1. Each continent on the earth starts and end with same letter
2.The word Queue is the only word pronounced same as first letter
3.The earth we live in is the only planet in solar system not named after a God because human live here .
4.Elephant is the only mammal on earth which can not jump.
5.More people are killed by bees than by snakes.
6.More number of people are allergic to cow milk than other food.
7.Pure honey is only food which never spoils.Proved from Egypt Pharaoh tomb.
8.Most of the dust particles on your bed are from dead skin.
9.The longest flight in time recorded for a chicken is 13 seconds.
10.It is impossible to sneeze with open eye .
There once was a boy named Gimme-Some-Roy… He was nothin’ like me or you,
’cause laying back and getting high was all he cared to do.
As a kid, he sat in the cellar…sniffing airplane glue. And then he smoked banana peels, when that was the thing to do. He tried aspirin in Coca-Cola, he breathed helium on the sly, and his life became an endless search to find the perfect high.
But grass just made him wanna lay back and eat chocolate-chip pizza all night,
and the great things he wrote when he was stoned looked like shit in the morning light.
Speed made him wanna rap all day, reds laid him too far back, Cocaine-Rose was sweet to his nose, but the price nearly broke his back.
He tried PCP, he tried THC, but they never quite did the trick. Poppers nearly blew his heart, mushrooms made him sick. Acid made him see the light, but he couldn’t remember it long. Hash was a little too weak, and smack was a lot too strong. Quaaludes made him stumble, booze just made him cry, Then he heard of a cat named Baba Fats who knew of the perfect high.
Now, Baba Fats was a hermit cat…lived high up in Nepal, High on a craggy mountain top, up a sheer and icy wall. “Well, hell!” says Roy, “I’m a healthy boy, and I’ll crawl or climb or fly,
Till I find that guru who’ll give me the clue as to what’s the perfect high.”
So out and off goes Gimme-Some-Roy, to the land that knows no time, Up a trail no man could conquer, to a cliff no man could climb. For fourteen years he climbed that cliff…back down again he’d slide . . .
He’d sit and cry, then climb some more, pursuing the perfect high.
Grinding his teeth, coughing blood, aching and shaking and weak, Starving and sore, bleeding and tore, he reaches the mountain peak. And his eyes blink red like a snow-blind wolf, and he snarls the snarl of a rat,
As there in repose, and wearing no clothes, sits the god-like Baba Fats.
“What’s happenin’, Fats?” says Roy with joy, “I’ve come to state my biz . . .
I hear you’re hip to the perfect trip… Please tell me what it is. “For you can see,” says Roy to he, “I’m about to die, So for my last ride, tell me, how can I achieve the perfect high?”
“Well, dog my cats!” says Baba Fats. “Another burned out soul, Who’s lookin’ for an alchemist to turn his trip to gold. It isn’t in a dealer’s stash, or on a druggist’s shelf… Son, if you would find the perfect high, find it in yourself.”
“Why, you jive mother-fucker!” says Roy, “I climbed through rain and sleet,
I froze three fingers off my hands, and four toes off my feet! I braved the lair of the polar bear, I’ve tasted the maggot’s kiss. Now, you tell me the high is in myself? What kinda shit is this?
My ears, before they froze off,” says Roy, “had heard all kindsa crap; But I didn’t climb for fourteen years to hear your sophomore rap. And I didn’t climb up here to hear that the high is on the natch, So you tell me where the real stuff is, or I’ll kill your guru ass!”
“Okay…okay,” says Baba Fats, “You’re forcin’ it outta me… There is a land beyond the sun that’s known as Zabolee. A wretched land of stone and sand, where snakes and buzzards scream, And in this devil’s garden blooms the mystic Tzutzu tree.
Now, once every ten years it blooms one flower, as white as the Key West sky,
And he who eats of the Tzutzu flower shall know the perfect high. For the rush comes on like a tidal wave…hits like the blazin’ sun. And the high? It lasts forever, and the down don’t never come.
But, Zabolee Land is ruled by a giant, who stands twelve cubits high, And with eyes of red in his hundred heads, he awaits the passer-by. And you must slay the red-eyed giant, and swim the river of slime, Where the mucous beasts await to feast on those who journey by. And if you slay the giant and beasts, and swim the slimy sea, There’s a blood-drinking witch who sharpens her teeth as she guards the Tzutzu tree.”
“Well, to hell with your witches and giants,” says Roy, “To hell with the beasts of the sea–
Why, as long as the Tzutzu flower still blooms, hope still blooms for me.”
