Everything posted by OyaYansa
-
The rush for bitcoins mining due to the high price achieved by the po[CENSORED]r criptomoneda has led manufacturers of electronic components and equipment like Asus to launch specific products for this task, proof of this is this new motherboard to mine bitcoins and other criptomonedas With support for 19 GPUs. This new plate is specifically designed for coin mining, and updates the previous Asus Mining-P106-6G and Mining-RX470-4G models by being the first to integrate this number of ports. The main feature of this new B250 Expert Mining Motherboard are the ports for 19 video cards (GPU) with which it counts. The rest of its benefits are also focused on the mining of criptomedas like Bitcoin: three independent ports, automatic detection of the state of the GPU, a BIOS optimized for mining and 19 solid capacitors for voltage stabilization, as explained during the presentation Which took place last weekend. The new Asus motherboard to mine bitcoins has a support for 19 Graphic Processing Units or GPUs and seeks to make miners the simplest process of encrypting coins. It achieves this thanks to the integration of all the tools in one, not being necessary to acquire new accessories. That is, the B250 integrates all GPUs. The 19 ports are divided into 3 groups, making it possible to connect to three power supplies (separate ports) at the same time. This connection can be monitored by the BOS, which will inform if there is an error with the cards. The B250 Mining baseplate to mine bitcoins and the other criptomonedas has a B250 chipset with an LGA 1151 socket that supports Intel processors of the 6th and 7th generation, has up to 32 GB of dual channel DDR4 RAM with 2400 MHz and A 6-stage DIGI + VRM for optimum CPU stability, and 3 slots for hard disks, USB 3.0 and 2.0 network, HDMI and audio. If you are looking for other alternatives to the Asus 19-CPU motherboard to mine bitcoins, the Gigabyte H110-D3A (with 6), the Biostar TB250-BTC (12 units) and the ASRock H110 Pro BTC + (with 13 GPUs).
-
Photoshop is the image editor par excellence. That's why almost every photo enthusiast finds one of the most useful and complete software for image processing in the Adobe program. Anyone who engages in the world of image or graphic design must master the program, being an essential tool to carry out their work. That's right, you do not need to be professional to learn how to use Photoshop; You can also use the program for personal uses, becoming a professional in editing images. Fortunately there are many free pages to learn how to edit with Photoshop, here are some of the best options: * Adobe Photoshop Tutorials: Adobe makes available to users a wide range of videos and tutorials to start using Photoshop and refine the technique with more advanced lessons. * GCF LearnFree.org: This page offers the 10 most important lessons to start using the program, along with some extra activities as a test to evaluate your knowledge. They are aimed at beginners. * Photoshop Essentials: Also designed for beginners, this page starts from scratch, even getting to teach you how to open an image in the program; Also reveals many fun editing tricks. * Tuts +: Here you can find more advanced lessons for Photoshop and tricks to make more specialized content. For example, the latest content that is offered is "how to create a vintage text in 3D" or "how to create a poster inspired by the movie Origin". * Trevor Morris Photographics: The interesting thing about this page is that it reveals some keyboard shortcuts for Photoshop, which will allow you to edit images much faster. * Floqq: Here you will find a course to learn Photoshop in 30 days. It contains 30 lessons and 32 videos. * Sleek Lens: This blog does not only offer tutorials, but publishes tips to give interesting effects to your images with Photoshop, among other tricks. Also, share tips to get better photos. * Photoshop café: Your video tutorials explain well how to perform some of the most used functions of Photoshop.
-
Sharks do not usually come to places where there are large crowds of people, but sometimes attack solitary bathers or surfers. Several shark attacks have already been reported on Australian beaches this year, so authorities are studying different measures to prevent sharks from approaching people. The most classic is to surround the beaches with nets, but ecologists argue that they damage the seabed and kill hundreds of fish, turtles and other animals. That is why more technological solutions are being tried, such as the use of artificial intelligence drones to detect sharks and warn bathers. Next September several of them will patrol the Australian beaches. Sydney University of Technology, in collaboration with the manufacturer of drones Little Ripper Group, have developed a dron equipped with artificial intelligence that is able to detect sharks. The artificial intelligence software has been trained with hundreds of photos and video of real sharks captured from the air, because it is the vision that will have the dron when the sea is flying. With this information, the dron is able to distinguish sharks from other marine creatures, such as dolphins and whales, as well as bathers and boats. When the dron detects a shark it sends a warning to a security operator, who can implement the measures he deems appropriate. But the role of the dron is not limited to observe. Carry a small lifeboat and a position stick, in case a bather is in trouble and needs a place to climb. It also has a megaphone to warn people nearby that there is a shark nearby. Little Ripper Group is developing an electronic shark repellent that will be incorporated into the drone and will drive away the animal through electric currents. As we have said, the first drones guarding the sharks will be operational in Australia next September ..
