Jump to content
Facebook Twitter Youtube

Blexfraptor

Members
  • Posts

    2,189
  • Joined

  • Last visited

  • Days Won

    9
  • Country

    Venezuela, Bolivarian Republic Of

Everything posted by Blexfraptor

  1. Congratulations again for the V.I.P

  2. the first 3 people who answer this will receive an avatar gifts...

    Model

    Text:

    Stock (Required):

  3. Intel announced yesterday the Intel Core i9-9900K, the Intel Core i7-9700K and the Intel Core i5-9600K, its new mid-range and high-end processors within the mainstream segment. These chips, together with the Z390 motherboards, will be his bet for next year using 14 nm, even though AMD will launch 7 nm chips in just a few months. Specter and Meltdown are no longer a problem with each generation of Intel Although they are 14 nm, and are a "refresh" of Coffee Lake, these processors have various modifications inside. In addition to having more cores and more frequency, all 9th generation processors are protected against Meltdown and Specter at the hardware level. Thus, in addition to having "the best processors to play", Intel confirmed in the presentation protection against some of the vulnerabilities that were related to Specter and Meltdown. However, not all are fixed, and for now the thing is like this: Specter V1 (Bounds Check Bypass): protection in the operating system Specter V2 (Branch Target Injection): protection in microcode and software Specter V3 (Rogue Data Cache Load): hardware protection Meltdown V3a (Rogue System Register Read): protection in the microcode Meltdown V4 (Speculative Store Bypass): protection in microcode and software Meltdown V5 (L1 Terminal Fault): hardware protection The main novelty is found in Meltdown V3 and V5, which until now were patched by firmware. From now on, those protections will be hardware. The rest remain as they were in previous processors. These modifications are not available in the Skylake-X processors of 9th generation presented yesterday, since these chips do not make changes at the silicon level, which does Coffee Lake-R. Vulnerabilities barely have an impact on the performance of processors Little by little Intel is incorporating security improvements in these processors, and it is expected that all vulnerabilities will be patched in the future through hardware. In fact, the Specter V2 variant is patched by hardware and by operating system in the Cascade Lake processors. Thanks to these hardware solutions, Intel processors will gradually improve their performance; not only for the improvements that each generation brings, but that up to 8% of performance that was lost by applying the patches will decrease. From the own Intel they affirm that the loss of yield by the solutions applied in these processors is already almost non-existent. Variant 1 will be the most difficult to fix, since it requires deeper changes at the design level.
  4. Although cryptocurrencies have been losing importance at a rapid pace, at the end of last year almost all of them reached their maximum historical values. That led to threats of ransomware-type malware and malicious mining tools growing exponentially. Many of these malware threats still remain; the last one that has been discovered promises to be an Adobe Flash update. And in reality, it is a mining software that mani[CENSORED]tes the CPU of our PC to extract Monero. False updates to Adobe Flash have been used for years to trick the user into installing malicious software on their computer. Although Flash is practically dead, users still believe that they need to apply an update on their computers, for example, to continue watching some video content. There are still sites that use Flash for the reproduction of content, but HTML5 -native- is the solution that is already used in platforms such as YouTube, for example, and many other streaming video platforms. Be that as it may, under this pretext they are spreading malware to users since last August. It is not an update of Adobe Flash, but a mining tool that uses the CPU of your PC in a malicious way The truth is that an update of the computer software is applied, but the installation of XMRig is included in the fake Adobe Flash installer; that is to say, that without the user detecting it, a cryptocurrency mining software is being installed on his computer which, as is evident, he has never requested. So, as a result of the installation, you may notice that the computer loses performance because the CPU is working constantly for the mining of Monero. And although Windows warns that the installer comes from an unknown editor, the installer seems legitimate and users accept the installation. To avoid this type of problems, it is best to download installers only from reliable sources and, of course, have an updated antivirus on your computer. If we notice that the work of the CPU is anomalous, we can always review what process is demanding in excess and locate the malicious tool that is mining cryptocurrencies with the CPU of our computer.
  5. The Venezuelan government reported on Friday the release of former student leader Lorent Saleh, who had been in custody since September 2014 and was considered a political prisoner. Saleh will be sent to Spain as part of a reconciliation plan promoted by the Executive of Nicolás Maduro. The state channel VTV published a statement indicating that the Truth Commission created by the ruling National Constituent Assembly (ANC) recommended releasing the 30-year-old opponent for suicide risk. "During the time of his arrest (Saleh) he was subjected to various psychological evaluations, manifesting violent, destructive and suicidal behaviors that endangered his personal integrity," says the letter. Due to these circumstances, the commission "made a set of recommendations aimed at reducing the risk it could represent in these conditions" and these suggestions were accepted by the judiciary that ruled on Thursday precautionary measures. #Now Lawyer Omar Mora Tosta: "You see how this works, you never took into account either your team of lawyers or your relatives," he says about the release and exile of Lorent Saleh # 12Oct pic.twitter.com/ESSw44OJBE - Efecto Cocuyo (@EfectoCocuyo) October 12, 2018 "Today the aforementioned citizen moved to Spain in the company of authorities of the Government of that country in response to the request made," the statement continues. The Government recalls in its statement that Saleh "was deprived of liberty for his participation in the commission of crimes against the constitutional order in the framework of serious actions aimed at generating violence, destabilization and alteration of peace." Specifically in 2011, he was accused of "spreading false information that causes anxiety," after being arrested with slingshots and other materials used in protests, but escaped from Venezuela. He was arrested in Colombia and deported to Venezuela in 2014 at the decision of the then Colombian president, Juan Manuel Santos, and on his arrival he was accused of three other crimes. His mother, Yamileth Saleh, went to the doors of the Bolivarian Intelligence Service (Sebin) in Caracas on Friday to wait for her son to leave without knowing, he told reporters, that he would be banished. # Context Moment in which the mother of Lorent Saleh, imprisoned in the Sebin for four years, confirms that he received a call from his son, who is in Maiquetía to take a flight to Spain # 12Oct pic.twitter.com/ QoeKxIwny1 - Efecto Cocuyo (@EfectoCocuyo) October 12, 2018 The young man won in 2017 the Sakharov Prize awarded by the European Parliament. The so-called reconciliation plan promoted by Chavismo seeks to establish a formal dialogue between the government and the opposition to seek solutions to the institutional crisis the country is experiencing. The ex-president of the Spanish Government, José Luis Rodríguez Zapatero, is leading these efforts and has managed to bring both parties together a couple of times but the talks have ended without agreements.
  6. Good Morning Guys

