Jump to content

OyaYansa

Girls
  • Posts

    1,455
  • Joined

  • Last visited

  • Days Won

    2
  • Country

    Venezuela, Bolivarian Republic Of

Everything posted by OyaYansa

  1. OyaYansa

    Need Help

    Good afternoon Thomas This problem happened recently To our playboy friend Check your VPN If this does not help you try rebooting your internet mode
  2. There are only two days left for the solar eclipse and also for the unofficial presentation and launch of Android 8.0, the new operating system of Google that will give life to the next terminals of this ecosystem. Although the date of August 21 had already been strongly insinuated, now the information becomes completely official and seems to indicate that the name that most forces to give 'identity' to the operating system is Oreo, of the few desserts that Begin with the letter 'O'. And is that Google itself has published a teaser announced the event for August 21 and also with reference to the solar eclipse and, in the title of the attached file, can be read reference to the name of 'Oreo'. Of course, the brand seems to be playing with us, because shortly after it has removed the video and uploaded the same but with another filename and so on successively even on a couple of occasions. The other names have been Octopus and Oatmeal Cookie. During the presentation of Android 8.0 will be announced the list of first terminals that will have update to the new operating system and also some coming mobile that will have it as standard. Obviously, it is also expected that most of the event is dedicated to explaining all the features of Android 8.0, among which would highlight some as Vitals, Google Play Protect, Picture in Picture or Notification Dots. In this way, after arriving the last beta to developers and with rumors that even included the exit of the new operating system for September, we already have official date of availability of Android 8.0 Oreo, Octopus or Oatmeal Cookies, finally.
  3. Surely throughout this last year you have heard that if your website does not have a digital certificate SSL will be heavily penalized by Google. Not only that. What direction your web page or blog does not start over HTTPS has other negative consequences for your business. If you are afraid of losing customers or do not know what we are talking about, we recommend that you continue reading. We are going to tell you how to improve your web page and we will answer two key questions: What is an SSL security certificate? And above all, why is it so important that your website has a digital certificate SSL? Until not so long ago, the address of any standard website started with the HTTP protocol. But, if you have noticed, from a time to this part more and more sites incorporate an added "S" at the end. This is how your website and all the websites you visit should appear, and more if you are providing sensitive information such as passwords or credit cards. No, they have not done magic or bribed anyone to give them these SSL digital certificates. Secure Socket Layer Certificate ensures a secure connection between the website and the client, and protects you against data theft. To know what an SSL certificate is and know its origins we go back to the beginning of this decade. What is an SSL certificate? Motivated by the lack of privacy in a "normal" navigation that their users were experiencing, Google introduced the HTTPS protocol in 2011. At that time, the most widely used search engine around the world realized it was throwing scant results Reliability and, consequently, the internauts we were acceding to webs little safe, something that could derive in a loss of confidence important in this company. Until then, navigation was done through the HTTP (Hypertext Transfer Protocol) protocol. It was the one in charge of allowing the transfers of communication between our computer and a server (for example, the computer where the web page of computerhoy.com is hosted). A very straightforward process, but one that posed a major risk: it was a breeding ground for attacks by third parties, especially those known as Man-in-the-middle. A technique by which they are threaded in our connection before being encrypted, being able to be done with all our data and passwords. Google still had a lot to do to protect the privacy and security of Internet users while browsing the Internet through their browser. This is how three years later the encrypted connections were implemented for Gmail, whose main objective is still to protect the accounts of users from illegal access and that the messages are completely safe through encryption. In the same vein, months later it announced that it would begin to prioritize search results to sites that have SSL digital certificates. A news that was not made official until September 2016 when through a post posted on his official blog Google set a deadline: from January 2017 would point to all HTTP pages that collect passwords or credit cards as unsecured , Ie those without the SSL certificate, since it could not guarantee the encryption of the information. Why is it important for your website to have the SSL digital certificate? With this measure, Google intends several things: Web pages that have the SSL security certificate will be more secure. Any website that starts with the HTTPS address ensures the user's authenticity, prevents important security attacks - be it a small company or large companies - and offer extra protection to users who visit these websites and interact with them - a very important aspect when we make purchases online and we introduce our personal data. Since January 2017, any website that does not have the SSL digital certificate will be heavily penalized by Google and will not be in the top positions of the search results, according to the post titled "Moving Towards a Safer Web". In it, they reaffirmed their position to help users navigate the Internet safely. Google Chrome is the default browser to alert users when they access a website with a secure connection using a padlock located in the address bar. If frequent websites that collect passwords or credit cards or if you have an online store, do not forget to check that the web address begins with HHTPS and have the digital certificate SSL, make sure you include this icon. How can I get an SSL certificate for my website? If you are staying in Wordpress you do not have to worry, since since April 2016 all domains hosted in this content manager have the HTTPS security protocol. If not, there are tools like Let's Encrypt that make it totally free. Computer security has become a priority for millions of users around the world and for businesses, aware of the amount of personal data we keep in our devices and that are the best candy for cybercriminals. In addition to following a series of recommendations and simple tips to avoid a hacker attack, it is important to verify that we access a website that has the SSL certificate.