And with tears of joy in his sun-blind eyes, he slips the guru a five, And crawls back down the mountainside, pursuing the perfect high.
“Well, that is that,” says Baba Fats, sitting back down on his stone, Facing another thousand years of talking to God, alone. “Yes, Lord, it’s always the same…old men or bright-eyed youth… It’s always easier to sell ’em some shit than it is to tell them the truth.”
————————-Try every possible things——————————————-L
A VPN’s purpose is providing a secure and reliable private connection between computer networks over an existing public network, typically the Internet. Before looking at the technology that makes a VPN possible, let’s consider all the benefits and features a business should expect in a VPN.
A well-designed VPN provides a business with the following benefits:
- Extended connections across multiple geographic locations without using a leased line
- Improved security for exchanging data
- Flexibility for remote offices and employees to use the business intranet over an existing Internet connection as if they’re directly connected to the network
- Savings in time and expense for employees to commute if they work from virtual workplaces
- Improved productivity for remote employees
A business might not require all these benefits from its VPN, but it should demand the following essential VPN features:
- Security — The VPN should protect data while it’s traveling on the public network. If intruders attempt to capture the data, they should be unable to read or use it.
- Reliability — Employees and remote offices should be able to connect to the VPN with no trouble at any time (unless hours are restricted), and the VPN should provide the same quality of connection for each user even when it is handling its maximum number of simultaneous connections.
- Scalability — As a business grows, it should be able to extend its VPN services to handle that growth without replacing the VPN technology altogether.
One interesting thing to note about VPNs is that there are no standards about how to set them up. This article covers network, authentication and security protocols that provide the features and benefits listed above. It also describes how a VPN’s components work together. If you’re establishing your own VPN, though, it’s up to you to decide which protocols and components to use and to understand how they work together.
The next two pages describe two common types of VPN. We’ll start with the type that’s most synonymous with the term VPN.
A remote-access VPN allows individual users to establish secure connections with a remote computer network. Those users can access the secure resources on that network as if they were directly plugged in to the network’s servers. An example of a company that needs a remote-access VPN is a large firm with hundreds of salespeople in the field. Another name for this type of VPN is virtual private dial-up network (VPDN), acknowledging that in its earliest form, a remote-access VPN required dialing in to a server using an analog telephone system.
There are two components required in a remote-access VPN. The first is a network access server(NAS, usually pronounced “nazz” conversationally), also called a media gateway or a remote-access server (RAS). (Note: IT professionals also use NAS to mean network-attached storage.) A NAS might be a dedicated server, or it might be one of multiple software applications running on a shared server. It’s a NAS that a user connects to from the Internet in order to use a VPN. The NAS requires that user to provide valid credentials to sign in to the VPN. To authenticate the user’s credentials, the NAS uses either its own authentication process or a separate authentication server running on the network.
The other required component of remote-access VPNs is client software. In other words, employees who want to use the VPN from their computers require software on those computers that can establish and maintain a connection to the VPN. Most operating systems today have built-in software that can connect to remote-access VPNs, though some VPNs might require users to install a specific application instead. The client software sets up the tunneled connection to a NAS, which the user indicates by its Internet address. The software also manages the encryption required to keep the connection secure. You can read more about tunneling and encryption later in this article.
Large corporations or businesses with knowledgeable IT staff typically purchase, deploy and maintain their own remote-access VPNs. Businesses can also choose to outsource their remote-access VPN services through an enterprise service provider (ESP). The ESP sets up a NAS for the business and keeps that NAS running smoothly.
A remote-access VPN is great for individual employees, but what about entire branch offices with dozens or even hundreds of employees? Next, we’ll look at another type of VPN used to keep businesses connected LAN-to-LAN.
A site-to-site VPN allows offices in multiple fixed locations to establish secure connections with each other over a public network such as the Internet. Site-to-site VPN extends the company’s network, making computer resources from one location available to employees at other locations. An example of a company that needs a site-to-site VPN is a growing corporation with dozens of branch offices around the world.
There are two types of site-to-site VPNs:
- Intranet-based — If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect each separate LAN to a single WAN.
- Extranet-based — When a company has a close relationship with another company (such as a partner, supplier or customer), it can build an extranet VPN that connects those companies’ LANs. This extranet VPN allows the companies to work together in a secure, shared network environment while preventing access to their separate intranets.