-
When the Chromebooks were born many people doubted their existential reason and that they were going to work well in a professional environment due to its few characteristics and its initial applications vague. However, over the years things have changed, not just Google itself, but other technology companies try to have their own Chromebook product in a market where you have to be. Perhaps the turning point was when access to the Google App Store was released from most Chromebooks, making the apps possibilities almost infinite. Now a recent addition to Chrome OS Canary today can make life simpler: direct access to the latest files on Chromebooks in two clicks. In a next update for Chromebooks will enable a folder on the desktop that will give us direct access to all those files we have recently used for our professional work thus facilitating access with the consequent time savings. This is a very simple feature that today have no Chromebooks and is already being applauded from the community. It seems that the new features of Chromebooks, such as the inclusion of footprint sensor or the bet by screens of maximum resolution, augur well health of this market niche that is becoming more profitable and demanded by students and everything Type of professionals.
-
Do you often use apps to order a taxi? If your answer to the question is yes, be very careful: Kaspersky Lab experts have detected malware for Android that pretends to be such apps. It is a Trojan called Faketoken.q and has the ability to steal bank details and spy on victim communications. The Trojan Faketoken is an old acquaintance of security researchers and has been discovered for years. The updated version that has been detected now has new features that were not available in the original malware and that make this threat Experts believe that the virus is distributed through SMS with an image to download. Once installed on the terminal, the Trojan remains hidden and begins to monitor everything that happens in the system. It is prepared to spy on all communication and usage habits of the victim: detects and records calls, logs the most used apps, intercepts and hides all messages, etc. The operation of Faketoken is as follows: the Trojan is passed through the taxi reservation application interface, but you can also do it with other apps that request the introduction of a bank card as payment method, including mobile banking applications, Booking flights and hotel rooms, and even Android Pay or Google Play Store. To capture the financial data, it asks the victim through the app he / she overrides, and since it records the calls and intercepts all the messages, it also obtains the passwords and codes that are sent by these means. Fortunately, the number of attacks detected by Kaspersky Lab security researchers is very small and they have only seen it on Russian territory, so they think the Trojan is still in the test phase. However, do not let your guard down, as the initial phase can start at any time and can be extended to other countries of the world very easily.
-
Fortunately, we are increasingly aware that recycling helps to conserve the environment and we play our part to stop climate change. Although we already have practice in separating the waste, surely on more than one occasion you have had doubts about where to discard a product. In order to always know what container the waste we have to go, a team of engineers from Cambridge Consultants has developed a system that uses artificial intelligence to identify waste. In this way, the new smart home appliance solves the doubts that can arise to the user in a matter of seconds, preventing the throwing of wrong products. To identify the different waste materials, the new container designed by the corporation uses a technology of image recognition that combines machine learning and machine vision. Thanks to this, it is able to detect, for example, the differences between a recyclable paper cup and a biodegradable compostable cup. In addition, its developers ensure that over time the system can be trained to identify and recognize new items and materials. Once the smart container knows what type of waste we want to discard, the section in which we have to throw the article lights up with a green light. It also has authentication options that allow the user to be identified through an application for the smartphone. In this way, each person can be rewarded in some way every time they recycle, for example through a ranking of points with badges, coupons that can be exchanged for products or similar strategies. Cambridge Consultants believe that this smart recycling point is especially recommended for brands to show their commitment to recycling in their offices and business premises. It considers that its installation can help to promote the separation of the garbage in these surroundings, where by ignorance or by lack of suitable containers the index of recycling is situated between 40 - 45%.
