Researchers concoct self-propelled nano motor

Researchers concoct self-propelled nano motor

Researchers at UCLA and the University of Bologna have come up with a nano-size vehicle that can inch its way forward on sunlight and one day could, conceivably, be used to shuttle medicines or other small particles around.

The motor in chemical terms is a rotaxane, a mechanically interlocked molecule consisting of a ring trapped on a rod by bulky stoppers at both ends in the same way that rings are kept on an abacus. The ring in a sense serves as the foot. It is attracted to one end of the rod, called Station A, and moves toward it until it hits the stopper. The ring then moves to the second port of call, Station B, and moves toward it until halted by the opposite stopper. By alternating between Stations A and B, the ring pulls the whole contraption forward.

The attraction and repulsion is accomplished through electron harvesting. One of the ends of the barbell harvests an electron from sunlight and transfers it to Station A. When Station A contains an electron, the ring moves toward Station B. When Station A returns the electron to the barbell, the ring moves toward it.

A full cycle is carried out in less than a thousandth of a second, which means that the motor can operate at a frequency of 1,000 Hertz, according to the researchers. This is equivalent, using the car engine analogy, to 60,000 revolutions per minute.

“The kind of nanotechnology that will emerge from these nano motors still requires a lot of fundamental work. The nano motors are extremely sophisticated in their design,” Fraser Stoddart, UCLA’s Fred Kavli chair of NanoSystems Sciences and director of the institute, said in a statement.

Last year, researchers at Rice University showed off nanocars. These were propelled by external electric fields and did not generate their own energy, which the UCLA motor does. However, the Rice vehicles had moving molecular wheels.

Zombie network mastermind pleads guilty

20 year old Jeanson James Ancheta, of Downey, California., pleaded guilty in US District Court in Los Angeles to four felony charges for crimes, including infecting machines at two U.S. military sites, that earned him more than $US61,000, Assistant US Attorney James Aquilina said. Jeanson James Ancheta seized control of hundreds of thousands of internet-connected computers and rented the zombie network to people who mounted attacks on websites, served up pop-up ads and sent out spam.

Under a plea agreement, which still must be approved by a judge, Ancheta will receive from 4 years to 6 years in prison, forfeit a 1993 BMW and more than $US58,000 in profit and pay $US19,000 in restitution to the federal government to compensate for infecting the military computers, according to documents filed in the case.

He is scheduled to be sentenced May 1.

Trial postponed for doctor in tainted-blood case

Trial postponed for doctor in tainted-blood case

The trial of the ailing doctor at the centre of the tainted-blood scandal that left thousands of Canadians infected with HIV or hepatitis C has been postponed.

Dr. Roger Perrault, former national medical director of the Canadian Red Cross, is on trial for his alleged role in allowing the service to distribute tainted blood products to hemophilia patients in the 1980’s and early 1990’s.

Perrault, along with three other doctors and New Jersey-based Armour Pharmaceuticals Co., is charged with criminal negligence causing bodily harm and of being a common nuisance endangering the public.

As many as 20,000 Canadians contracted hepatitis C and more than 1,000 became infected with HIV after receiving tainted blood products in what became one of the worst public health disasters after receiving blood not screened by widely available, but unimplemented precautionary steps.

In May 2005, the Canadian Red Cross apologized and pleaded guilty to violating the Food and Drug Regulation Act by distributing tainted blood products between 1983 and 1990.

Why has America not done anything like this for it’s citizens? We need to prosecute here in America for our people that were infected with HIV and Hepatitis C ! And I will try my best to make sure it gets done by writing my Senators and Congressmen. After losing a great friend to AIDS I feel it is important to help him and his family get closure. I know I can count on all my friends to help with this and as soon as I locate the district attorney here I will post his contact information here. If there was a law passed { blood shield laws} that allowed a corperation to profit from the murder tens of thousands of American women men and children, and cause millions of more infections then lets find out all about it and all the informaiton regarding the passage of this law who was the sponsers the co sponsers of the bill, who voted for it, did the compaines involded in this mass murder donate money to the campaigns of any other sponsers or co sponsers ? Since we are dealing with public information this should not be hard to dig up anybody willing to help out with finding out this information contact me.

Fraud Alleged at Red Cross Call Centers

49 people have been indicted in connection with a scheme that took hundreds of thousands of dollars from a Red Cross program to put cash into the hands of Hurricane Katrina victims, according to federal authorities.

Seventeen of the accused worked at the Red Cross claim center in Bakersfield, Calif., which handled calls from storm victims across the country and authorized cash payments to them. The others were the workers’ relatives and friends, prosecutors said last week.

The Red Cross seems to always be in the headlines for miss using donated funds.After reading awhile back about the Red Cross tainted blood scandal and hearing about how many millions of people they infected with Hepatitis and AIDS via tainted blood I have decided to boy cott them. And do some charity work for people with infectious diseases.

Sony’s ‘rootkit’ CDs

News.com reports
Computer security companies had been predicting such exploit code in the wild for weeks, since an independent developer had exposed the presence of a “rootkit” tool on the Sony CDs. The rootkit technology hid the copy protection from view, but also left open a hole that could hide other software.

Virus writers quickly took advantage of that hole, modifying an old Trojan horse to take advantage of the powerful inadvertent shielding provided by the Sony software.

On Friday, Sony responded to the furor and announced that it will suspend production of CDs that contain this particular copy-protection technology and take a second look at its digital rights management strategy.

Antivirus companies are now offering a range of advice, and confusion remains about exactly what the software does and how dangerous it can be to a PC. Here are the basics that everyone should know about this potentially dangerous issue:

What is on the Sony CDs?

The CDs involved are loaded with a relatively new kind of content protection created by British company First 4 Internet. When a listener puts the album into a computer’s CD drive, it pops up a license agreement. If the listener accepts, it installs the copy protection rootkit onto the hard drive.

The rootkit element of the software is used to hide virtually all traces of the copy protection software’s presence on a PC, so that an ordinary computer user would have no way to find it. The software acts to limit the number of copies that can be made of the CD and prevents a computer user from making unprotected MP3s from the music.

What is a rootkit? Isn’t that something that virus writers use?

A rootkit is a powerful piece of software that takes over control of a computer at the most fundamental level. In computer terms, it establishes “root” access, which is similar to administrative access, instead of access for just an ordinary user. It can potentially prevent a computer user from detecting its presence or from performing certain tasks on their own PC.

Like most computing tools, this is not intrinsically a bad thing, but can be abused. Virus writers use these tools to help take over computers and hide the presence of their work