  4. Project Aslan, an initiative launched by a team of engineers at the University of Antwerp (Belgium), is developing a robotic arm that has the ability to translate text into sign language in real time. Thanks to this new electronic interpreter, it will be easier than ever to allow deaf people to understand any conversation or speech. It is not the first time we see a technological device that has the purpose of making the sign language understand. However, the solutions we have seen so far focus exclusively on converting sign language into audible voice, and are not capable of carrying out the opposite task. There have also been other proposals that carry out the reverse action, such as a robot that Toshiba introduced in 2014, but its use has not been extended. Now thanks to this new robotic arm it will be possible to do it in an accessible and cheap way, so that anyone can communicate using sign language without knowing it. The device developed by Project Aslan consists of a total of 25 pieces of plastic made using a 3D printer so that its production is economical and can be easily repaired anywhere. To these parts are added 16 servomotors, three motor controllers, an Arduino Due microcomputer and other electronic components. The plastic parts take about 139 hours to print, while the final assembly of the robot takes about 10 hours. Another advantage of this design allows the structure to be modified in a simple way, so it would be possible to update it at a very low cost. The current version of the robotic arm can translate written text into a dactyl alphabet, which is one of the communication systems deaf people use to communicate, in which each symbol equals one letter.The team is now working on improving its functions so that, in addition to the alphabet, it can also translate into advanced sign language, in which the meaning of concepts is not transmitted letter by letter, but through the combination of gestures, body posture and Facial expressions. For this it will be necessary to implement an expressive face to the system. In addition, future versions will integrate a webcam and other sensors to translate spoken voice, not just written messages.
  5. Smartphones have taken over the place that computers occupied for almost a decade. Microsoft's major staging to introduce a new version of its operating system - with Bill Gates ahead - was followed by announcements of renewed product ranges from manufacturers such as HP, Dell, Acer or ASUS. The expectation in the sector was rising to the maximum, just as it happens now when Samsung, Huawei or LG prepare for its next launch. The mobile phone is undoubtedly the main device: nine out of ten Spaniards have one. But it is almost the same number of computers in homes, with a presence in almost 85% of them, according to data from the National Observatory of Telecommunications and Information Society (ONTSI). Their relative loss of protagonism does not mean that we have ignored them, but it takes longer to renew them and, moreover, we have to allocate our budget with the exorbitant prices that some smartphones have. The market has adapted to this reality and now it is possible to find good equipment in a fork that ranges from 200 to 600 €. Very affordable prices for which, in most cases, you will get more than what you expect. PRESENT Tecno-Flash: The photo of the month this time is for the coffee table and Table Pong games News and new products ... So you do not miss what happens in the sector Did you know ... Anecdotes and happenstances in the history of technology Magazine: The races with greater projection We have mail ... Where we give the floor to our readers The hobby of the month ... Find the four differences and win a ZTE Blade A610 Plus HARDWARE Magazine: SSD, HD or SSHD, which is the best? Magazine: Your router, your guarantee Product reviews: One Plus 5, LG OLED 65W7, Kingston Data Traveler Ultimate, ASUS ZenPad 3S 10 LTE, Garmin Fenix 5S, Tooq TQXGII-600SAP, Crative Play! 3 Shopping guide ... Monitors Thermomix TM5 Gadget Accessories ... For your pet SOFTWARE Security: Theft of Facebook profiles Free alternatives to ... PDF Editors Magazine: 8 Apps to control your spending INTERNET Magazine: Squeeze Your GPS Magazine: Real Estate Websites Links: A selection of the best websites PRACTICES System: Common problems with Windows 10 and how to repair them, Turn your phone into a PC with Samsung DeX, try the new macOS High Sierra Digital Media: Use your phone to pay with Android Pay, Learn to look for your blurry photos, Improve your designs for social networks Web: Create music lists on Spotify with your friends, Highlight and save web content for later viewing TO END Tricks: Small and great tricks that will help you solve your computer problems. Questions & Answers: We resolve the technical doubts that you bring us. In 2 minutes: Simple tasks to mess with your devices. Magazine: Let Him Drive