-
Check your inbox carefully because it is possible that a fake invoice attempts to infect your computer with malware. The Office of Homeland Security (OSI) of the National Institute of Cybersecurity (INCIBE) warns that a new campaign has been detected that uses this strategy to deceive the victims, causing them to download and execute a malicious attachment. The mechanics do not differ much from other attacks of similar characteristics that we have seen in the last months. Cybercriminals spread malicious emails that have attached an Excel document with XLS extension or a compressed file in ZIP format. In all detected samples the files are named with sequences that combine numbers and letters, for example 08.2017_FACTURA.zip or FACV201700005155.xls. The text of the message is very brief and, unlike other spam campaigns, is well drafted. In all the versions that have been detected the only thing that says is that the requested invoice is attached. The Excel file that is attached in the email pretends to be a conventional bill, but the data does not seem to load properly. At the top the user is instructed to click on the Enable content of the security warning button. The document contains macros that execute malicious code on the PC, so they install malware in case the victim enables the macros. The OSI has performed a virus analysis with Virustotal and it is a Trojan. To avoid being a victim of this type of attacks, always distrust that you receive an unsolicited email and in no way download the attachments sent by an unknown sender. If you detect unwanted communications delete them directly without opening them, and try not to enable macros in Microsoft Office programs, as they could infect your computer with malware.
-
Bad news for the players. The price of AMD Radeon RX Vega graphics cards increases in the absence of stock. This August, three different models of this series have been launched: Radeon RX Vega 56, Radeon RX Vega 64 Air Cooled and Radeon RX Vega 64 Liquid Cooled Edition. However, in a few weeks a serious problem has already been detected: the units of these microprocessors that are on the market are not enough. The direct consequence is a noticeable increase in the cost of the new AMD Radeon RX Vega graphics. The mining boom, problems in production or in manufacturing are some of the causes behind this situation. The new Radeon RX Vega graphics cards from AMD have been available for a few weeks now. But the real demand has exceeded the expectations of the company. What has happened is that we launched the product and the demand was really huge. We are now focused on restocking and encouraging our partners to sell at the recommended prices, which are the ones we announce, "said Gerald Youngblood of AMD. Why the new Radeon RX Vega graphics from AMD increase. On the one hand, it points to the importance that is acquiring coins encryption; While on the other hand, they point to the difficulty of the packaging process and the problems with the manufacture. It is the law of the market that when there is a lot of demand for a product but its supply is not enough, the final cost of the product goes up. And that's what's happening right now. The multinational, the sales leader, is aware of this situation, and despite the attempts it claims to be making to replace them, the new AMD Radeon RX Vega cards only increase its price exponentially. So much so that they are getting to sell above the 1,000 dollars in some points of sale. But how is it possible if they leave with a fixed price marked by the company? The company can not control the price at which its products are sold at the same time as there is an increase by the retailers to obtain a profit margin on each sale. Everything points to the solution is to introduce more stock of these graphics cards. AMD noted that the price of Radeon RX Vega64 cards is $ 499. However on this invoice filtered by TechPowerUp shows that they are selling for $ 675 each. In the case of Vega RX56, its cost was set at $ 399. When will the new Radeon RX Vega graphics cards be available again? According to the latest information, it would not be until the month of October when most vendors receive next units.
-
It has been almost half a year since WikiLeaks released the first alleged classified documents of the CIA, and the portal still has material that is dosed by regular deliveries in the series of leaks that has been called # Vault7. Today a new wave of secret files from the US Central Intelligence Agency has been made public, which this time belong to the ExpressLane project, the CIA's alleged tool to spy on other intelligence and security services in the country, such as the FBI ( Federal Bureau of Investigation), the NSA (National Security Agency) or the DHS (Department of Homeland Security). ExpressLane is a completely secret software intended to clandestinely collect the biometric data that the FBI, NSA and DHS liaison services collect throughout the world, according to the report by Julian Assange. The CIA has a legitimate branch known as the Technical Services Office (OTS) that has this purpose, with the aim of centralizing and sharing the biometric takes collected in the systems. However, participation in the OTS database is voluntary, so the Agency would have found a way to obtain the information. The spy program is installed and run simulating being an update of the OTS biometric software. According to information provided by Wikileaks, the agents in charge of the installation are not aware that they are actually introducing malware, since the infection takes place in the background while viewing a conventional Windows installation window. ExpressLane was intended to remain secret until the year 2034, as you can read in the documents. The basic components of the tool are based on Cross Match products, a US company specialized in biometric software known worldwide because its technology allowed the identification of Osama Bin Laden during the operation in which he was assassinated in Afghanistan. So far the leak is coming today, and presumably the next will arrive in a week or two. If you want to remember the revelations of # Vault7
-
Spain's National High Court on Thursday suspended one of four suspects in last week's attacks in Barcelona and surrounding areas due to lack of evidence against them. Investigating Judge Fernando Andreu ordered the confiscation of Salh El Karib's passport, which must appear in court once a week while the investigation continues. The Karib, an employee of an Internet cafe in Ripoll, the Catalan po[CENSORED]tion where the extremist cell was supposed to be, was arrested when investigators determined that he allegedly bought plane tickets for some of the members. Meanwhile, Catalan police identified the second suspect killed in an explosion in a house in Alcanar where the cell that carried out the attacks, in which 15 people died, was preparing explosives. The body belonged to Youssef Aalla, police said. The detonation also killed an imam regarded as cell leader, Abdelbaki Es Satty. One of the now detained, Mohamed Houli Chemlal, was injured. One of Aalla's brothers is among the five attackers killed by police in the group's second attack, in the tourist resort of Cambrils, according to the researchers. Another brother is one of the suspects. The attacks of 17 and 18 August left 15 dead and more than 120 injured. The bombings were preceded by the August 16 explosion in Alcanar's house, which disrupted the group's plans to detonate bombs on targeted targets. Of the 12 people allegedly linked to the attacks, two are in custody, two on probation, two were killed in the blast and the other six were shot dead by police.