Even though the purpose of a site-to-site VPN is different from that of a remote-access VPN, it could use some of the same software and equipment. Ideally, though, a site-to-site VPN should eliminate the need for each computer to run VPN client software as if it were on a remote-access VPN. Dedicated VPN client equipment, described later in this article, can accomplish this goal in a site-to-site VPN.
Now that you know the two types of VPNs, let’s look at how your data is kept secure as it travels across a VPN.
Keeping VPN Traffic in the Tunnel
Most VPNs rely on tunneling to create a private network that reaches across the Internet. In our article “How does the Internet work?” we describe how each data file is broken into a series of packets to be sent and received by computers connected to the Internet. Tunneling is the process of placing an entire packet within another packet before it’s transported over the Internet. That outer packet protects the contents from public view and ensures that the packet moves within a virtual tunnel.
This layering of packets is called encapsulation. Computers or other network devices at both ends of the tunnel, called tunnel interfaces, can encapsulate outgoing packets and reopen incoming packets. Users (at one end of the tunnel) and IT personnel (at one or both ends of the tunnel) configure the tunnel interfaces they’re responsible for to use a tunneling protocol. Also called an encapsulation protocol, a tunneling protocol is a standardized way to encapsulate packets [source: Microsoft]. Later in this article, you can read about the different tunneling protocols used by VPNs.
The purpose of the tunneling protocol is to add a layer of security that protects each packet on its journey over the Internet. The packet is traveling with the same transport protocol it would have used without the tunnel; this protocol defines how each computer sends and receives data over its ISP. Each inner packet still maintains the passenger protocol, such as Internet protocol (IP) or AppleTalk, which defines how it travels on the LANs at each end of the tunnel. (See the sidebar for more about how computers use common network protocols to communicate.) The tunneling protocol used for encapsulation adds a layer of security to protect the packet on its journey over the Internet.
To better understand the relationships between protocols, think of tunneling as having a computer delivered to you by a shipping company. The vendor who is sending you the computer packs the computer (passenger protocol) in a box (tunneling protocol). Shippers then place that box on a shipping truck (transport protocol) at the vendor’s warehouse (one tunnel interface). The truck (transport protocol) travels over the highways (Internet) to your home (the other tunnel interface) and delivers the computer. You open the box (tunneling protocol) and remove the computer (passenger protocol).
Thanks for visiting the CIS PET wiki. This is meant to be a list of free technologies aimed at empowering Internet users to gain better control over their data. It’s very simple to add an entry—just click the “edit” tab, copy and paste the previous entry, and substitute the name, description, and address.
- Abine – A Firefox / Internet Explorer plugin that blocks third party advertising networks, manages HTTP, DOM, and Flash cookies, and securely manages site logins. Currently in private beta, but invites aren’t hard to get. Abine Privacy Suite
- Ad Blockers for Browsers – Firefox: Adblock Plus Chrome: AdBlock Safari: AdBlock
- Anon email services – Send anonymous email awxcnx.de Email drop drop.io
- Anonymouse – A Web search portal hosted on an island off the coast of Somalia. This PET seemingly allows you to access any webpage without leaving a trace. (I tried MSN.com and found that Ghostery detected no web bugs.) Anonymouse
- aTube Catcher – Download videos and watch anytime and without needing to be online and thus frustrate tracking and monitoring aTube
- BetterPrivacy Firefox Plug In – Add on for Firefox that creates “super-cookie blocker,” including flash cookies and most DOM storage objects. BetterPrivacy
- BleachBit – BleachBit quickly frees disk space, removes hidden junk, and easily guards your privacy. Designed for Linux and Windows systems, it wipes clean 70 applications including Firefox, Internet Explorer, Flash, Google Chrome, Opera, Safari, Adobe Reader, APT, and more. BleachBit
- BugMeNot – Bypass many webpages requiring free registration with the click of a button. BugMeNot
- CCleaner – application for Windows. Analyzes and facilitates deletion of various items of data stored on your PC, including state management cookies (HTTP, flash and other), cached temporary Internet files, etc. CCleaner
- Certificate Patrol – Firefox plugin that saves SSL certificates of pages when encountered to act like SSH’s “known_keys” feature and alarm the user when the presented certificate is different from the usual one .
- Darik’s Boot and Nuke (DBN) – Free self-contained boot disk that securely and completely deletes the contents of any hard disk that it can detect. DBN
- Diaspora – the privacy aware, personally controlled, do-it-all distributed open source social network Diaspora
- Documents over HTTPS – View online documents over HTTPS, just enter web link after = GoogleDocs Alternatively upload document or enter URL through Zoho Viewer Note:ixquick and google search results do not provide direct links to view documents over https.
