Jump to content

Blexfraptor

Members
  • Posts

    2,189
  • Joined

  • Last visited

  • Days Won

    9
  • Country

    Venezuela, Bolivarian Republic Of

Everything posted by Blexfraptor

  1. Welcome ?
  2. Amazon has been renewing its Kindle in recent years with new models that have added improvements in the quality of text or functions such as waterproofing. In 2015 they launched a new Paperwhite, while in 2016 they updated their Kindle. In 2017 they launched the Oasis, larger and waterproof. Now, this last feature comes along with many others to the new Kindle Paperwhite of 2018. Kindle Paperwhite 2018: hardware-level improvements on the most po[CENSORED]r Kindle This new Paperwhite has the same IPX8 certification as the Oasis, and can submerge it up to 2 meters for 60 minutes. The screen maintains the same size of 6 inches as the previous model and the same resolution (300 dpi), but offers greater contrast and good readability with different ranges of light. It also has a night mode or the option to put black background. In the surroundings of the screen we find five LEDs to be able to use it without external light, in a similar way to what the previous model included. At the software level, the homepage has been redesigned, offering new reading lists, new recommendations based on your reading history, free books if you have Kindle Unlimited or Prime Reading, and a series of "fun facts" related to your tastes. . The battery life is up to 6 weeks with a single charge (which takes around 3 hours). Reading personalization is also made easier, being able to change sources, the bold level, or the orientation of the main menu. These software functions will also reach the rest of Kindle devices after 2013. The other software functions that include these devices are maintained, such as WhisperSync to synchronize the last page read between devices and app, the remaining reading time to finish a chapter or a book based on the speed of reading, or the possibility of revising vocabulary later if there is a word that we have not understood. Two models available: one of 8 GB, and another of 32 GB with eSIM The size of this model is smaller than that of its predecessor (8.18 mm thick), in addition to being lighter (182 grams). The base storage capacity has doubled, with two models now available for sale in Spain. 8 GB of storage and WiFi: 129.99 euros (same price as the current model) 32 GB of storage, WiFi and eSIM: 199.99 euros As we can see, the most expensive model adds the eSIM chip with free 3G connectivity to be able to access the Internet from anywhere. The pre-sale of the new Kindle Paperwhite will open tomorrow, October 16, and will be on sale from November 7. There will be available slim design covers that adapt perfectly to it, with a lid that will activate the device immediately after opening. The price of the premium leather covers will be 49.99 euros, while the basic leather ones will cost 34.99 euros (available in black, garnet, reddish and purple indigo). There will also be water resistant cases for 29.99 euros each, available in anthracite black, canary yellow and navy blue.
  3. During the past month, not long after the Cambridge Analytica scandal, Mark Zuckerberg's company was affected by the biggest security flaw in the history of the social network. At first spoke of 50 million affected users, approximately, and now Facebook has nuanced the details. They confirm that there were 29 million user accounts that the hackers had access to, and what data they were able to 'steal' from these attackers. There have been just over 29 million users worldwide - those who have been affected by the security breach of the social network; now the data has been confirmed, and the company states that linked 'third party' services have not been affected, and that financial information and passwords have not suffered any problems. Of these 29 million accounts, what has been 'stolen' is the telephone number, email or both, of 15 million people. And of the other 14 million has been accessed information such as name, gender, location and language, marital status -declared in the social network-, city of birth, city of residence, date of birth, devices used to access the social network, the 15 most recent searches, the last 10 places visited and the level of education. Everything that hackers could steal from 29 million users of the social network Facebook, according to the company itself has explained In the last communication, from Facebook, in an attempt to be more transparent, they explain that a set of accounts of the social network that the attackers already had under their control was used. With these accounts they were stealing information from profiles automatically, with the links of friends, and friends of friends, with approximately 400,000 people. They have not been able to access data from Oculus, Pages, WhatsApp, Instagram or Messenger, among other services, nor to third-party apps or advertising and development accounts, but the information they have had access to has not been small. . Mark Zuckerberg's company continues its investigations, and they have been trying to resolve the security breach for two weeks. But new attacks on a smaller scale are not ruled out; Meanwhile, the social network is working with the corresponding authorities in the United States and Ireland to find out who carried out the attack against the platform. On this page we can see if our account is among those affected.