-
A team of engineers at the University of California, San Diego (USA) has developed elastic fuel cells that stick to the skin with the ability to produce energy from sweat. Harvested electricity can be used to power some low-consumption portable electronic devices such as LED lights or Bluetooth radios, among other examples. The epidermal cells that have designed these researchers stand out for having the capacity to generate 10 times more power per surface than any other existing biofuel cell. For their development they have combined intelligent chemistry, advanced materials and electronic interfaces, which has allowed them to manufacture an elastic electronic base through the use of lithography and screen printing to accommodate the anode and the cathode. The device is composed of rows of points which are connected by spring-like structures. Half of the dots form the anode of the cell, while the other half are the cathode. The base of the structure is made of gold with lithography, on which the layers of biofuels are deposited at the top of the anode points, loaded with enzymes that react to the lactic acid of the sweat, and the cathode with oxide silver. The spring-like structures stretch and bend without problem, which makes it possible for the cells to be completely flexible without deforming the anode and the cathode. To increase the power density of the device, these engineers printed a 3D carbon nanotube structure at the top of the anode and cathode, which allows each point to be charged with more of the enzyme that reacts to lactic acid in the case of the anode And to the silver oxide in the cathode. Nanotubes also have the advantage of facilitating electron transfer, a feature that optimizes the performance of fuel cells. To prove their effectiveness, the researchers connected the cells to a custom-made circuit board and attached them to the skin of a person who was exercising on a static bicycle. The device was able to provide the power needed to activate an LED for four minutes. Now, the team wants to replace the silver oxide of the cathode and replace it with a more stable material, as well as optimizing other issues of energy storage.
-
When we unlock our mobile in a public place or write the password at an ATM, if there are people nearby we may feel uncomfortable, as they could see our keys, and in case they have malicious intentions could steal the terminal or the card and use them. To avoid these problems, a team of engineers from New York University has developed a system that protects tel code unlocking the mobile from prying eyes through an optical illusion. The application is called IllusionPIN and what it does is to display a hybrid image composed of two numeric keyboards, where the numbers are distributed differently. The visibility of each image depends on the distance to the user: the person closest to the screen will see one of the keyboards, while the observer is at a distance of one meter or more will see the image with the Numbers otherwise ordered. In addition, for added security, keyboards are reconfigured after each authentication attempt or login, so the same images are not displayed twice in a row. "PIN authentication is po[CENSORED]r for good reasons: it's easy to use and remember," explains Nasir Memon, the study's director. "Our goal was to increase the resiliency of PIN authentication without forcing the device or compromising the user experience." To test this password protection system, the team used 21 volunteers who tried to steal the PIN from other spying people while unlocking their smartphone. When IllusionPIN was not activated they were able to obtain the key at all times, but with the application running they failed to point the correct key in any of the 84 attempts. Researchers are now evaluating the marketing options of this technology, so if they reach agreements with any brand we will be able to find this technology in our mobile phones in the future.