  6. Although iOS 11 is available in beta for months, it will not be until the release of the new iPhone 8 when the iOS 11 update will be officially ready for final download. And with its launch, Apple will introduce some new features that we did not know, such as the new emergency ID of the Touch ID that has just been uncovered in one of the latest versions in testing this update. As one of the (many) users has already discovered that it is already testing the update of iOS 11, in one of the last beta versions of this version has appeared a function that, under the name of "Emergency SOS", hides a functionality Which allows to deactivate the fingerprint reader in case of emergency. And why would we want to deactivate the Touch ID? To, for example, prevent someone from forcing us to unlock our iPhone by placing our finger on the fingerprint reader. In iOS 11, users can activate the "Emergency SOS" functionality from the Settings menu, and in doing so, they will be launching an option that will only be in operation when the Power button is pressed five times in a row. When doing so, the iPhone (or iPad) will be blocked in such a way that not even placing your finger on the fingerprint reader will be enough to access the phone; If you want to unlock the screen, you must enter the password. Indeed, we are talking about something - require the password to access the phone - that today can be achieved simply by restarting the iPhone, but in this case it is a functionality that will be within reach of a quick access linked to the Power button . Therefore, it will be a much easier process to perform in situations where we can not waste several seconds on manually restarting the phone. In addition, this functionality may also be accompanied by an Automatic Call option in case we want the phone to contact emergencies when we press five times in a row on the unlock button. From what can be seen in the captures that have appeared of this new function of iOS 11, from the moment in which we press five times in succession on the button of unlocking we can only turn off the phone or make an emergency call; If we want to do any other action, we must enter the unlock key of our iPhone to activate the Touch ID. This new functionality can be very interesting in emergency situations in which - for example - we face the risk that someone can remove our phone by forcing us to unblock it with our fingerprint. In this way, it will be enough to quickly press the unlock button for five consecutive times so that that person has no way to access the device unless we provide the unlock password.
  7. On August 21 there will be an eclipse of total sun. For some countries like the United States, it will be the first in 40 years. Obviously, the demand for glasses to see the solar eclipse has skyrocketed. But even on a matter as serious as the view, the scammers and the counterfeiters are doing their August (never better). Amazon has withdrawn several glasses to see the eclipse that were for sale through third-party stores, failing to meet safety parameters. It is a very serious issue because looking directly at the sun, even an eclipse, with glasses that are not well protected can cause serious eye injuries, and even blindness. In this video you can see the tricks of NASA to see the eclipse of August 2017 with total security: Amazon has withdrawn the sunglasses MASCOTKING Solar Eclipse Glasses 2017 - CE and ISO Certified Safe Shades for Direct Sun Viewing - Eye Protection. The serious thing is that they were advertised as ISO and CE certified, but apparently not true. For glasses to see the solar eclipse are safe they must have the CE mark (in Europe) and ISO 12312-2 in the United States. The problem is that they are selling fakes that indicate they are safe, but they are false. They are distinguished by the most rounded pin, and the most square crystal: NASA and the American Astronomical Society only certify five eyeglass brands to see eclipses: Rainbow Symphony, American Paper Optics, Thousand Oaks Optical, TSE 17 and Baader Planetarium, although there are many more reselling these manufacturers with their own brand or not Have been tested by NASA. The only advice is to buy in trust stores, where they do not sell fakes. The total solar eclipse of 21 August 2017, unfortunately, will not be seen in Spain. You can only enjoy it in the United States, the Caribbean and Africa, as you can see in this image: But nothing will prevent the rest of the world from seeing it live on the special web Eclipse 2017 prepared by NASA. In this web you can also access an interactive application that shows the exact path of the eclipse around the Earth.
  8. Imagine being able to go to any movie theater, any day, anytime and every time you want. All that for the small price of $ 10. It is what a company called MoviePass, founded by Mitch Lowe, one of the creators of Netflix, now offers in the United States. Its flat rate offer to watch movies in the cinema promises to revolutionize the projections. The operation of MoviePass is quite peculiar. The company offers to pay each cinema the full cost of the ticket, allowing any of its users to watch movies wherever and whenever they want, but where is the business? In the data. MoviePass collects data on tastes and preferences of the users with whom it hopes to make cash and recover the investment made in giving movie tickets. So far his business was to charge $ 30 for that flat rate and wait for many users not get to see enough movies to repay the subscription. However, the model should not be very profitable, so Moviepass is committed to an even more aggressive strategy. With the $ 10 it costs now, you can take profitability by just watching a movie. The only limitations that are known to the service is that the cinema must have a date to pay with a debit card, that only one movie can be watched per day and that the 3D and IMAX projections are not included in the subscription. Otherwise, MoviePass's flat rate movie offer has no but. The idea is innovative and can serve to save the movie theaters, increasingly cornered by the economic crisis and its crisis in particular. Of extending to other countries of the world we would speak of cinema free for all, or almost. The business would go from being in the movies themselves to moving around advertising, the main interest in having audience data. The comparison made by MoviePass is very much the case, and is that according to them do "nothing different to Google or Apple," and the truth is that they are right. They threaten to become the intermediary that trades with data in exchange for providing a service at virtually zero cost. We'll see if the idea works, though it probably will. For now we will have to wait if we want to see something remotely similar in other countries.
  9. Need help have a problem with ts3 i can help you and if i can not find a way to do it :facebook-eyes-symbol:

