Everything posted by Blexfraptor
-
Whenever we talk about PC gamer, computer for video games, we talk about a computer with Windows operating system. There is never any talk of Mac computers for video games, and there is a widespread belief that they do not work for video games. But what is true about it? Because if you look at eSports, for example, or youtubers that are dedicated to video game content, we will also always find that they use a computer with Windows operating system, if this is for reference. Apple uses a very specific hardware on their Mac computers, much more limited - by variety, simply - than the one available for Windows systems - or with another operating system -. And above all, Apple uses a very select hardware in the graphics section. And of course, in terms of software, on Apple computers we have macOS. And both one thing and the other are determining factors in the gaming environment. MacOS has software compatibility limitations that affect video games, but not all If you access Steam, which is the largest computer game platform for computer, you can see that there is a specific videogame catalog for Mac computers. Yes, there are, and besides, there are few that are available, then serve -these computers- to play. Another thing is that they are not the optimal option, besides that the catalog is much smaller. This problem is due precisely to the compatibility limitations of Apple's operating system for computers. There is no support for DirectX, so only video games based on the OpenGL API are available, and they are much less. he reason why developers use DirectX and not OpenGL is because of the performance of one and the other API. There is an eternal debate on this issue, but obviously those who choose DirectX because they consider it the right choice. And taking into account the market share of Apple computers, and more in the gaming environment, is not something that worries too much developers, that their game can not work in macOS. The hardware is not the biggest problem of the Mac, but it is also another barrier for the world of video games In a gaming computer always used dedicated hardware for graphics, dedicated graphics cards and high performance. A large number of Apple computers do not have dedicated graphics. Although the macOS operating system is optimized for the creative environment, for video and photography, a specific graphics processor is necessary for video games, and Apple only includes high-performance dedicated graphics cards in some of its products. Therefore, although in a Mac Mini, for example, we have next-generation processors that are more than valid for video games, in the graphics section we have an Intel UHD Graphics 630, that is, integrated graphics even in the model that exceeds the 1,200 euros. In an iMac, however, we already have a Radeon Pro 555 with 2 GB of VRAM, which in a game like Overwatch is only 31 fps average in 'ultra' quality over Full HD resolution of 1920 x 1080 pixels. That is, its performance is very limited. But then can you use a Mac computer for video games? The computers of Apple itself, certainly can be used for video games. But without any modification, the availability of titles is very limited. And if we choose to virtualize Windows, or use Windows in some way or another to expand the compatibility with video games, we will find limited hardware in the factory settings offered by Apple in the vast majority of its products, simply for the relative to the graphics section. And we can use a dedicated graphics card with an external adapter. But we would be increasingly away from playing with a Mac. The issue is that, with a Mac, as it comes from the factory, we do have a computer suitable for video games, but very limited software and hardware. For all this is a better option a Windows computer if what we want is to enjoy video games to the fullest.
-
V2 text and blur
-
Venezuela's Attorney General, Tarek William Saab, said that a total of 105 police and military officers have been ordered to his office since August 2017 for being involved in drug trafficking cases, and reported that to date twelve have been defendants. "Finally 105 officials from the time we are in this Public Ministry, August 5 of last year, 65 have already been accused (...) and the number of twelve convicted, while 40 officials are waiting" of the "corresponding conclusive act," he told reporters. The official, appointed by the ruling National Constituent Assembly, indicated that among those involved are active and retired officials and that the Prosecutor's Office has opened 65 criminal investigations. Saab said this when reporting on the seizure of 696 vehicles, mostly private, during the last fifteen months for being used for drug trafficking in the country. All are at the disposal of the National Anti-Drug Office (ONA) of Venezuela. The owner of the MP also explained that these vehicles have been captured by the work of the Bolivarian National Guard (GNB) at the checkpoints and thanks to the intelligence work. The drug in these vehicles is transported in a camouflaged manner in legal merchandise and hidden in secret spaces According to him, the drug in these vehicles is transported in a camouflaged manner in legal merchandise and hidden in secret spaces. Saab asked the police and military in the country to be alert to this type of transport of drugs to combat the scourge.
