Jump to content

OyaYansa

Girls
  • Posts

    1,455
  • Joined

  • Last visited

  • Days Won

    2
  • Country

    Venezuela, Bolivarian Republic Of

Everything posted by OyaYansa

  1. You have step by step how to open 2 or more clients I hope it helps
  2. You can not change your discretion because you have guest range in ts3 Get in touch with a Moderator
  3. One of the unknowns that are presented to the user when he wants to mount, or choose a computer is that storage system needs your terminal HDD or SSD ?. Until very recently, there were not many storage options for a computer, so it is necessary to analyze the possibilities that are presented to us today. Now we are faced with many combinations, a laptop with a solid state drive (SSD), a desktop computer with a standard hard disk (HDD) or a combination of both: an SSD used as the primary disk where the operating system would go and a HDD for everything else. How to choose the type of storage? What type of storage is best for me? Let's resolve those doubts by explaining the differences between them and we will guide you to help you choose. The hard disk or HDD (Hard Drive Disk) is the piece of hardware that serves to persistently store (they do not cease to exist once the unit is turned off), the data of a computer. A hard disk is a metal plate that uses a magnetic recording system to store all kinds of files, from a Word document to a multi-million dollar project on a new virtual reality glasses. By writing on several rotating discs, the information is recorded and the finer the discs, the better the recording. For this reason, discs of the same size may have different storage capacities. These units have been evolving since their inception in 1960, usually doubling their capacity every year and a half. The units that normally use HDDs or hard disks are desktop or desktop computers, laptops and corporate servers. A solid state drive or SSD works just like a hard drive with a difference, the files are stored on flash memory chips interconnected with each other. These chips may be included in the terminal's motherboard (as is the case with some small laptops), a PCIe card, or a box similar to a hard drive of a lifetime. One of the characteristics of these chips is that they are able to retain data even when there is no power running through the system. Laptops, tablets and smartphones are the most commonly used devices, by default, SSDs. We should not forget that some devices like cameras also use this type of storage to give a longer response time and store more images in external storage systems such as SD cards. Advantages and Disadvantages Between HDD Hard Drives and SSDs Before analyzing what the differences between these storage systems we have to establish a basis: HDD and SDD fulfill the same function, store your files. There are different characteristics and uses for which it will be more beneficial to use one or the other, that is what we are going to explain to you right now: Price One of the key factors when choosing which storage system to choose, is the budget we have, after all, money is lolo that will limit our options. HDD: for efficiency and productivity when making hard drives, they are much more economical for what they can get to offer. SSD: because of their "early" creation and the components that form them, they are usually quite more expensive than the HDD. For you to see it in a more practical way, a 1TB hard drive costs less than 50 euros and an SSD of the same capacity costs almost 320 euros. Capacity The second factor that determines which system to choose is how much data storage capacity are able to encompass our storage devices. Nowadays the files are getting bigger and bigger, while it is necessary to access the files in a faster and more efficient way. Introduced the problem ... What are the options? HDD: to date we can find hard drives up to 8TB, a real barbarity for a personal computer, even today. SSD: For the moment, we can find solid state drives up to 4 TB. Although it seems that hard drives earn well in this aspect, once again we will have to look at the price of each unit. Speed and Performance The speed at which to access, to move, to modify and to eliminate the files is fundamental for the daily use, as much from the perspective of the user as of a professional. Therefore, it is another variable to take into account. Here's not much to explain: SSDs or SSDs are superior in speed and performance to hard drives. A computer that has an SSD will run faster, starting up in just five seconds. A computer that has the operating system installed on an HDD can take a lot more time. With an SSD, absolutely everything will have a higher performance, so if you want to have a fast computer you will choose an SSD without any doubt about it. Durability How much is going to move your computer is a question that should also be asked the user. Each storage system is constructed differently and will be more prone to breakage or damage. HDD: A hard drive is built by different moving parts that are more susceptible to being damaged in any kind of movement, so you have to be very careful when transporting them. In addition, the moving parts eventually wear out. SSD: Solid state drives have no moving parts, so your files are less likely to be lost due to component damage in the event of a fall, or a poor or loose component of the drive. It should be emphasized that each cell in a flash memory bank of the unit can be written and deleted a limited number of times, but there are different tools to monitor and optimize that process to extend the end of the life of the unit. It is much more likely that a hard drive than SSD will fail on equal terms. Fragmentation Fragmentation is the process by which (the