  4. Although the government of Saudi Arabia denies that it has given the order to assassinate the critical journalist of the monarchy of his country, everything indicates that it will be very difficult for them to evade their responsibility in what happened. Turkish authorities think he was killed and dismembered with a saw inside the consulate and claim to have proof of the fact. The Secretary of State of the United States, Mike Pompeo, is in Riyadh urging King Salman bin Abdelaziz to clarify what happened and already managed to commit to a "comprehensive, transparent and timely" investigation. Pompeo will travel to Istanbul on Wednesday to also meet with President Recep Tayyip Erdogan. But from Ankara, the Turkish president denounced that although permission was obtained to register the Saudi consulate in Istanbul, where the crime was allegedly executed, the Turkish police investigated "toxic" and "things that were eliminated by painting on top". "There is an investigation of what are and what are not a few things that were eliminated by painting on top, toxic substances, etc.," Erdogan told reporters after a speech in Parliament, according to the newspaper Cumhuriyet. In full investigation for the suspicions of murder of the journalist in the consular offices, and before the Turkish police proceeded to a register of his residence on Tuesday, the Saudi Arabian consul in Istanbul left Istanbul and returned to his country by plane. To which was added an additional finding. It was known that the journalist had entered the consulate with an Apple watch synchronized with a cell phone that he left in the possession of his fiancée, Hatice Cengiz, who was waiting for him outside the consular headquarters. Already the Turkish press went further. According to the Turkish newspapers 'Sözcü' and 'Milliyet', audio recordings that are currently being examined by Turkish justice were transmitted to the phone through the clock. While Milliyet affirms that shouts and a fight were registered, Sözcü informs that in the recording dialogues can be heard, but not shouts, in this audio "of several minutes". The Turkish newspaper close to the government 'Sabah' says for its part that Jamal Khashoggi recorded with his watch his own "interrogation", the "tortures" he suffered and his "murder" inside the Saudi mission. However, no official confirmation of this information could be obtained. US media reported on Monday that Riyadh plans to acknowledge that Khashoggi died in his custody in an interrogation that got out of hand. Although it also raises justify that the alleged intelligence officers responsible for the murder did so on their own to clear a possible responsibility for the monarchy, and especially Crown Prince Mohammed bin Salman, who was the main object of criticism of the missing journalist . According to CNN, which cited two anonymous sources, Riyadh would have prepared a report to try to minimize its involvement in the disappearance of Khashoggi. According to the Wall Street Journal, this would allow the royal family to "get rid of direct involvement" in Khashoggi's death. For now, Saudi Arabia is beginning to suffer consequences for what happened. On Monday, the Saudi stock market recovered after a black Sunday caused by the Khashoggi case. The British millionaire Richard Branson decided to freeze his projects in the country. And several personalities decided not to participate in the second edition of the Future Investment Initiative forum, the so-called 'Davos in the desert', to be held in Riyadh from October 23 to 25. This is the case of James Dimon, CEO of the US bank JPMorgan Chase, which according to the US press on Sunday night was no longer on the guest list. Nor will media such as the 'Financial Times', the 'New York Times' or 'The Economist' or the Uber boss. For many multinationals, going to this conference carries reputational risks that "outweigh the benefits they could have derived from the Saudi economy," according to Michael Stephens of the London think tank Royal United Services Institute. Endeavor, one of the leading talent firms in Hollywood, plans to cancel a $ 400 million contract with the Saudi kingdom, which last March negotiated the acquisition of minority shares in the company, coinciding with the economic deployment of the country in the entertainment industry
      • 1
      • I love it
  5. Lil Pump