- Eraser – Secure data removal tool for Windows. (Open Source) Eraser
- FireGPG – FireGPG is a Firefox add-on which brings an interface to encrypt, decrypt, sign or verify the signature of text in any web page using GnuPG. FireGPG
- Freenet – Decentralized, censorship-resistant distributed data store which aims to provide freedom of speech through a peer-to-peer network with strong protection of anonymity. Freenet works by pooling the contributed bandwidth and storage space of member computers to allow users to anonymously publish or retrieve various kinds of information. Freenet
- Ghostery – Scans visited web pages to find web bugs used to track user behavior on the web. Ghostery, CIS Ghostery review (note: Ghostery has been purchased by a behavioural advertising firm)
- GoogleSharing – A system for anonymizing requests to Google services which don’t require a login. Consists of both a Firefox Addon and a free proxy. GoogleSharing
- Hosts file domain blocking – A slightly technical (but very easy) procedure that provides you nearly complete invisibility from all data aggregation engines of your choosing. The principle behind the technique is simple: you use your own computer’s local domain name information repository (known as the hosts file) to associate a privacy-infringing domain (ie, doubleclick.net) with an incorrect IP address – usually your own. See the following link for more details and resources, including a pre-made hosts file that takes care of most of the technical details for you. MVPS.org
- HTTPs Everywhere – A Firefox plugin that defaults supporting websites to HTTPs. HTTPs Everywhere
- I2P – Mixed-license free and open source project to build an anonymous network that other applications can use to anonymously and securely send messages to each other. Uses include anonymous surfing, chatting, blogging and file transfers. I2P
- IPREDator – “IPREDator is a network service that makes people online more anonymous using a VPN.” (Note: This service appears to involve a monthly fee. Added: it costs 50SEK/month – roughly $10) IPREDator
- Internet Privacy Forum – Reports on what a website can know about you just by visiting it. IPF
- Internet Proxy – Free internet web based proxy. Conceals your IP address from visited sites. Internet Proxy
- Ixquick – Metasearch engine that returns the top ten results from multiple search engines. Can be used over encrypted SSL/HTTPS and has a facility to view search results via it’s SSL/HTTPS proxy option. Ixquick was the first search engine to delete private details of its users–IP addresses and other personal information are deleted within 48 hours of a search. Ixquick also does not share its users’ personal information with other search engines or with the provider of its sponsored results. Ixquick Note: View docs over HTTPS Zoho Viewer or GoogleDocs
- Java Anonymous Proxy – Free, cross-platform proxy system designed to allow browsing the web with revocable pseudonymity. Java Anonymous Proxy
- JonDoNym – German-based software that encrypts and mixes Internet communications to render them anonymous. Fee based and slower free services available JonDoNym
- KeePass Password Safe – Open source password manager. KeePass Linux version KeepassX
- MelonCard – Removes you from a vast number of people search and people lookup websites (e.g. RapLeaf, MyLife, Spokeo) for free. MelonCard automates the process of removing yourself from these websites, sending forms, letters, and faxes on your behalf. The basic level of service is free with an option to upgrade for additional opt-outs (e.g. Intelius and ZabaSearch) and monitoring for your information. MelonCard
- Mixmaster – Type II anonymous remailer which sends messages in fixed-size packets and reorders them, preventing anyone watching the messages go in and out of remailers from tracing them. Mixmaster
- MyTube – A free script for website designers intending to use embedded videos, which is designed to prevent cookies from being sent to external sites or advertising networks unless the embedded video is actually played. MyTube
- NoScript – Firefox add on that protects against certain types of web hacks. NoScript
- OptimizeGoogle – Firefox add-on to enhance Google search results, remove click-tracking, ads, spam, enable Google over https options and more. OptimizeGoogle
- Password Generators (online) – Ultra High Security Password Generator GRC. Plus online password generators/hashers, using Master Keys that when remembered can be used to recover forgotten passwords! Password Hasher PwdHash Password Chart
- Panopticlick – A tool for measuring how rare/unique a browser configuration is. Rare configurations may function as fingerprints that allow websites to track the browser even if the user limits or deletes cookies Panopticlick.