word itself says it) the files are broken and dispersed by a storage unit. Only hard drives suffer from this feature HDD: Because of their rotating recording surfaces, hard disk surfaces work best with larger files etched into solid blocks. When these blocks are filled with use, the files tend to be spread over the free space of the HDD, which impairs the speed of reading and writing data. Although it is true that the reading and writing of files has improved and so the effect has been minimized, the hard disks are still prone to fragmentation. SSD: Due to its construction, solid state drives do not have that problem, since there is no physical location of the files on the drive and no physical head reading. For this reason, SSDs are much faster than HDDs. Size of unit Another factor to take into account when choosing a storage system is the size of the unit itself. There are obvious physical limitations depending on the terminal that we choose or mount. HDD: the hard drives depend on the turntables, and therefore, limit the size of the drive. On the one hand, we have the sizes for desktops and laptops: 1.8 ", 2.5" and 3.5 ". On the other hand, we have the ones that have been used for smaller units like smartphones and the like but not Are common: 1 "and 0.85". The main manufacturers of hard disks suspended the development of new products inferior to 1.8 "due to the fall of price of the SSD. SSD: They do not have a physical limitation that will keep them from getting smaller, so they will continue to develop smaller units over time. There are SSDs of different sizes that fit the terminal in which they are going to Noise The noise, although it seems a little bit when it comes to using a computer, is something that depending on the use and the daily hours that will be used can make the difference between choosing a storage system or another. A music producer who does not have the means to record in a room outside the computer, needs a terminal as quiet as possible so that it does not damage the sound, to give an example. HDD: even the quietest hard disk will emit some kind of noise when the computer is running, there are many parts on the disk that can make noise. This type of noise may be aggravated if the system has been damaged, installed improperly or some part of the disc is worn. Faster hard drives will make more noise. SSD: SSDs, lacking mechanical parts, do not make any noise. Conclusions HDD or SSD? At this point you should already be able to find out which storage system you should use, but for those who still have some doubt we make a brief summary adjusting the needs in different profiles. Buy an HDD if ... You will be interested in purchasing a hard drive if you are among these users: Tight budget: hard drives are cheaper than SSDs. For those who have to sacrifice space or speed due to a lack of money, hard drives are the best option. Average user: a user who uses his computer for the most basic tasks such as office automation, browsing the internet, listening to music stored locally on the computer, etc. It will be convenient to have an HDD since you can allocate that money to acquire other benefits. Multimedia download servers: hard disks have a much higher capacity than SSDs and is the obvious choice. Buy a solid state drive or SDD if ... You will be interested in purchasing a solid state unit if you are among these groups: Audio engineers and music producers: As we have mentioned before, the less noise the rooms contaminate the better. Therefore, using an SSD is the right choice. Globetrotter: If you are one of those who uses laptops or is prone to move your terminal, you will need an SSD. We do not want the first bache to lose the files. You need a fast computer: SSDs are superior in performance and speed to hard drives, so you'll want one of these.
  4. A team of researchers from Australian security company LMNTRIX Labs has detected new malware that steals Facebook's password, but given its method of propagation, in this case the victim is not as innocent as on other occasions. And it is that, according to the report of the security firm, the virus is a hidden Trojan in a program called Facebook Password Stealer, a piece of software that pretends to be an application to hack other people's Facebook account. It is not the first time cybercriminals have used this strategy to distribute malware and steal passwords. On other occasions we have seen campaigns that exploit the interest of some users to spy on other people, and one of the most repeated is the one that promises to hack the WhatsApp of your friends to see the chats. Now, stealing the Facebook password has become the claim to distribute the new Trojan that has been detected. "The attackers know that this is a widespread and growing desire," the team says. "There is a potentially large demand for the alleged service, so they are distributing a sample through spam, ad campaigns, pop-ups, pornographic websites and sometimes as standalone software." Once the fake program has been downloaded, it shows the user a window like the one you can see below. To hack the Facebook account, the system asks the victim to enter their social network access keys, as well as the e-mail address or the page address of the person they want to spy on. Pressing the Hack button starts to run the remote access Trojan, which works in the background to steal the keys of the frustrated thief. To avoid being a victim of this type of malware, do not look for programs to steal passwords with utilities similar to those of Facebook Password Stealer, not only because spying is not good, but because it is you who can see your account hacked.