-
V1:size
-
-
We do not win for trouble in terms of vulnerabilities in our processors. At the beginning of the year, the closure with Meltdown and Specter was opened, and throughout the year more vulnerabilities related to these chips have been discovered. Now, a PortSmash call has just been discovered, which affects HyperThreading on Intel processors, and AMD could be affected as well. PortSmash exploits a vulnerability present in Intel's HyperThreading technology, its proprietary technology for dividing a physical core into two independent processing threads. This reduces the time needed to perform tasks in parallel. PortSmash affects the latest Intel processors released to the market The discovered attack allows stealing encryption keys. The researchers used a TLS server with OpenSSL, and verified that it worked with Skylake processors (6th generation) and Kaby Lake (7th generation) under Ubuntu. For this, they sent a series of instructions and carefully measured how long they took to execute. By means of that precise measurement it was possible to deduce the key that you were being processed in another kernel of the same processor. The vulnerability, named CVE-2018-5407, affects both computers and servers, although in the latter it is easier to take advantage of the exploit. Researchers have designed a system that allows you to customize the attack depending on the device you want to attack. Although they have only tested it with chips based on Skylake and Kaby Lake, the researchers claim that subsequent architectures are also affected, and are vulnerable through a slight modification of the exploit. They also suspect that SMT, the equivalent of AMD's HyperThreading, is also affected. One of the most viable scenarios for this attack implies that an attacker obtains access credentials to a server environment where there are several people using virtual environments, allowing to know the information that is running in other processes running in parallel on the same server. Specter could be exploited through a JavaScript that we downloaded from a website, and although they have not been able to verify it with PortSmash, they affirm that it should be possible to do something similar. The only solution is to disable HyperThreading In June of this year, another vulnerability of HyperThreading called TLBleed was discovered, which also allowed to know encryption keys, and where the researchers managed to guess an encrypted key of 256 bits. This caused the OpenBSD developers to decide to disable HyperThreading, and recommended doing the same with SMT on computers with AMD processors. Currently, the only way to protect us from this attack is to disable HyperThreading and SMT in the UEFI / BIOS of our motherboard, with the consequent loss of performance. In the case of OpenSSL, it is recommended to upgrade to version 1.1.1 or higher in order to be protected against this attack. If you buy a 9th generation i3, i5 or i7 processor, you will be protected against this failure since these new chips do not have HyperThreading.
-
Today's mobile phones have long since become true handheld computers, but in recent years, the technologies that have reached these small devices have made us currently do things with our phones that we did not think recently. We were going to be able to do and that is not easy to find on a computer either. In this sense, security systems or biometrics have evolved much more in mobile, to the point that, today, many smartphones have a fingerprint reader, and even facial recognition. Artificial intelligence is also increasingly reaching mobiles, which makes this combination of technologies, get our phones are increasingly smart and we are more surprised their capabilities. If we talk about artificial intelligence and facial recognition, then we can not stop talking about the manufacturer Huawei, which has incorporated into the Huawei Mate 20 Pro a processor, the Kirin 980, with two neuronal processing units. In addition, in the multimedia section, it incorporates a Leica triple main camera. The main lens is a wide-angle lens and f / 1.8 aperture of 40MP which is accompanied by another 20MP wide-angle lens with aperture f / 2.2 and an 8MP telephoto with aperture f / 2.4. A camera that also supports AIS, Huawei AI Image Stabilization, a system that makes use of artificial intelligence to stabilize the image. The front camera projects more than 30,000 points on the face to recognize us In the multimedia section of the Mate 20 Pro it must be added that, in the front part, it incorporates a 3D depth detection camera. This means that the lens incorporates a 3D scanner capable of scanning your face to identify you using a system that projects more than 30,000 points on the face, invisible to the human eye, and that allows detecting the depth and shape of our face to be able to recognize it, even at night. This means that unlocking the mobile phone through easy recognition has improved a lot, both in terms of security and the speed with which it is able to recognize us. And it is that the system of camera of detection of depth 3D of the frontal camera, is able to read with great precision and of fast form each one of the factions of our face to recognize us. In addition to unlocking the phone, the easy recognition can be used in the Huawei Mate 20 Pro, to securely access a private screen where we can access certain applications that we want to protect and personal data. The 3D depth detection camera is also capable of creating holograms of 3D objects But this 3D depth detection camera can also be used to scan objects. To do this, just use the front camera and focus on the object trying to show from all angles so you get a total perception of the object that we are scanning. Once this is done, you will create a 3D model of the object with which you can take photos and even be able to react to people's movements. It is also useful to share these creations on platforms that support 3D objects such as Facebook itself, since it is capable of recreating an object as a hologram thanks to artificial intelligence. Holograms that can also be animated thanks to certain software so that the experience with these capabilities is even better.