    1. Crastto

      Crastto

      I have a problem with ts3 :)

    2. OyaYansa

      OyaYansa

      which problem you have :164:

  10. In bad time you have decided to build a PC gamer by pieces if you have just landed in the world of computer games, and in fact the most critical voices in the industry have something to say: now is by far the worst time to buy A graphics card. And not only that, but also everything points to the situation will get worse. The news that has made the drop has filled the glass has been the announcement that Samsung and SK Hynix, two companies that represent about 90% of the production of memories that incorporate the graphics cards of the leading brands in the market, are going To reduce the production of these components in favor of a much more lucrative market right now: that of smartphones, which - with the launch of mobiles like the iPhone 8 just around the corner - has made Samsung Electronics stand as One of the most profitable technology companies on the planet. The consequence that the two companies that represent 90% of the production of the RAM of the graphics cards decide to turn their back on the PC industry is clear: in a market where users demand increasingly powerful components for Their gaming PCs, a reduction in the availability of these components translates into an exponential rise in prices. In that, and in a very limited stock, as has already been seen with the few units that have been put on sale for the new series RX Vega from AMD. As if it were not enough with the rise of prices that are living the SSDs, and also contrary to what some thought only a few months ago, the situation of RAM in the PC market will not do more than go To worse. In this month of August, the price of RAM used in VGA graphics cards has risen by 30.8%. The mobile and also the servers are, as seen, much more profitable markets for manufacturers of RAM compared to the benefits reported by the growing industry of PC gaming. In the midst of this paradigm shift in the market we have, to top it off, the situation that has generated the famous criptomonedas and the interest of many people to become digital miners: to tell the AMD Radeon RX 570 or RX 580. There is still hope that the situation will stabilize (some media say that companies like SK Hynix are already working to adapt their factories to a much more efficient process to increase the production of the memories), but at least in the coming months No one should expect a downgrade, not even a stabilization in the prices of graphics cards: they will continue to rise until further notice.
  11. OyaYansa