    1. Blackfire

      Blackfire

      he is new memebrs here

      lil pump is rip

      stop saying to every single member lil pump . forget it dude xd

    2. Blexfraptor

      Blexfraptor

      WELCOMEE ? 

      Gift xd

  6. Topic/Closed Regards:Blexfraptor
  7. the first 3 people who answer this will receive an avatar gifts...

    Model

    Text:

    Stock (Required):

  8. Intel announced yesterday the Intel Core i9-9900K, the Intel Core i7-9700K and the Intel Core i5-9600K, its new mid-range and high-end processors within the mainstream segment. These chips, together with the Z390 motherboards, will be his bet for next year using 14 nm, even though AMD will launch 7 nm chips in just a few months. Specter and Meltdown are no longer a problem with each generation of Intel Although they are 14 nm, and are a "refresh" of Coffee Lake, these processors have various modifications inside. In addition to having more cores and more frequency, all 9th generation processors are protected against Meltdown and Specter at the hardware level. Thus, in addition to having "the best processors to play", Intel confirmed in the presentation protection against some of the vulnerabilities that were related to Specter and Meltdown. However, not all are fixed, and for now the thing is like this: Specter V1 (Bounds Check Bypass): protection in the operating system Specter V2 (Branch Target Injection): protection in microcode and software Specter V3 (Rogue Data Cache Load): hardware protection Meltdown V3a (Rogue System Register Read): protection in the microcode Meltdown V4 (Speculative Store Bypass): protection in microcode and software Meltdown V5 (L1 Terminal Fault): hardware protection The main novelty is found in Meltdown V3 and V5, which until now were patched by firmware. From now on, those protections will be hardware. The rest remain as they were in previous processors. These modifications are not available in the Skylake-X processors of 9th generation presented yesterday, since these chips do not make changes at the silicon level, which does Coffee Lake-R. Vulnerabilities barely have an impact on the performance of processors Little by little Intel is incorporating security improvements in these processors, and it is expected that all vulnerabilities will be patched in the future through hardware. In fact, the Specter V2 variant is patched by hardware and by operating system in the Cascade Lake processors. Thanks to these hardware solutions, Intel processors will gradually improve their performance; not only for the improvements that each generation brings, but that up to 8% of performance that was lost by applying the patches will decrease. From the own Intel they affirm that the loss of yield by the solutions applied in these processors is already almost non-existent. Variant 1 will be the most difficult to fix, since it requires deeper changes at the design level.
  9. Although cryptocurrencies have been losing importance at a rapid pace, at the end of last year almost all of them reached their maximum historical values. That led to threats of ransomware-type malware and malicious mining tools growing exponentially. Many of these malware threats still remain; the last one that has been discovered promises to be an Adobe Flash update. And in reality, it is a mining software that mani[CENSORED]tes the CPU of our PC to extract Monero. False updates to Adobe Flash have been used for years to trick the user into installing malicious software on their computer. Although Flash is practically dead, users still believe that they need to apply an update on their computers, for example, to continue watching some video content. There are still sites that use Flash for the reproduction of content, but HTML5 -native- is the solution that is already used in platforms such as YouTube, for example, and many other streaming video platforms. Be that as it may, under this pretext they are spreading malware to users since last August. It is not an update of Adobe Flash, but a mining tool that uses