  5. Energy self-sufficiency seems to be an ever closer goal. Supplying energy with solar panels and batteries for the home is an increasingly common practice in developed countries, despite the hardships of some governments. Soon, all those who want to get on the wave of energy self-sufficiency will not have to turn to inaccessible, high-priced sellers: they can buy solar panels and batteries directly from Ikea, the world's largest area of furniture and other household goods . These panels are priced at £ 4,000, about £ 4,470 at current exchange rates. Placing a battery and a single plate at home would have a price of € 7,800, although bearing in mind that the savings would be around € 600 per year, it would end up being amortized over the long term. In any case, the cost of both technologies is falling rapidly, prompting other companies to offer their product and compete in the market, causing prices to fall further. It is a matter of time that there are quite cheaper alternatives. At the moment the advertisement is limited solely and exclusively to the British market. Of course, it is also likely to be done in the rest of the world in a gradual way. In Spain, the main obstacle to energy self-sufficiency is the so-called sun tax, a rate to be paid by all those who want to disconnect from the electricity grid. According to the company itself, the combination of panel and battery can save up to 70% on the light bill. For the moment in the tests realized with real families the saving has been smaller, of 50%, a figure quite impressive already of itself. Tesla is the brand that has penetrated the most in the development of batteries for the home. Their are the ones that can already be bought in Spain, although they do not enjoy much success among the consumers.
  6. It has been almost a month since Google released the latest developer version of its new operating system known as Android 8.0 and, although it was already estimated that by this time would be on the street globally in the current Pixel phones, the delay is More than sung. Nevertheless, the latest information assures that the release date of Android 8.0 would happen next week. The information comes from Android Police that, although last week gathered that throughout this week would be released globally Android 8.0 for the Pixel, now recuse affirming that according to new sources, confirms the Android 8.0 delay that does not Could be launched globally for the Pixels until next week, an information supported by Evan Blass, which also puts its availability in a few days. This way the Android 8.0 OTA will be prayed for and, although Google has never gotten to give a specific date of release, yes the rumorology had located it by the middle of August. What we will have before is the final name of Android 8.0 that would be announced next August 21 providing the occasion of the solar eclipse that day, so that the name could have some relationship. Be that as it may, the release date of Android 8.0 could be any day as it has been customary, which will have to follow closely the process to have exact record of its possible release that, surely, will not be when it is Introduce the new Pixel phones in the last quarter of the year.
  7. Sunny day, dozens of Ferraris and the track of Autodromo Hermanos Rodríguez, the result can only be fun, passion, more fun, more passion and is called Festival Ferrari. "A paradise for any lover of cars" that can also be an appropriate term to describe the Ferrari Festival, which certainly reaffirms that famous saying: men do not grow, only their toys become more expensive ... a lot more expensive in this case. In this first edition 2017, we could observe all kinds of models of these powerful machines, from the most recent such as the 488 GTB; 458 Italy and California, known as the F430 and 360 Spider, to classic models like the 308 GTS and Mondial. Some Maserati models were also present, such as: Ghibli; Gransport and GranTurismo, who also made the circuit vibrate at speeds in excess of 200 km / h. From the morning and for several hours, all these Italians were able to release their potential along the 4.3 km of Hermanos Rodríguez, without any type of limitation and with all the security that a circuit of this level can offer. This is the first of several events that the Cavalino Rampante brand organizes during the year, in which its customers and brand fans can enjoy the vehicles and take full advantage of the handling experience they offer.
  8. Revolution in the sector of computer components and gamers during the last hours. It seems that the new Intel Coffee Lake processors will not be compatible with motherboards already on the market. So at least it has announced the Twitter account of ASRock. Error or reality? Let's see what's happening in this whole thing. The eighth generation of Intel processors is expected to hit the market before the end of 2017. At first it was speculated that the Coffee Lake would be compatible with motherboards for the Intel Skylake and Kaby Lake models - the latter thanks To a BIOS update, and to the LGA 1151 socket used for desktop. If this were true, Intel's Coffee Lake processors could be installed on Intel 200 Series and Intel 100 Series chipset motherboards. So far it's clear. However, on July 31 ASRock revealed on Twitter that the Coffee Lake will not be compatible with these two motherboards, which are currently on the market. This is the screenshot that corresponds to the tweet: In it, user Evan Jensen asks if his Z270 Super Carrier base board (high range for the LGA 1151 socket) will be compatible, to which ASRock responds that "Intel Coffee Lake processors are not compatible with the 200 series motherboards ". Clearer could not be. But to curl the curl even more this message has been removed from the official account. Which leads us to suspect that something strange is happening on this topic. It is important to keep in mind one detail: Intel Coffee processors are going to be launched before the end of 2017 while the Intel 300 series arrives. So, what will happen?