    Problem TS3

    I agree with what skyrim said The most likely cause is that your internet is slow and because of that it does not recognize the ts3 server is a very common problem After restart and do everything that skyrem said and still does not work I recommend that you try to enter later when your internet signal is stronger
  12. Metro de Madrid has announced that it will install more than 2,200 free mobile phone chargers distributed between its stations. Thanks to this initiative, travelers will have the possibility to charge the battery in many points of the network, without paying anything and without having to fulfill any prerequisites. The autonomy of the mobile is a concern for countless people, who for reasons of work, because they are hooked to the smartphone or for other reasons can not afford to have their device run out of battery and shut down. Now, Metro de Madrid offers these users a network of free USB connectors so that any traveler who needs it can plug the cable of your terminal. The first phase of the project started in October last year, when the first prototype of cargo base was installed at the Moncloa station, as well as two trains of the 8,000 series of Line 6. In total, Eight chargers with two USB outlets each, compatible with any USB connector, including type C, as well as the latest fast charging technology for the devices that support it, were distributed throughout the station. In the case of the trains 24 USB ports were enabled in each one of them. In order to guarantee the safety of users' mobile phones and tablets, Metro de Madrid smartphone chargers are equipped with integral protection, which includes protection against overcurrents, surges and permanent short circuits. In addition, they comply with European safety standards and are equipped with additional protections, including mass use and vandalism. The electricity to power the devices comes from the energy generated during the braking of the trains, so it is a clean and non-polluting source. Metro de Madrid informs that the installation of all the chargers will be produced progressively in the stations and also throughout the fleet of trains.
  13. Time does not forgive anyone, not even free software. It's been almost two years since the launch of Raspbian Jessie, and now the Raspberry Pi operating system - let's remember that it's based on Debian Linux - has just begun to receive the one that's here for at least the next two years Will be the most recent (and stable) version of this platform: Raspbian Stretch. First it was Jessie, and now it's Stretch's turn: if both have in common both denominations is that the developers that work with the operating system of the Raspberry Pi they have customary to use names of personages of Toy Story to present in society Versions of his system, and Stretch is none other than the violet octopus that was seen in Toy Story 3. Raspbian Stretch is therefore the name that receives the latest update that is already available for download among users Of the Raspberry. Of course, no one expected big changes. As developer Simon Long explains in an entry posted on the blog page of Raspberry Pi, the most important differences between Raspbian Stretch and Jessie's previous version are "under the hood", which means that the main novelties Are integrated in the form of improvements to the operation of the operating system. These include, among others, the abandonment of PulseAudio support for Bluetooth sound management, better user name management, or a solution to a vulnerability affecting the BCM43xx component of Raspberry Pi 3 and Pi Zero W. In any case, all this does not mean that anyone who updates their Raspberry to this latest version will not find themselves with some other visual change. The Chromium browser is now upgraded to the v60 version, which in addition to improvements in performance also includes small tweaks in the interface. The program Sonic Pi, for its part, is updated to version 3.0.1 with some changes that can be consulted in detail following
  14. It's not anything: the solar eclipse of August 21 is an unusual phenomenon in which we will see Luna overlap the Sun, cover it. It's a few minutes of darkness in the middle of the day. Something that many people's eyes are looking for not to miss. And although the United States has literally a privileged position to appreciate the eclipse - since it will cross from coast to coast - there are countries in Latin America that may also partially observe the astronomical event. That yes: some to a greater extent than others. But before continuing with the list, one more warning is never left: yes, your eyes can suffer severe damages - and you could even lose sight - if you look directly at the eclipse without special glasses or some kind of protection. Especially, if you are in places where the phenomenon will be partial and the Moon will not completely cover the Sun. It is not a joke or an urban myth. These are the Latin American territories that will enjoy partially the solar eclipse and the hours (local) in which its citizens will be able to appreciate it. Puerto Rico According to the Caribbean Astronomy Society, in Puerto Rico Luna will cover 80% of the Sun. The eclipse begins at 2:11 p.m. and the best time to appreciate it will be around 3:34 p.m., "when it occurs The maximum partial eclipse ". The phenomenon ends at 4:46 p.m. Mexico Those that have the best chances to see a greater percentage of the eclipse are the northern states of Mexico, such as Baja California, Sonora, Chihuahua and Coahuila: they can appreciate up to 60% of the phenomenon, according to the Institute of Astronomy of the UNAM. The possibilities for the center and south of the country are reduced by up to 25%. Gloria Delgado, a researcher at this institute, explained to the official newspaper Notimex that, for example, in Oaxaca, the eclipse could be seen in 23%, while in Mexico City it would be 27%. In Mexican territory, the phenomenon begins at 12:01 p.m. and will extend until 2:37 p.m. Your peak will be at 1:20 p.m. Guatemala In Guatemala, the solar eclipse will have a magnitude of 0.36, meaning that it will be the portion of the Sun that the Moon will cover in this