the CPU of your PC in a malicious way The truth is that an update of the computer software is applied, but the installation of XMRig is included in the fake Adobe Flash installer; that is to say, that without the user detecting it, a cryptocurrency mining software is being installed on his computer which, as is evident, he has never requested. So, as a result of the installation, you may notice that the computer loses performance because the CPU is working constantly for the mining of Monero. And although Windows warns that the installer comes from an unknown editor, the installer seems legitimate and users accept the installation. To avoid this type of problems, it is best to download installers only from reliable sources and, of course, have an updated antivirus on your computer. If we notice that the work of the CPU is anomalous, we can always review what process is demanding in excess and locate the malicious tool that is mining cryptocurrencies with the CPU of our computer.
  10. The Venezuelan government reported on Friday the release of former student leader Lorent Saleh, who had been in custody since September 2014 and was considered a political prisoner. Saleh will be sent to Spain as part of a reconciliation plan promoted by the Executive of Nicolás Maduro. The state channel VTV published a statement indicating that the Truth Commission created by the ruling National Constituent Assembly (ANC) recommended releasing the 30-year-old opponent for suicide risk. "During the time of his arrest (Saleh) he was subjected to various psychological evaluations, manifesting violent, destructive and suicidal behaviors that endangered his personal integrity," says the letter. Due to these circumstances, the commission "made a set of recommendations aimed at reducing the risk it could represent in these conditions" and these suggestions were accepted by the judiciary that ruled on Thursday precautionary measures. #Now Lawyer Omar Mora Tosta: "You see how this works, you never took into account either your team of lawyers or your relatives," he says about the release and exile of Lorent Saleh # 12Oct pic.twitter.com/ESSw44OJBE - Efecto Cocuyo (@EfectoCocuyo) October 12, 2018 "Today the aforementioned citizen moved to Spain in the company of authorities of the Government of that country in response to the request made," the statement continues. The Government recalls in its statement that Saleh "was deprived of liberty for his participation in the commission of crimes against the constitutional order in the framework of serious actions aimed at generating violence, destabilization and alteration of peace." Specifically in 2011, he was accused of "spreading false information that causes anxiety," after being arrested with slingshots and other materials used in protests, but escaped from Venezuela. He was arrested in Colombia and deported to Venezuela in 2014 at the decision of the then Colombian president, Juan Manuel Santos, and on his arrival he was accused of three other crimes. His mother, Yamileth Saleh, went to the doors of the Bolivarian Intelligence Service (Sebin) in Caracas on Friday to wait for her son to leave without knowing, he told reporters, that he would be banished. # Context Moment in which the mother of Lorent Saleh, imprisoned in the Sebin for four years, confirms that he received a call from his son, who is in Maiquetía to take a flight to Spain # 12Oct pic.twitter.com/ QoeKxIwny1 - Efecto Cocuyo (@EfectoCocuyo) October 12, 2018 The young man won in 2017 the Sakharov Prize awarded by the European Parliament. The so-called reconciliation plan promoted by Chavismo seeks to establish a formal dialogue between the government and the opposition to seek solutions to the institutional crisis the country is experiencing. The ex-president of the Spanish Government, José Luis Rodríguez Zapatero, is leading these efforts and has managed to bring both parties together a couple of times but the talks have ended without agreements.
  11. Welcome
  12. V1 Text
  13. Good Morning Guys

