted Installer. You can even log in as Trusted Installer if you want to.
Anyway, I couldn't get my installers to build and that's what's needed for entering registry keys of this caliber successfully for when you deploy a package. I'd have to write code to install it any other way and honestly I don't feel like it, mainly because I shouldn't have to. Inno Setup should run as Trusted Installer or have the option in it somewhere to do so. As that was annoying, I lost interest in getting around Windows 8's UAC annoyances by modifying the code.
Anyway, if you want something that works with Windows 8 and isn't a coding disaster like the used-to-be-famed Eraser project, you can use the free tools below. Also, getting help on the Eraser forums is out, as you can't post to them if you created a recent account apparently. Instead of posting your message, it calls anything you post, SPAM, and it refuses to let it be posted. I wrote a nice long message asking for help only to have it blocked. I couldn't PM it to a mod either, so I messaged it to a developer via FaceBook.
For shredding the recycling bin via command line (Use the batch file I made) you can use SDelete.exe: [[Link withdrawn - SDelete doesn't function properly...]]
I made the batch file able to process long paths that Recycling Bin uses and everything is nice and dynamic. By default the batch file is set to use 4 passes to wipe files. It uses DOD 5220.22-M, but it only deletes file data and not file names in free disk space. See more about SDelete on Microsoft's website.
GPG (Gnu Privacy Guard) is a derivative of PGP (Pretty Good Privacy) and is the most popular method of encrypting email messages for others to view. Below is a short and sweet tutorial on using GPG. I just got into using this myself and it was annoying for me to figure out how to use it while staying secure and making sure things work properly. Once you know how to use it, it's incredibly easy. It's just that most tutorials I've found were lengthy, confusing, or didn't actually function as a tutorial.
This tutorial will help you configure Thunderbird to use GPG. There's a way to do this with Outlook 2013, but as the Outlook Privacy plugin is only for 32bit Outlook and I have a 64 bit version, then I can't set that up. It won't find the keys and sometimes the plugin will load slowly according to Outlook and it gets disabled. If you have 32 bit Outlook, you can try that way, but Thunderbird is a free product and this method works well for me.
1.) Begin by following the instructions on the Enigmail Installation Guide and make the following changes while working with it. (See the next steps below) There are 3 pages to the installation and usage of the Enigmail product and it's dependencies. Be sure to click "Next" at the bottom of the page when you finish a page.
2.) You'll be installing the latest Thunderbird during the installation process, but the tutorial was targeting Thunderbird 2.0 and the link they have in the installation guide will point you to the proper version. (The newest version on the Mozilla site)
3.) While installing Enigmail, the install button mentioned on the bottom left of the add-ons window has now been removed. To install the XPI file, you'll need to click the gear icon in the upper right and click "Install."
4.) When configuring your keys, be sure to click the "Advanced" tab and then change it to RSA 4096. DSA is based on SHA1 or SHA512 and those can be cracked.
5.) You can use OpenPGP->Setup Wizard to choose your defaults for new messages. This can be run and re-run as many times as you'd like.
6.) Set your default encryption settings with OpenPGP->Default Composition Options->Signing/Encryption Options. This can be found on the menu when you compose a new message. (The menu for OpenPGP is different when you compose a message, from when you view it in the main window.) Keep in mind that you'll be asked if you want to use PGP/MIME as the default, but it's more practical not to. Not every client supports that and all it really does is encrypt everything as one instead of sending it all as separate encrypted parts.
HOW IT WORKS:
Just to make sure you know how the GPG system works, let me explain it.
1.) You acquire the recipient's public key through either a keyserver or an attachment from their email to you. If neither of you have a public key on a key server or you don't have access to their public key, just ask them to send you theirs and include an unencrypted copy of your public key on that email.
You add the attached public key they sent (or received via the keyserver by searching for their key ID) to your local keyring. Be VERY careful when searching by email address for the key. Email addresses can be forged in a public key, but the 40 bit (character) fingerprint is almost always different for the key. Keep in mind that only the last 8 bits are shown on the server which is a big reason for keyserver issues.) Know which one to grab. Key IDs can be manipulated. Take a look at this page on keyserver issues.
So, don't use keyservers unless you don't mind forgeries and mail interceptions. GPG is meant to secure your transmission, but keyservers open up your ability to decrypt anyone's intercepted message. By sending your key with the first message to the person you're talking to, the chances of having your email decrypted by a third party drops dramatically. This is because you need your private key to decrypt messages encrypted to your private key. So, if someone produces a forged public key and has a private key they used to decrypt it, then they will be able to decrypt the message and not the recipient.
2.) You send an encrypted (PGP) message that you've signed (using YOUR private key) to a person you haven't yet communicated with via email using THEIR public key. That message CANNOT contain an encrypted attached public key! The public key must be unencrypted or it can't be used. If you sent it in an email to the person already or you know they have your public key already, you don't have to send it again. It only needs to be sent one time.
3.) The message you just sent is encrypted with YOUR private key using THEIR public key which can be decrypted with THEIR private key.
4.) The recipient replies presumably with THEIR unencrypted public key attached and a message encrypted using THEIR private key. (Unless you already have their public key)
5.) You decrypt their message using your private key and reply to their message with your message and attachments fully encrypted by your private key for them to decrypt with the public key you sent them in your last message. The process continues without anymore key exchanges.
So, to sum things up:
Private keys: Sign messages, encrypt messages to the recipient's public key, and also decrypt messages that were encrypted to your public key.
Public keys: Are used during encryption to make a message only readable by the recipient who has the private key that created the public key.
I found this video and I plan on making use of this concept to build a much larger generator. When I finish making it, I'll post what I did, but the larger motors will run me $123 total, so I'm not sure when I'll get it done. I plan on using 3 pairs of AC motors in series in order to pool their output voltage. I'll just step the voltage down at the end in order to make it usable for outlets and such. This will in turn up the allotted current and make it a viable house generator.
So, how do you get "free electricity?" Well, you don't make electricity from nothing and motors do use energy to run, so it's not like you can use a motor to endlessly power another motor. You need something to continue supplying power. What do we know of that supplies endless energy due to the nature of the energy it supplies? Magnets. More specifically, permanent magnets. They stop supplying their energy, but it takes a TON of work to do that to them. At high temperatures (or in this case, high temperatures and conversion to electricity) they will loose their magnetic energy.
OK, so now we know that magnets have a substantial source of energy that can be harnessed for electricity. So, how do we harness that power? By using a coil (A coil is is a coil of wire and is a form of an inductor) we set the magnet nearby and the coil will draw the magnetism from the magnet slowly due to the nature of an inductor. (It acts like a magnet when it's charged up.)
If you add that coil to the motor setup, you're in fact feeling the magnetic energy (converted to electricity) into the electricity being produced by the output motor. Those two combined together can power both the drive motor turning the generator motor and due to the magnet, it will have enough power left over for other loads. (Things you plug into the circuit.)
So, now, let me show you the video on how it all works in this guy's proof of concept video.
Here are the motors I'll be using when I can afford them.
As I'm a scientist, I like to make sure my theory is correct before investing in materials for a project, so if you know of any further information that can be used in my project, please post a comment or send me an email. I'd especially be interested if you know what a good amount of neodymium would be or if you know of a more efficient type of magnet that can supply more energy and stay low priced. Neodymium has a large amount of energy in a smaller footprint. That's what makes them unique.
1.) I want to know what happens if we catch the magnetism from the motor coils with another coil and attach that coil to the magnet supplying the energy. Could we also catch the heat output to cycle that back through? Would those both catch the energy dissipated and extend the generator's life exponentially leaving only the drop of energy used in mechanical consumption?