  9. The Android ecosystem is the most exposed to third-party attacks because they have a larger market segment, which makes it much easier to extend the malware. Now the dangerous family of malware SonicSpy has been distributed in more than 4000 infected apps all over the Internet that have already managed to infect thousands of users around the world, and worst of all is that three of them have crept into Google Play passing The security barriers of Google itself. According to research firm Lookout, the three applications that have passed above the security barriers of Google Play are Soniac, Troy Chay and Hulk Messenger, so if you have any of them in your terminal you may have already been infected With most of your data exposed to external servers. The Soniac application is a messaging service inspired by Telegram that has had more than 5000 downloads on Google Play; While Troy Chat and Hulk Messenger have been less po[CENSORED]r, but also with thousands of downloads behind them. These applications are able to steal our private data from contacts, phone number, voice and video messages and sending unwarranted spam to all our friends. Once the application is installed, and if the attacker has decided by an external command, the device is infected by hiding the application icon to go unnoticed. At that point the attacker can execute up to 72 different commands on our phone to steal all kinds of information that goes to a server hosted in Iraq. It has certainly been one of the most dangerous Google Play malware. From Lookout never recommend downloading an APK from unofficial sources, make exclusive use of Google Play and not from other external markets, and never hit any suspicious links yet sent by one of our contacts.
  10. We currently use computers for many different tasks, from working, browsing, playing or as a multimedia center, to turning your PC into a money-making machine. Yes, just like it sounds. For a few years now the cryptographic currencies, with Bitcoin as the top representative, have made it possible to turn your PC into a machine capable of generating small amounts of money in the form of these criptomonedas, in exchange for solving certain algorithms and managing the Own transactions in this currency. This activity has been known as mining Bitcoins (or any other criptomoneda). The high value of this virtual currency, which currently exceeds 2,000 euros, have raised it to the investment category for the benefits it can bring in the future, and can be an important incentive to put the miner's helmet to your Team and start earning some money with it. However, not everything is as simple as giving the power button on your computer and start making money by mining Bitcoins. The hardware of your computer is a basic factor in mining and will make the difference between making money with the criptodivisas or even losing money by mining Bitcoin. Bitcoin mining hardware, what's the secret? To mine Bitcoin or any other criptomoneda your computer must be permanently solving complex algorithms that will limit the processing capacity of your hardware. The more efficient you are by solving those calculations, the greater the reward. The different virtual currencies use different algorithms in which the computing power of the processor or graphics cards is used more intensely. In the case of Bitcoin in particular, the power of the GPU marks an important difference with respect to the one of the processor, although in others, it is just the opposite. Therefore, having one or several high-end graphics cards will increase Bitcoins mining power of your computer by getting you more Bitcoins in less time. In contrast, installing one or several graphics cards makes it more complicated to recover the investment and opens a door to the fiasco of your PC to mine Bitcoin. On the Internet you can find thousands of analyzes where the power of the hardware involved in mining of Bitcoins is measured by assigning them Hash per second (H / s) as a unit of quantification of their mining power. This power is defined as the hardware's ability to convert an assigned string into a valid hash using the algorithm assigned by the cryptonnet. Depending on the power of the hardware, you can find this parameter expressed in thousands of Hash per second (kiloHash or kH / s), millions (MegaHash or MH / s), billions (GigaHash or GH / s) or millions of millions (TeraHash or TH / s) It is important to have a balanced hardware that offers good power at a very high price, in order to optimize the investment in Bitcoins' mining hardware. The value of electricity in the mines of Bitcoins To finish complicating things, it comes into play the price of electricity that your equipment consumes during the 24 hours of the day that will be working, and that must be deducted from the benefits that are obtained from the mining of Bitcoins. If your hardware is not even able to mine for more than the electricity it consumes for it, the balance will be negative and you will be losing money. In this parameter, the electrical consumption of your hardware is also a determining factor to obtain benefits undermining Bitcoins since, in the medium term, a GPU with a good power for mining of Bitcoins that has a low energy consumption, will be more profitable than one With more power and high power consumption. How to know if my hardware is profitable to mine Bitcoins Internet is full of calculators that, by simply entering a series of parameters on your hardware, can calculate if your hardware is profitable to mine