country. The phenomenon begins at 11:35 a.m. And ends at 2:05 p.m., with a peak at 12:53 p.m. Costa Rica Costa Rica will live the eclipse for 2 hours and 18 minutes, according to information published by the National Center for Science and Technology. The phenomenon begins at 12:04 p.m. and ends at 2:22 p.m. The maximum point to appreciate the eclipse will be at 1:17 p.m. The magnitude will be 0.34. El Salvador The Ministry of Environment and Natural Resources of El Salvador reported that "a quarter of the Sun will be obscured by a lapse of approximately two hours." Warning that the phenomenon can be seen "if the sky is clear", the entity indicated that the eclipse would begin at 11:41 in the morning, would have its peak at 12:58 p.m. And it would end at 2:09 p.m. Honduras According to the Department of Astronomy and Astrophysics of the National Autonomous University, the eclipse in this country will only reach a maximum darkening of 29% of the solar disk at 1:03 p.m. The phenomenon will begin at 11:43 in the morning and end at 2:15 p.m., with a total duration of 2 hours and 32 minutes. The cities of Roatán, Trujillo and La Ceiba are the places with greater magnitude of the phenomenon. Guatemala In Guatemala, the solar eclipse will have a magnitude of 0.36, meaning that it will be the portion of the Sun that the Moon will cover in this country. The phenomenon begins at 11:35 a.m. And ends at 2:05 p.m., with a peak at 12:53 p.m. Nicaragua The Nicaraguan Association of Amateur Astronomers "Carl Sagan" shared in its Facebook profile a simulation of the solar eclipse to be seen in the country, carried out by the project Charlie Bates Solar Astronomy.The magnitude will be 0.36 and will begin at 11: 52. Its maximum will be at 1:08 pm and will last for 2 hours and 25 minutes, ending at 2:17 pm Colombia The Bogota Planetarium reported that the maximum darkening in the country will be 24% and will occur at 2:43 in the afternoon. The phenomenon, which will last 2 hours and 5 minutes, will begin at 1:37 p.m. Venezuela In Venezuela the solar eclipse will have a magnitude of 0.62, reaching its peak at 3:45 p.m. It will take 2 hours and 24 minutes, starting at 2:28 p.m. Ecuador The Astronomical Observatory of Quito, attached to the National Polytechnic School, reported that from 1:57 in the afternoon the eclipse will be observed, which will have a darkness of 6.5% and a magnitude of 0.145. Its maximum will arrive at 2:43 p.m. And will end at 3:25 p.m. "For the cities of the north the eclipse will begin earlier, it will end later and it will be possible to better appreciate the occultation of the Sun, for example for Tulcán the eclipse will begin at 13:51:50, will end at 15:29:16 , Will have a magnitude of 0.182 and a darkening of 9.8%, "added the entity. Peru In Peru there will only be one city from which the eclipse can be partially seen: Iquitos, according to the Peruvian Association of Astronomy Javier Ramirez, in an interview with Peru 21. According to what he said, only 5% of the solar disk will be covered by the moon. The magnitude for this country will be 0.13 and will reach its maximum at 2:54 p.m. It will take 1 hour and 18 minutes, starting at 2:14 p.m. And ending at 3:32 p.m. Brazil A Brazilian coast will be the last place in which the partial eclipse can be seen: it is the entire area of the city of Bethlehem. Here the shadow of the Moon on the Sun will leave at 6:03 p.m. The magnitude of the phenomenon in this country is 0.23 and will reach its peak at 5:17 p.m. What if you are not in any of these places? No problem: NASA prepared a great special to cover the eclipse. You can follow it in a live global broadcast that the agency will do with before, during and after images taken by 11 spacecraft, more than 50 high altitude balloons and astronauts aboard the International Space Station. There is also a website dedicated to unusual phenomena with all the details you need to know. 21/08/2017 4 days left
  15. Be careful if you have an Android phone. Cybercriminals are constantly searching for new ways to get into these terminals and on many occasions it is difficult to realize. The latest alert comes in the wake of a new dangerous Trojan virus for Android that sneaks in as a new Flash update and steals our bank details. They have not been good these last few weeks for the users of this operating system. More than 36 million terminals were infected by malware Judy, the Dwmap Trojan was hidden in the safe app Colourblock puzzles and other malware was discovered in 800 Google Play apps. The security vulnerabilities of Android are a problem that has dragged from practically its origins and that is growing this type of attacks, seriously affecting to developers and losing the confidence of the users. On this occasion, Marcher is the new malicious software or virus for Android that appears camouflaged after an alleged update of Adobe Flash. The infection procedure of the terminal is simple: once the victim accesses a harmful web page, a popup window opens informing you that the device's Flash player is out of date and that you should download "Adobe_Flash_2016.apk". If the user clicks on this message, the malicious code is automatically downloaded. It will then guide you to disable the security of your terminal and allow the installation of third-party applications. The malware produces false start pages for third-party banking applications such as TD Bank, Google, Yahoo, Chase Bank, Pay Pla, Citibank, Walmart, Amazon, Western Union, Facebook, among others. Now only wait for the victim to open their banking applications to steal the data, violating the security of the device. This is the complete list of the applications it attacks. In addition to this dangerous virus that appears as a new Flash update, in the last few hours another malware known as Koler has been discovered that uses fake applications that offer access to pornographic content from unofficial applications stores as a hook for infection. Once the application is downloaded and installed, an image similar to that of the FBI occupies the screen, and indicates that it is necessary to pay a certain economic amount to unlock the terminal.
  16. Work, work, work, work, day to day