- Peer Block – PeerBlock lets you control who your computer “talks to” on the Internet. You can block communication with advertising or spyware oriented servers, p2p activity monitors, even entire countries! They can’t get in to your computer, and your computer won’t try to send them anything either. Best of all, it’s free! Peer Block
- pidder – A host-proof service that lets you build an encrypted, private social network where you stay in control what data you wish to share and with whom. Includes encrypted messaging and password management. Free Base Edition. pidder
- Privacy Bird – Free software designed to automatically read full P3P privacy policies of websites and compare them to your personal privacy preferences, providing warning messages when a site’s policies do not match your own. Privacy Bird
- PrivacyBox – The PrivacyBox provides primarily for journalists, bloggers and other publishers the possibility to offer non-tracked (and also anonymous) contact forms. privacybox.de
- PrivacyChoice Opt-out – Gathers opt-out cookies from over 150 ad companies, with an optional Firefox add-on to preserve and automatically update preferences. Opt-out from all companies or opt-out selectively based on industry certifications and policy terms. PrivacyChoice Opt-out
- Privacy Collections – Users compilations of Firefox add-ons with a focus on Privacy 200+ “Privacy” Collections
- PrivacyFinder – Privacy-enhanced search engine allowing users to state privacy preferences and order search results based on how sites’ computer-readable privacy policies comply. PrivacyFinder
- Privatix Live-System – Free portable encrypted system on an usb flash drive or an external hard drive for safe editing and carrying along of sensitive data, for encrypted communication and anonymous web surfing. Privatix
- Privoxy – Privoxy is a non-caching web proxy with advanced filtering capabilities for enhancing privacy, modifying web page data and HTTP headers, controlling access, and removing ads and other obnoxious Internet junk. Privoxy has a flexible configuration and can be customized to suit individual needs and tastes. It has application for both stand-alone systems and multi-user networks. Privoxy
- Qubes – Open source operating system designed to provide strong security for desktop computing. (Under development) Qubes
- RefControl – Control what gets sent as the HTTP Referer on a per-site basis. RefControl
- RetroShare – Open Source cross-platform, private and secure decentralised communication platform. It lets you to securely chat and share files with your friends and family, using a web-of-trust to authenticate peers and OpenSSL to encrypt all communication. RetroShare
- Scroogle.org – A service that functions as a search-engine proxy, taking your queries, passing them to google, and returning the results to you without ever passing along any identifying information. The service claims to scrub its own logs after 48 hours. Scroogle
- Seeks – Open and social websearch infrastructure featuring anonymous nodes and proxies based on Privoxy. Seeks
- SpoofStick – An explorer and Firefox plug in that helps detect phishing attacks. SpoofStick
- Stealthier – A great new Firefox add on that can pause most online tracking activities. Stealthier
- Swipe Toolkit – The Swipe Toolkit from Turbulence.org features several elegant tools to educate users on what personal information is collected about them and how it is used. There is a tool that decodes your license info and another that calculate the value of your PII. Swipe
- TAILS: The (Amnesic) Incognito Live System – The (Amnesic) Incognito Live System (Live CD, Live USB) is aimed at preserving your privacy and anonymity, all outgoing connections to the Internet are forced to go through the Tor network, no trace is left on local storage devices unless explicitly asked. TAILS
- Targeted Advertising Cookie Opt Out – Sticky opt out for behavioral profiling in the form of a browser plug in. Non commercial verion BEEF TACO See: Firefoxers howl as (TACO) privacy add-on auto updates with ‘bloatware’ TACO (Abine’s Commercial version
- Tor – Free software implementation of second-generation onion routing, a system enabling its users to communicate anonymously on the Internet. Tor
- TrackerScan – Available as a Firefox extension or a bookmarklet (no download required), TrackerScan shows you ad companies present on any webpage, with summaries of key privacy policies, industry certifications, and opt-outs. TrackerScan
- TrackMeNot – Browser extension that helps protect web searchers from surveillance and data-profiling by search engines. Hides users’ actual search trails in a cloud of ‘ghost’ queries, using noise and obfuscation to significantly increase the difficulty of aggregating such data into accurate or identifying user profiles. TrackMeNot
- TrueCrypt – Free, open-source disk encryption software for Windows Vista/XP, Mac OS X, and Linux. Encryption is automatic, on-the-fly, and transparent. TrueCrypt
- User Agent Switcher – The User Agent Switcher extension adds a menu and a toolbar button to switch the user agent of the browser. User Agent Switcher.