  14. Currently the smallest lithography available is the 7 nm TSMC for the iPhone XS, XS Max and XR with the Apple A12 Bionic. In 2019 Samsung will be added, and AMD will launch the first processors and 7 nm graphics cards. However, IBM is starting to see the results of its investment beyond 7 nm, and has achieved an interesting innovation related to graphene. The "7 nm and beyond" initiative continues to bear fruit Four years ago, IBM announced that it would invest 3,000 million dollars over a period of 5 years to investigate the future of nanoelectronics under the "Beyond 7 nm" project. And, although some manufacturers know more or less where they are going to shoot to create lithographs of 5 and even 3 nm, there are many doubts about what will happen next. However, IBM researchers have published research in which they have managed to apply electricity to graphene to help deposit the nanomaterials on the substrate with 97% accuracy. Michael Engel, head of development at IBM Brazil, explained that this process can lead to the creation of a hybrid system that combines different techniques to develop electronics over lithography. In the demonstration, they cultivated graphene on silicon carbide, then peeled the graphene and put it on a silicon oxide wafer. This is the most logical material for semiconductors, and it is the one used now, but Engel says it could also be made with copper. Later, it was defined where the graphene was going to be placed and an electric field of alternating current is applied to the graphene layers while depositing the nanomaterials in the upper part. The nanomaterial creeps down and becomes trapped between the opposing graphene electrodes. With this, graphene defines the location and orientation of the electric field so that the nanomaterial is deposited. In the fourth step, the graphene deposition electrodes are discarded, and finally final steps are taken to integrate the final electronic devices. Main problem of this system: its large-scale implementation Until now, the best available technology used metal electrodes, which are difficult to remove and limit the performance and potential integration of the final device when leaving grooves. This is one of the great improvements introduced by graphene, which allows to dispose the nanomaterials without residues, and limit the exposure to chemicals in the final device. With this system also achieves a greater precision at the time of placing the nanomaterials, so that the door is opened to lower nanometers. This process, although hopeful, will not be an immediate solution to the impossibility of continuing with Moore's Law at present. The main problem they face at the moment is to use it on an industrial scale. First, it is necessary to standardize the solutions of nanomaterials to achieve consistent and repeatable results, in addition to adapting the use of the electric field method.
  15. Although perhaps many of you do not know, one of the most significant ways in the current times to filter private data of users when making use of the Internet, is through our web browser. In fact this filtering to which we refer, can not be even solved by the increasingly po[CENSORED]r VPN or virtual private networks, since all this is foreign to the service they usually provide. Well, to give you a more accurate idea of all this, then we are going to make a summary of the most important types of data that we are making known, unwittingly, to these programs increasingly used in all types of platforms and devices. Hardware and Software To begin we will say that as a general rule, the web browser that we use daily, collects a large amount of data about the hardware of our team, as well as part of the software we have installed. In this way the program knows the operating system that we use, our IP address, or the add-ons and extensions we use. At the same time and if we focus on the hardware, here is gathered information as important as the installed CPU, the GPU, or the battery of the equipment. One of the options to reduce leaks in this regard, is making use of a plugin focused on the privacy of users, such as the well-known NoScript. Geolocation This is a section that, as mobile devices have been advancing and gaining in features and versatility, at the same time has been extended. Specifically, we refer to the way in which the web browser itself knows exactly where we are at each moment, all thanks to the geolocation it uses. Thus, a website can accurately estimate our location, even if we have not given access to our GPS coordinates. Instead, you can use the Google API for these tasks, even if we are accessing the web from a browser on a mobile device. We will say that to avoid this type of actions related to geolocation and that the browser filters the data of our location, we can always use a web proxy to access the websites, among which we can also find several free alternatives. At the same time if we do not want Google to be able to use the aforementioned API, we will have to disable JavaScript in the software or, once again, use applications such as NoScript Browsing history One of the most known types of data that our browser collects about us while we are using it, is the browsing history. Of course we can always delete this navigation data, however it is worth knowing that even then, this history may not have disappeared completely. As an example, in the middle of this year, that is, just a few months ago, it was learned that Google keeps records about the way we use Chrome in relation to the deleted data, even if they were deleted, which includes this history of which we speak. With everything and with it it will never be more than every so often we make a cleaning of the data that is stored automatically in these browsers. Mouse movements One of the most curious types of data we can find and that these programs are able to filter to third parties, are the movements that we constantly make with the mouse, in addition to the clicks that we carry out on the websites that we visit. As a demonstration of this and for you to see this section in action, we recommend you take a look at this free web tool. Where we have our device In mobile terminals in recent years, it is more than usual that we find elements such as built-in gyroscopes, since these sensors are used in a multitude of applications, although they are also used to perform monitoring and status tasks, all based on the movements that we make. Well, these data are collected, among other sections, through our browser, because the software knows if the device has a gyroscope, a compass, or other similar sensors to know where we are at that time, in addition to other details technicians What's more, the program can even know where the terminal is physically: on a table, in a backpack, or in a pocket. Social network information As expected, these programs that we are talking about collect personal information about the social networks to which we are connected, all while we move through them and interact with other users. At the same time we will say that the browser is prepared to relate this information collected with other types of data, all this so that advertisers, for example, know where and how to contact us and thus achieve maximum impact and success. Fonts, language and photographs On the other hand, we will tell you that these programs also know exactly the sources that we have installed on our computer, in addition to the language in which we are using the operating system. In addition, it is interesting to know that each time we upload a new image using our favorite web browser, it is scanning the metadata of the file to know more about us. And of course, these metadata can include information such as the location, the resolution of the image, the technical specifications of the file, or even the camera model we use to take the photograph. Technical information To conclude, we will tell you that in addition to everything discussed so far, these Internet browsers so widespread today, also collect large amounts of technical data on how we are accessing the web. These data to which we mention, include the user agent of the browser itself, if we have touch screen support, if the heading "Do not track" or DNT is enabled, the size of the screen, and many other things.
×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.