Bitcoins. However, knowing these parameters is not always a simple task, so we recommend you visit the NiceHash Profitability Calculator, one of the easiest options to check your PC's profitability to mine Bitcoins. Once you have accessed the Bitcoin mining hardware profitability calculator, select the mining or GPU hardware from the drop-down list. In this list you will find the most po[CENSORED]r mining devices and GPUs. Then, in Currency, set the Euro as currency and enter the price you pay for electricity in the Electricity cost field. You will find this information in your light bill. Then just click on the Calculate button. Bitcoin's mining performance calculator will not only take into account the purchase price of the hardware you use to mine, but will also take into account the price of electricity and the performance that that hardware offers with the different algorithms that are used For the mining of the criptomonedas since the result can vary of notorious form. In addition, it also shows a series of graphs showing a history of the profitability of such hardware, since a simple change in the drivers can cause an increase in performance, something to keep in mind when choosing the Hardware suitable for your PC to mine Bitcoins. At the bottom of the page, the NiceHash calculator shows you the estimated income and expenses for that hardware, indicating how many Bitcoins you could mine with your hardware and discounting to those gains the cost of the electrical consumption of the hardware in question. In this way, you can see the profit (or loss) resulting from the daily, weekly, monthly or annual mining. Just below this profitability estimate, a data is also shown that is of great importance for the profitability of the mining hardware: ROI or return on investment. Here is the number of days needed to amortize the amount paid for Bitcoins mine hardware, from which time the profits will only be subtracted from the electricity costs, so that the profitability will increase.
  11. In recent times the Mountain View have included new security measures in Gmail to avoid phishing attacks such as suffered a few months ago by its customers, and after instituting an anti-phishing service in Android Gmail, now comes the security measure To the application of iOS following the same mechanics of operation. This verification system against phishing in Gmail is a step further so that users can interact with their email within a more secure ecosystem knowing in advance if the links they receive in their emails are safe or dangerous. With this anti-phishing system in Gmail iOS the user will be able to protect themselves from attacks of third parties that make use of flashy emails to pass through other organizations or people and thus attack the user. The operation of the Gmail anti-phishing system in iOS is very simple and is the same as the one we already have in the Android application. When we receive an email with a link that the system considers dangerous we will be warned by the application of its danger. If we decide to go ahead and click on the link, we will enter a gateway where we will be warned of the possible danger before taking the next step and proceed to the destination of the link. It should be clarified that not all the links that Gmail considers dangerous are really so, and that is why it is left to the free choice of the user to proceed or not to the destination of the same. However you have to be cautious about it and never enter links from unknown or suspicious recipients that come from contacts that we know. This security measure for Gmail is one more step for the user to have a totally safe use experience.
  12. On the first generation of LapBook Air, Chuwi proved that in addition to being an Android tablet maker, it could also bring its full potential to the manufacture of laptops and ultrabooks. The experiment has been a success, so the Chinese brand is already preparing a second generation for its Chuwi LapBook Air. The philosophy of this second generation of the Chuwi LapBook Air remains intact, launching a product so thin and light that you can easily hold it with one hand, thanks to the fact that this second version takes great care of the quality and design in its manufacture. t is a slim and lightweight notebook with a 14.1-inch screen with a fully metal chassis that delivers a weight of only 1.3 kg. This is almost half a kilo less than the previous generation, which brings an elegant appearance thanks to its careful details and the matt aluminum finish. The cover of the new Chuwi LapBook Air includes the Chuwi logo that lights up when you turn on the notebook and features a backlit keyboard to make it more comfortable to use in dimly lit environments. The new version of the Chuwi LapBook Air has also been put on a diet by lowering its profile from the 9 mm we found in the thinnest part of the first generation, to 6 mm that will have this second. As far as the screen is concerned, the second generation Chuwi LapBook Air has opted for a higher screen ratio offering very small frames and a new technology in the manufacture of its screens which reduces the number of layers closer to the LCD panel to screen glass. With this new display technology, similar to that already used for the manufacture of smartphone screens, you get much more vibrant colors and more detailed images from a surface that already shows a pure black. For now, no further details have been provided on the features of the Chuwi LapBook Air, such as the processor it will mount, the amount of RAM memory or the capacity of its battery, but we hope to be able to expand the information on all these details as the Date of presentation of the new generation of the Chuwi LapBook Air of 2017.