- Vanish – Enhancing the Privacy of the Web with Self-Destructing Data (Under development) Proof of concept under development Vanish
- Vuze – Browser plug-in designed to reveal network management practices. Vuze
- Web of Trust – Firefox add on that warns users of risky websites. WOT
- WhatApp.org – Website that reviews apps for privacy and security. WhatApp?
- Wikileaks – Website that allows for the anonymous posting of documents. Wikileaks
- Yauba Privacy Safe Search Engine – World’s first Privacy Safe Search engine, with no cookies, no storage of personal data, and built in anonymising proxy for private surfing of third party websites. Yauba is the only search engine in the world that offers this level of privacy protection. Yauba’s searches across multiple categories of filetypes including websites, videos, image files, social networks, pdf files, powerpoint files, word files, and more. Yauba
There are also a variety of resources describing or otherwise devoted to privacy enhancing technology. Please add your favorite.
- Berkman Center – Harvard’s Berkman Center has put together this comprehensive report on the state of technologies that circumvent government monitored Internet connections. Circumvention Landscape Report
- CDT – The Center for Democracy and Technology describes the role of PETs. CDT
- EPIC – The Electronic Privacy Information Center has a very good list of PETs, not all of which appear above. EPIC
- ICO – UK Information Commissioner’s Office discussion of PETs. ICO
- Inside Facebook – Inside Facebook’s guide to protecting your privacy on Facebook. Facebook Privacy Guide
- LCNS – 2003 computer science book devoted to designing privacy enhancing technologies. LCNS
- Microsoft – Microsoft has put together a privacy education toolkit. MSFT Privacy Toolkit
- PET Awards – Annual award through IPC of Ontario and Microsoft for best privacy enhancing technology. PET Awards
- PRC – Privacy Rights Clearinghouse has assembled a list of info brokers and instructions on how to opt out of their activities. Opt Out List
- Privacy Resources – Consultant Marcus Zillman has assembled a variety of privacy resources, including PETs. Privacy Resources
- PrivacyChoice Index of Tracking Companies – A comprehensive index of companies involved in user tracking, including key privacy policies, industry certifications, tracking methodologies and opt-out specifications. Look up by company name or tracking domain. PrivacyChoice Index
- Radialpoint.net – User community around protecting yourself and your computer from spyware, viruses, and fraud. Radialpoint
- SSD – The Electronic Frontier Foundation has assembled resources around “Surveillance Self Defense,” including defensive technology. Surveillance Self Defense
Three Telling Quotes About ‘Very’
- Substitute ‘damn’ every time you’re inclined to write ‘very;’ your editor will delete it and the writing will be just as it should be. ~Mark Twain
- ‘Very’ is the most useless word in the English language and can always come out. More than useless, it is treacherous because it invariably weakens what it is intended to strengthen. ~Florence King
- So avoid using the word ‘very’ because it’s lazy. A man is not very tired, he is exhausted. Don’t use very sad, use morose. Language was invented for one reason, boys – to woo women – and, in that endeavour, laziness will not do. It also won’t do in your essays. ~N.H. Kleinbaum
If you enjoyed this, you will love:
- A Fabulous Resource for Writers – 350 Character Traits
- Cheat Sheets for Writing Body Language
- Show! Don’t tell. Avoid these 10 verbs when you write
At the end of the first half of our conversation, you were talking about space-based solar power for Earth. If we put a base on the moon, we’re going to need a good energy supply there too.
Could a Lunar Fuel Depot Jump-Start Human Exploration of Deep Space
There are plenty of alternatives, but there are plenty. One is taking a small nuclear reactor [to the Moon]. Another, which we show in our report, is to pick a polar crater as your site on the Moon, where you could have solar rays that track the Sun as it travels around the rim of the crater in a circle.
I’ve also had many discussions with NASA and other aerospace engineers about putting a small power satellite in lunar orbit and beaming the energy down. One of my clients is DARPA, which is doing a public-private partnership to develop Robotic Servicing of Geosynchronous Satellites. They recently announced that Space Systems Loral will be the commercial partner. So here’s an intriguing question: Could you assemble a small space solar power spacecraft in geosynchronous orbit [22,236 miles up] and then have it boost itself to lunar orbit to provide power to a lunar base?
Let me say the good stuff about it first. I think a lunar gateway is an obvious next step in an overall [lunar exploration] architecture. You need something in lunar orbit as a central transportation NASA has been planning a quite different kind of station orbiting the Moon, the so-called Deep Space Gateway. What do you think about it?