-
How do you read? Facebook is willing to compete with Amazon Echo and Google Home. It is not that the social network is to be converted into a smart speaker, but the company led by Mark Zuckerberg is expanding business areas and is beginning to enter the hardware market. And its goal is to make an important gap in this area. Specifically, Facebook is developing a physical device with features similar to Amazon Echo, Google Home and Apple's HomePod, which are already on the market, and similar to what Samsung plans to release soon. Its strong point is that it will be practically equal to its rivals, including a camera of 360 degrees, but at a lower price, of 100 dollars. About this product have hardly any data, but everything points to it will work in a similar way as the voice assistant Siri. To do this, Facebook would be hiring veteran Apple professionals. The other consumer hardware product being developed by Facebook is a videochat device that is presumably marketed under the name of Aloha. Among other features, it is expected to have a touch screen, a wide-angle camera, microphones, speakers and a facial recognition system driven by artificial intelligence. The trial version includes a tactical display that measures between 13 and 15 inches diagonally, according to users who have been able to test it. As for the operating system, Aloha will be integrated by Android - highlighting the possibility of creating your own. The information suggests that Aloha will be launched in March 2018 at a price of about $ 500. "We are excited about our long-term investments in virtual reality, augmented reality and consumer hardware. We believe these new technologies have the potential to bring new, totally new ways to the world, and we've built great teams with strong leadership in each Of these areas.The approach of these teams will help us move even faster as we continue to invest in our 10 year road map, "explained CTO Mike Schroepfer. The Facebook hardware line is being developed by the Building 8 division headed by Andrew Bosworth and headed by Regina Dugan, formerly of Google. Possibly the new products will be presented during the F8 conference of 2018.
-
The arrival of Windows 10 back in 2015 was not without controversy. Microsoft awakened the fury of thousands of users with its aggressive strategy to get the maximum number of installations possible, and between compensation, changes in policy and accusations of privacy excesses, the company lived a year to forget. But the consequences of this strategy are not yet over, and the latest news comes directly from Germany. It turns out that just 18 months ago a consumer rights group based in the state of Baden-Württemberg (Germany) filed an indictment with the German authorities alleging Microsoft transmitting users' complaints about The forced updates of Windows 10. The case reached the Munich courts, and in the last ruling of the ruling it is clear that Microsoft must change its strategy in the automatic download of Windows 10 updates. At least in Germany. As explained by this consumer advocacy group on its official blog, after more than a year of legal battles Microsoft has agreed not to force the download of Windows updates on users' devices without first having their explicit permission to it. The case goes back to the first months of distribution of Windows 10, when Microsoft made the decision to force the download of this update even in users who in no case had given their permission for this new version of Windows to be downloaded to the hard disk . In those first months of distribution of Windows 10, Microsoft forced the download of files of between 6 and 8 GB in the computers of the users so that, according to the official version, they could install in much less time the update in case they decided Make the leap to this version. But even if the user had no intention of installing the update, from one day to another he could find that his hard drive had lost about 10 GB of free space because of the automatic download of this file. Given the dubious legal basis of this decision, the complaints, claims and accusations against Microsoft soon became visible around the world. And now the sentences are beginning to appear.
-
What name do you like more
1: Oya Yansa
2: Geraldine
3: Malefica
I want to change my name
-
After more than a year after its launch, the HTC Vive have received a permanent discount of 25% on its official price. HTC's virtual reality glasses, which cost € 899 so far, can now be purchased for € 699 at the manufacturer's official store. Even with all, they do not face the recent discount (in that case is not permanent, eye) of the Oculus Rift, which have seen their price temporarily reduced to 449 euros. HTC has announced that its HTC Vive glasses will cost from now 699 euros in Europe, thus putting in half a reduction of 200 euros in the price that these glasses had in the official store of the company until a few days. In the new price are still including the two drivers of the glasses, as well as three games (Google Tilt Brush, Everest VR and Richie's Plank Experience) that are accompanied by a month of testing in the service of VIVEPORT. In view of the fact that the new version of the HTC Live is still waiting for some time, the Taiwanese company has decided to take advantage of the focus of the Gamescom event that is being held these days in the city of Cologne (Germany) to announce a significant reduction At the official price of their virtual reality glasses. It is an unprecedented move in the price strategy of the HTC Vive, since all this time these glasses have kept its price practically intact in the HTC Europe store. On the other hand, in the official store of the company it is still possible to buy the Deluxe Audio Strap accessory separately for 119.99 euros, as well as the pack with two spare parts for the face holding area 26,99 euros). Therefore, HTC Live are positioned a little closer to the prices of its main competitors: they are only 150 euros difference from the Oculus Rift, which include glasses, two controls and six games for 449 euros, and Closer still to the PlayStation VR, which cost less than 500 euros.