  13. Microsoft's strategy has changed dramatically over the past two years. In addition to fully entering the hardware market, in particular with the 2 in 1 Surface and the new Laptop Surface Laptop, it seems to have new plans for its operating system. Windows 10 will have a new version Pro special for companies, which adds to the already announced Windows 10 S. In this way, the company tries to satisfy different needs by diversifying the characteristics of its operating system. A version of Windows 10 for each type of user, a strategy that at the moment seems to be working. W10 is still not the most used OS in the world, a place reserved for Windows 7, but steadily gains ground. Now Microsoft aims high, nothing more and nothing less than companies. Windows 10 Pro already exists, but now comes with various performance improvements that will make it even better for professionals who handle a large volume of data. That's why the new version of the system that will arrive in September will do so with improved compatibility for high-end hardware. This should ensure the best performance on most powerful computers. These are all new features of Windows 10 for Workstations. Support for non-volatile memory modules: the NVDIMM-N format comes fully into the system thanks to the support for these modules Improvement in file transfer: the SMBDirect file management system is incorporated to increase the speed of data transfer between computers of the same network Workstation Mode: Like Gaming Mode, this mode optimizes the resources to improve performance in graphic and video editing and complex calculations ReFS replaces NTFS: the NTFS system has been using Windows by default for years. Now, in the new version of W10 will not be like this. ReFS is faster and stable handling large amount of data Support for PC with four processors: if Windows 10 Pro supports sockets with two processors, Pro for Workstation expands that number to four
  14. During these days the Flash Memory Summit is celebrated in the United States, an event where the specialized brands in storage show their new products and some of those that are in development. Of all, the most positively surprised is Seagate, who has unveiled the SSD that we will all want to try next year. True, it is still in development, but it promises a lot. It still does not have a definitive name, but we do know that it will arrive in PCIe card format. In this SSD, almost certainly the best of 2018, will be able to store up to 64 TB of data, and you will do it faster than ever thanks to its 13 GB / s maximum transfer speed. Of course, this solid state drive is intended for data centers and not for base users, unless you are a person willing to leave a good part of your annual budget to increase the capacity of your PC. It is the same in the case of the Intel Optane, the other aspirants to get a good share of this flourishing market. It is not the only product that Seagate has unveiled, although it is the most exciting. The other two are SSDs, but with "only" 2 and 15 TB capacities respectively, as well as speeds up to 2,200 MB / s. They remain quite impressive specifications for the moment we are in, although they are somewhat diluted by the spectacular performance of the other product that they have just overtaken. SSDs are becoming more po[CENSORED]r, and rightly so. They offer a faster alternative to traditional HDD hard drives, though more unstable in the long run. Of course, considering that its longevity is sufficient for the entire life of a computer, it is the perfect choice for those who want to accelerate the operation of the operating system and certain programs especially heavy. The demand for these components has made some of the materials necessary to manufacture them scarce. In theory, SSD prices should already be firing, but for some reason it is not. However it is not ruled out that they will get worse in the coming months.
      • 1
      • I love it
  15. A San Francisco woman named Amanda Rushing has sued Disney, along with three other software companies, Upsight, Unity, and Kochava, accusing them of collecting information from their minor daughter without her consent while playing the Disney Princess game Palace Pets, and then sell it to advertising companies. In the complaint Amanda Rushing accuses Disney of violating children's privacy laws in 42 children's apps, and sharing this information with advertisers, without parental consent. According to the report, these apps "include software to track, collect and export personal information, along with online behavioral information." In the list there are well-known Disney games like Beauty and the Beast, several of the sagas Disney Princess and Sofia, Star Wars TM: Commander, or the po[CENSORED]r saga Where's my Water: In the United States there is a regulation called COPPA that prevents software companies from collecting personal information from children under the age of 13, without the consent of the parents. This includes data such as geolocation or IP address. The company responded with a statement: "Disney has a robust COPPA compatibility program, and we maintain a strict policy of data collection and use of Disney apps created for children and families. The complaint is based on a misunderstanding Fundamental of the principles of COPPA, which we intend to defend in the trial. " In 2011 one of Disney's subsidiaries, Playdom, had to pay a $ 3 million fine after showing that it illegally collected information from thousands of children under the age of 13, without parental consent.
  16. Welcome