-
Dozens of Central American immigrants, who belong to the caravan that left San Pedro Sula (Honduras) on October 13, arrived in Tijuana, Mexico's border with the United States. UU., And climbed the wall that divides them from the North American country. Raffling a race of constant obstacles, the first large immigrant caravan met this Tuesday a month of a rough road and mined threats of President Donald Trump, but remains determined to achieve the American dream. Meanwhile, Defense Secretary James Mattis traveled to the Mexican border on Wednesday to learn about the status of troops deployed in the area, whose mission is to prevent undocumented immigrants from entering the country. The immigrants arrived on foot to the area of Playas de Tijuana where the border fence goes into the waters of the Pacific, under the eyes of the Border Patrol agents. Despite the presence of the agents, a score of members of the immigrant caravan scaled the metal poles that serve as dividing walls. For this Thursday, the arrival of at least 2,000 more migrants in buses is expected, federal authorities said. A group of almost 100 transsexuals and some homosexuals arrived in Tijuana on Sunday; on Tuesday 350 migrants arrived and yesterday, another similar figure. They were all members of the great caravan. Excited, some of them ran to the beach of Tijuana to bathe and put their heads between the metal bars of the border to see their dream destination. Two jumped the high metal fence that divides both countries and wrote in the sand on the US side the word 'catracho', which means Honduran, and shortly after they returned to Mexican territory under the eyes of the border guards. Another, a Guatemalan, jumped the fence and peacefully surrendered to agents of the US Border Patrol. UU., Who took him under arrest. The objective of the migrants is that EE. UU grant them refugee status due to the extreme violence and poverty that they live in their countries, but to achieve this they must cross through an official access, according to a decree signed by President Donald Trump on November 9. The mission of the United States Army is collaborate with the customs authorities in medical treatment and transport tasks, as well as in the construction of temporary accommodation for troops and border agents. This caravan departed on October 13 from San Pedro Sula, Honduras and an outpost, formed by a hundred members of the lesbian, gay, bisexual and transgender (LGBT) community, is already in Tijuana and plans to request asylum from the US authorities. in the coming days. Others have reached the state of Sonora. In its journey through Mexico, the caravan reached 7,000 members, according to the United Nations, but many have given up on the road to reach 6,011 (of which 902 are minors) who arrived in Guadalajara, according to figures from local authorities. In addition to Hondurans, immigrants from Chile, Colombia, Costa Rica, El Salvador, Guatemala, Mexico, Nicaragua, Panama, Peru and Venezuela joined. To this great Caravans are followed by two others at a distance, with some 2,000 immigrants each, while smaller groups went to the frontier. The obstacles of Trump Before the imminent arrival of the immigrants, the United States partially closed with barricades and barbed wire the border posts of San Ysidro and Otay Mesa, which lead to California. On November 9, Trump decreed the end of asylum requests for those who enter the United States illegally, a measure that seeks to dissuade Central Americans seeking their American dream to escape the poverty and violence of their countries. With that measure, the Trump administration seeks to get the Mexican government to take care of the immigrants, by sti[CENSORED]ting that the decree will lose its validity if an agreement is reached that "allows the United States to expel foreigners to Mexico." According to the US government, border patrols registered more than 400,000 illegal entries in 2018. And in the last five years, the number of asylum seekers has increased by 2,000 percent, overflowing the system, which has more than 700,000 cases accumulated to process . Trump accuses the immigrants of staging an "invasion" and to contain them ordered the sending of up to 9,000 soldiers to the southern border. They wait for asylum As the afternoon falls, Claudia Vicente's hopes fade. The Guatemalan immigrant has been waiting for eleven days at the border post of Nogales, in the state of Arizona, to present her petition for asylum in the United States. This mother of two children, aged 6 and 8, carries in a suitcase a few belongings that reflects the urgency of her journey: Two changes of clothes, a pair of sweaters and some old photographs of her deceased mother three years ago. "We have no other option, if we did not leave Guatemala they would kill me and my children too," said the 32-year-old immigrant and, like many of the women who arrive to the United States border, victim of domestic violence . The father of her children hit her repeatedly after getting drunk We have no other option, if we did not leave Guatemala they would kill me and my children too The undocumented woman is part of a group of more than 60 families who are in the border city of Nogales, Sonora (Mexico), in order to present a formal request for asylum to the US authorities, according to estimates made by local organizations. favor of immigrants. Some of these families wait outside the Deconcini port of entry, while others stay in immigrant shelters. Very close to where immigrant families wait, you can see the barbed wire that American soldiers placed this week, to try to prevent the undocumented from climbing the border wall. "We are trying to follow US laws, waiting our turn to be able to ask for political asylum," said José Manuel García, a 28-year-old Salvadoran who travels with his wife and daughter, and has been waiting at the border for seven days. The National Institute of Migration of Honduras said that 7,000 nationals who left the caravan returned to the country voluntarily.