  17. Samsung has introduced the Portable SSD T5, its new portable solid-state disk drive that packs up to 2TB of storage in the size of a credit card. Photographers, video makers, content creators and other professionals of similar profiles need to have portable storage solutions to carry a large volume of files. To meet this demand, the Korean technology firm introduced in mid-2015 the first product of this family, the Samsung Portable SSD T1 with up to 1TB capacity, which a year later happened the Portable SSD T3, with a space of up to 2 TB and improved capabilities over the first generation. Now, Samsung presents us the evolution of its portable SSD with the new T5. The model does not exceed the capacity of its predecessor but has improvements in speed, performance and performance. It is built with the latest V-NAND technology, enabling you to deliver industry-leading file transfer speeds with a maximum of 540 MB / s, up to 4.9 times faster than conventional external hard drives. The size of the Portable SSD T5 is the most compact. With dimensions of 74x5.3x10.5 mm has dimensions similar to those of a credit card, which together with its light weight (only weighs 51 gr) make it can be transported with total comfort even in the pocket. The SSD can be used with PCs, Macs, tablets, mobile phones and other devices. To facilitate the connection includes two cables: one USB-C to USB-C, and another USB-C to USB-A. The software with which it is equipped is based on AES 256-bit hardware data encryption, facilitates security configuration and receives the latest firmware and software updates. An Android tablet and mobile app is also available. The new Samsung SSD is available with capacities of 250 and 500 GB in blue, and 1 and 2 TB in black, with prices in the United States ranging from 129.99 to 799.99 dollars.
  18. To the great majority of Internet users we like to share (eg, envy) of the paradisiacal places in which we are spending a few days on vacation. But, stop! Take a moment to think about the information you are showing on your social networks. You can think (naively) that you are showing it only to your contacts on the network, but it is very likely that the other Internet users can see it as well. And more if you have an open profile on Instagram, Twitter, Facebook, etc. Upload photos, tag our friends, who tag us, indicate our geolocation at the same time and our most immediate plans are the most frequent actions we do in our social profiles. Innocent acts, fruit of the emotion of the moment that we are living that make us ignore the dangers of social networks and the abuse of the posture. Holidays are a time to rest, to disconnect and to relax from our routine, but not for that we have to lower our guard in the online world. The typical and innocent photo lying on the beach or breathing pure air after having climbed a mountain, accompanied by the real location at that very moment, can turn against us as it is a very valuable track for lovers of other people, putting in Risk our security. Gossip is the national sport par excellence, and these people are experts in tracking our profile to get all kinds of information. And more if we have our accounts linked. One of the main risks of showing our location is that uploading an image to Instagram and sharing it on Twitter is giving access to both the users of the photography network and the microblogging network where we are at the moment. That is, unknown people know where we are. If we practice this practice frequently and add our position of coordinates in our daily routine, it will be easy for anyone to know what our movements are and where we live. And if we share that we are on vacation, the thieves have a clear signal: our house is empty and have free way to enter without problems. The same happens with the posturing of showing the new acquisitions. It is common, for example, to buy a car and upload photos to Instagram of our new vehicle, with details of the features it has or our specific GPS coordinates. Information that can be used for malicious purposes and that can make our joy disappear. The same happens if we buy a new TV and we show it to the rest of Internet users. The same safety precautions we take as adults should be taught to our children, especially if they are minors, since they are not yet aware of the dangers of social networks or posture, being able to be exposed to all types of computer crime and Cybersecurity. The best in these cases is to explain the risks of sharing personal information online and remember the courage to think several times before publishing something.
  19. The bloc issued a statement on the political situation of the Caribbean country Facing tensions between Venezuela and the United States, which reached a new peak with Donald Trump's announcement of a possible "military option" in the Caribbean country to which Caracas responded that he will defend himself from the "supreme extremism" of the United States, Mercosur returned to To reject the use of force to restore democratic order in Venezuela. "The Mercosur countries consider that the only acceptable instruments for the promotion of democracy are dialogue and diplomacy. The repudiation of violence and any option involving the use of force is unavoidable and constitutes the fundamental basis of democratic coexistence , Both at the internal level and in international relations, "the Foreign Ministry said in a statement. The usual tensions between Caracas and Washington since the arrival of Chavez in 1999 have escalated further in recent weeks. "We have many options for Venezuela, including a possible military option if necessary," the US president said from his golf club in New Jersey, where he is on vacation. His government has imposed financial sanctions against President Nicolás Maduro and several of his former officials and collaborators for having advanced with a Constituent Assembly installed last week and qualified by the Venezuelan opposition as a maneuver to establish a "dictatorship." This is in the midst of a wave of protests against Maduro that left about 125 dead in little more than four months. "The Mercosur countries will continue to insist, individually and collectively, that Venezuela fulfill the commitments it has freely and sovereignly assumed with democracy as the only acceptable form of government in the region." The Venezuelan government can not hope to coexist Normal with its neighbors in the region until democracy is restored in the country, "continues the Foreign Ministry statement. The bloc suspended Venezuela under the Ushuaia Protocol on Democratic Commitment on August 5 as a result of the finding of a serious breach of the democratic order in that country. "Measures announced by the government and by the National Constituent Assembly in recent days have further reduced the space for political debate and negotiation," he said, adding that "since then, repression, arbitrary arrests and the curtailment of individual liberties have increased. Is stated in the statement. Consulted Luis Almagro, secretary general of the OAS, on the Mercosur communiqué, merely sent a tweet he had written this morning: "Inter-American Democratic Charter @ OEA_ official is the instrument to defend democracy and the ideal framework to act in Venezuela ". Javier Miranda, President of the Ampio Front, told a press conference that his political force condemned the use of force and any warmongering intervention and that Trump's sayings did nothing to solve the crisis. "We strongly condemn the words of the President of the United States," he said.