  17. Alphabet, that is, Google, works on numerous technology projects, many of which will never come to light. One of its most secret sections, X, has developed in recent years all kinds of projects, some with great success, such as Google's autonomous car, and others not so much, as the Google Glass glasses. Laboratory X is working on a project called Malta, a secret power plant that would have the ability to store electricity for days, coming from renewable energies. This would help to correct one of the most important handicaps of renewable energies. As everyone knows, electricity can not be stored for long in large quantities. It can be stored on a small scale in batteries, and only for a few days in power plants prepared for it (which are basically huge batteries). With artificially created electrical sources, such as fossil fuel combustion, nuclear or electric power plants, production can be regulated as a function of consumption to waste little electricity. But with clean energies, it is much more complicated. The sun only heats during the day and the wind blows in gusts and with different intensity, so depending on factors like the time of day, the season or the force of the wind, a lot of energy accumulates that is not used or can be stored , And therefore is wasted. In the United States, only 790 megawatts of electricity were stored last year, and only 300,000 Megawatts of electricity per year were lost in California from solar and wind power plants because there was no way to store it. Malta is a secret project by Google that aims to build an electrical plant capable of storing electricity for days. This plant is composed of four deposits, two of them filled with salt, and two others of antifreeze. You can see it in the opening image. Electricity from renewable sources reaches the plant, which turns it into cold steam and heat. The cold keeps the antifreeze, and the heat is stored by the salt. If both substances are well insulated, they can keep both states for days. When electricity is required, this cold and heat is released and the contrast sets in motion turbines, which generate electricity. It is the classic principle of thermodynamics, and it is not the first time it is used to store electricity. Google's contribution is that, in their words, they have been able to isolate salt and antifreeze using conventional materials that are not expensive to manufacture, so this power plant that stores electricity could compete in cost with the current based on ion- Lithium, but storage could last longer. Google already has a prototype running, and ensures that storage facilities can be designed from the size of a garage to that of a power plant. Now it is initiating negotiations to connect a prototype in the real electrical network, and to verify its effectiveness. There is still a lot left, but as X itself acknowledges, electricity storage could be the key to slowing down climate change and reducing fossil fuel use.
      • 2
      • I love it
  18. Computer attacks and other threats from malware or ransomware are becoming a constant in the daily lives of many companies, forcing them to recruit qualified security personnel capable of keeping that constant threat at bay. However, once the threat is stopped, a task that many are not aware of, but which is responsible for finding the traces and digital tracks that the attacking cybercrime has left behind, will allow to gather the evidence or evidence necessary to stop it In the future, or discover how the computer attack occurred so that it does not happen again. Forensic computer analysis professionals should be aware of the hacking techniques used during the attacks to discover the traces that cybercriminals have left, and with them to develop a forensic computer analysis for the purpose of conducting judicial investigations. One of the ways to achieve the necessary knowledge to develop the task of forensic computer expert is to obtain the Professional Certificate of Computer Forensic Analysis (CPAIF) awarded by the computer security consulting firm The Security Sentinel. This certificate is indicated for amateur hacking techniques and professionals of computer security or programming and is obtained by passing the professional course of computer forensics analysis. This non-presential course has a total duration of 180 hours spread over 11 weeks and with a total cost of 270 euros. The methodology of the course is based on an eminently practical distribution, in which 25% of the time spent is dedicated exclusively to the theoretical concepts and techniques of forensic computer analysis, while 75% of the remaining time is spent in To put into practice all the theoretical knowledge learned. In this way, the knowledge learned is immediately implemented in workshops and virtual laboratories in which the real situations in which the students will be encountered in the development of their forensic computer analysis are simulated. Students who want to obtain this professional certificate of computer forensic analysis (CPAIF) can download weekly all the teaching materials and tools they need to put into practice what is learned, being supported at all times by an online tutor who will solve all your doubts. You can test the quality of the course imparted by The Security Sentinel downloading the teaching material of the first week for free and without commitment.
  19. You hate me
    Because you close my post

  20. Someone would like a reaction from me on a video :)

    1. Sinan.47

      Sinan.47

      oya yansa RİP xD hahahahaah 

    2. OyaYansa

      OyaYansa

      hahahahaha xD

       

  21. I think I'm definitely leaving the community :warning-sign:

    1. [D@NI3L]

      [D@NI3L]

      porq vida ?

       

    2. [H]aNier.^

      [H]aNier.^

      ando jodi no puedo entrar al sv u.u

    3. [H]aNier.^

      [H]aNier.^

      abandonaras ?? por que??

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.