-
Welcome to CSBD ? Read Rules
-
Last October, information leaked that Apple had started to include T2 encryption chips in their Mac computers. This chip helps protect the data stored in the computer's drives, but prevents third parties from easily repairing the device, Only Apple can do it with the right machine. Now, Apple has confirmed that this is the case. Apple confirms that the T2 chip prevents an unauthorized third party from repairing your Mac If you bought a MacBook Pro or an iMac Pro from 2017 on, these will include the T2, an ARM chip designed to manage aspects such as Siri, Touch Bar or Touch ID, as well as all the security elements. However, if you try to replace some laptop components, it will be blocked. Therefore, you will be forced to take it to an official Apple store. This has been confirmed by Apple after various media had access to T2 chip documentation where aspects like that were discussed. The tool required to replace components is called AST 2 System Configuration Suite, and is only distributed to official Apple Store and authorized repair centers. Any repair attempt on your own will make the device unusable, and force again to take it to the Apple store to unlock with that machine. In order to use it, it is necessary to have a username and password, and to be always connected to the Internet. It is still not known exactly from which models the blockade is active As Apple has confirmed to The Verge, replacing items such as the motherboard, the storage chip or the Touch ID sensor of the latest Mac can not be made by unauthorized third parties. Although not confirmed, this T2 chip would also be present in the new MacBook Air and Mac Mini announced a few days ago. From iFixit say that the T2 is a "guillotine that Apple is holding above the neck of their customers." It is known that Apple is trying to block any interaction of third parties with the inside of their devices, even arguing to the customs offices that batteries or parts with their logos are fakes and copies of their products. They bought a MacBook Pro a month ago, and they tried to change the screen. Interestingly, the chip was not yet active, since they could continue using the laptop without problems. They also tried updating Mojave and changing the motherboard. Therefore, it is possible that, if the components are previously validated by Apple, the change can be made. Apple has for years opposed the right of its users to repair, making it increasingly difficult. For example, the use of screws of various sizes and different heads only seeks to make it difficult for users to repair their devices.
-
Word is undoubtedly one of the most used tools within the office suite of Microsoft, Office. And that is that every day, there are many millions of people who use Word to create or modify documents. However, Office and consequently Word, is a payment tool, since in order to install and start using Office on our computer, we must buy a license. This makes many other people look for free alternatives to Word to work with their documents. The problem is that, since the vast majority use Word, they may send us a doc or docx document at some point and we can not open it without using Microsoft Word. Next, we will show how we can open a doc or docx without Word. Another quite probable situation is to receive a Word document by email and not have Word installed on that PC, therefore, in this circumstance, it is also interesting to know how we can open a doc or docx without Word. We know that many already know all the alternatives that there are to the Office suite, but it is likely that many who have given everything installed do not know what to do when they encounter a document in Word and their license has expired or in Your new laptop does not have the Microsoft word processor. For them it is for those who go this report in the review how you can open a doc or docx even though we do not have Word in our team, including some tools and other options that do not require having to install anything. Different tools to open a doc or docx without Word The first option is to use the online version of Word. To do this, simply go to the Office site online and start with our Microsoft account. Once there, we have the option to open a doc or docx document that we have in our storage space in OneDrive or on our hard drive. If we have previously uploaded to OneDrive just click on the option Open from OneDrive that appears in the bottom right as soon as you enter Word online, while if we have it saved on the disk we can select it from the option Load a document that it appears at the same time in the upper right. Another alternative to open a doc or docx document without Word is to use Google Docs, since Google's online tool is compatible with this type of files and we can open a doc or docx without Word without any problem, yes, we must support in Google Drive, since that is where we will have to have the document to be able to open it in Google Docs. Therefore, first of all, the first thing we have to do to open a doc or docx without Word through Google Docs is to upload that file to our Google Drive account. Once there, we can go to Google Docs, log in with our Google account and then from the menu select the option Drive. This will open our Google storage service unit and then we can select the document we want to open. Opening a doc or docx without Word from the browser is also possible with other tools such as the extension that we are going to show next. The extension in question is called Chrome Office Viewer and as its name suggests, it offers a document editor from the Google Chrome browser itself. To start using that extension, all we have to do is follow this link to the Chrome Web Store and install Chrome Office Viewer in our browser. Once this is done, to open a doc or docx document without Word in our PC, we only have to open a window or tab of Chrome, go to the file explorer of our team, select the document that we want to open in Word, drag it to the Google Chrome tab and drop it. Automatically we will see how the Word document is displayed in the browser and from there we can edit it, make the changes that we believe appropriate and then re-save it with the same format. There are some free tools that are compatible with the doc and docx file formats, therefore, we can use any of them to open a doc or docx document without Word. LibreOffice is perhaps one of the most po[CENSORED]r, but there are other