  20. Since the mobile phone has become an extension of ourselves, the battery has become a major concern for users. For this reason, the brands strive to manufacture lighter and more powerful batteries, as well as equip them with fast charging technology to reduce the charging time. To speed up the loading process, some researchers have focused on the development of supercapacitors, a type of electrochemical device characterized by its high energy density. It stands out for having interesting qualities, such as high efficiency, long operating cycles or wide ranges of temperature and voltage, among others. They are mainly used to power microelectronic systems, computer memories, precision cameras, clocks or hybrid cars. Thanks to these features, supercapacitors are postulated as an alternative to replace conventional batteries, as they promise to charge smartphones and other electronic devices in seconds or minutes, rather than hours. However, current technologies are often not flexible and in most cases their performance degrades at high speed, which is why their use has not been extended to mobile phones. Now, a team of scientists at Queen Mary University in London (UK) has found a formula to optimize supercapacitors. To do this, they have developed a prototype polymer electrode that interlocks the nanostructures similarly to the red and white bands of a candy cane. The result reaches an energy storage close to the theoretical limit, while demonstrating flexibility and resistance to the charge / discharge cycle. "This interpenetrating structure allows the material to bend more easily, in addition to swelling and shrinking without cracking, which leads to greater longevity," explains Stoyan Smoukov, project leader. Researchers are currently designing and evaluating a range of materials that can adapt to this new structure of interpenetrating polymers, and will continue to work so that in the near future the supercapacitors can be used to charge the mobile in seconds.
  21. Bad news for Android users. A new mobile banking trojan known as Svpeng has been discovered in the last few hours. The peculiarity of this new virus is that it incorporates keylogger functionalities, an asocidad technique with actors of directed threats, stealing banking data and defending of attempts to be uninstalled. As if this were not enough, the Trojan Svpeng is operating on terminals that have all their software updated, according to the alert launched from Kapersky Lab. Accessibility services often take the form of interface improvements (UI) to support users with some functional diversity or also for those who temporarily can not interact with a device, for example, that they are driving Last June, Kaspersky Lab researchers discovered that the Svpeng Trojan had evolved to exploit the features of this system, and was able to steal the text entered in the device from other applications, while taking other rights Additional. The Svpeng Trojan is distributed through malicious web pages posing as a fake flash replay app. Once it has been activated on the Android terminals, it requests permission to use the accessibility services (which the user grants without realizing it is a threat). In this way you have access to the interface improvements of the rest of installed applications as well as make screen captures every time keys are entered through the keyboard. For applications that do not allow an image of the screen, such as banking, this Trojan draws an'phishing 'window on the application. Also, Svpeng can also be installed as the default SMS application, send and receive SMS, make calls, read contacts and block any attempt to remove the device management rights, thus avoiding its uninstallation. Trojan techniques work even on fully updated devices, which feature the latest version of Android OS and all day-to-day security updates. This means that keeping the device software up to date is not enough to be protected against this Trojan while the methods of data theft evolve surprisingly in regards to mobile banking malware.
  22. In recent months we have experienced important cases of cyber attacks to companies at a global level, affecting millions of users. Such has been the impact of these computer malfunctions that the Spanish administration has decided to take measures. Specifically, it is preparing the draft of a new Royal Decree Law, which will fine companies that conceal potential cyber attacks or do not take necessary measures to remedy them. While it is true that the last hacks have not significantly affected our country - except with the virus WannaCry where Telefónica was the great disadvantage -, if they put on the table the need to have a legal instrument that allows the Administration to offer some Certain guarantees on the security systems that Spanish companies have. With this objective, the Government are committed to carry out a prevention and alert to companies against hackers. If not, they will be sanctioned for the first time. Specifically, in the draft decree law that is being finalized, it is stated that the companies that operate essential services (electricity, transpoprte) and digital service providers that do not notify significant cyber attacks that receive or do not take measures to avoid them may be punished with " Effective, proportionate and dissuasive sanctions ". This Royal Decree allows the Administration to supervise the security of computer systems of Spanish companies, impose preventive measures and even punish them if they do not apply or do not notify the cybertacks suffered. This measure is being made possible by the joint effort being made by the Department of Homeland Security, the Ministry of the Interior, the CNI and the Secretary of State for the Information Society and the Digital Agenda - which coordinates the work. They seek to be updated to the European regulations, specifically to Directive 016/1148 on Security of Networks and Information Systems of the EU, which should be incorporated into the legislation of member states before May 2018. The NIS Directive requires a listing of essential service operators and the main providers of digital services, both private and public, and to communicate them to the European Commission. The sectors involved would be energy (electricity, crude and gas), transport (air, sea, rail and road), financial (banking and markets), sanitation, drinking water and digital infrastructure - which are the potential targets of future attacks This regulation will allow the Administration: Conduct audits to monitor your security level; Establish "binding instructions" that help them improve the protection of their computer systems; Inform "without delay" of any incident that endangers the service provided. As for the sanctions that will be taken by companies that do not comply with these measures, they are expected to be in line with the seriousness of the computer attacks, taking into account the number of users affected, the geographical extent or their consequences.
  23. What is the worst that can happen if you install a lock that needs an Internet connection? Effectively: you have no Internet connection. That is precisely what has happened to the users of one of these devices, specifically the LS6i, who now found themselves in the street and unable to access their homes. Without warning, these intelligent locks for the connected home received a firmware update. The problem is that this update left them without connectivity, so they were directly blocked and stopped working. We can imagine the face of their owners when trying to enter the house. They could only do so after the corresponding call to the locksmith. These locks, as The Verge points out, are what Airbnb recommends to people who rent homes through their platform. They are opened with a key or a key, although in any case they still need to have their software in perfect condition. One of the challenges of Smart Home is security. That a vacuum cleaner or a smart robot compromises your privacy is a problem, but the thing happens to majors when it is your lock that has problems of operation. For now the manufacturer claims that it was a problem of a few users and has been mostly solved. However, there are still some who have not been able to reestablish the device and have had to send it back. The truth is that the operation does not inspire much confidence to those who are thinking of getting one of these smart locks. This incident is something that had to happen sooner or later. Now it's about working to improve the performance of a technology that has come to stay. The security of the connected household should be a priority for all manufacturers who want to be part of this market, although it seems that it is already for the majority.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.