  7. Currently the smallest lithography available is the 7 nm TSMC for the iPhone XS, XS Max and XR with the Apple A12 Bionic. In 2019 Samsung will be added, and AMD will launch the first processors and 7 nm graphics cards. However, IBM is starting to see the results of its investment beyond 7 nm, and has achieved an interesting innovation related to graphene. The "7 nm and beyond" initiative continues to bear fruit Four years ago, IBM announced that it would invest 3,000 million dollars over a period of 5 years to investigate the future of nanoelectronics under the "Beyond 7 nm" project. And, although some manufacturers know more or less where they are going to shoot to create lithographs of 5 and even 3 nm, there are many doubts about what will happen next. However, IBM researchers have published research in which they have managed to apply electricity to graphene to help deposit the nanomaterials on the substrate with 97% accuracy. Michael Engel, head of development at IBM Brazil, explained that this process can lead to the creation of a hybrid system that combines different techniques to develop electronics over lithography. In the demonstration, they cultivated graphene on silicon carbide, then peeled the graphene and put it on a silicon oxide wafer. This is the most logical material for semiconductors, and it is the one used now, but Engel says it could also be made with copper. Later, it was defined where the graphene was going to be placed and an electric field of alternating current is applied to the graphene layers while depositing the nanomaterials in the upper part. The nanomaterial creeps down and becomes trapped between the opposing graphene electrodes. With this, graphene defines the location and orientation of the electric field so that the nanomaterial is deposited. In the fourth step, the graphene deposition electrodes are discarded, and finally final steps are taken to integrate the final electronic devices. Main problem of this system: its large-scale implementation Until now, the best available technology used metal electrodes, which are difficult to remove and limit the performance and potential integration of the final device when leaving grooves. This is one of the great improvements introduced by graphene, which allows to dispose the nanomaterials without residues, and limit the exposure to chemicals in the final device. With this system also achieves a greater precision at the time of placing the nanomaterials, so that the door is opened to lower nanometers. This process, although hopeful, will not be an immediate solution to the impossibility of continuing with Moore's Law at present. The main problem they face at the moment is to use it on an industrial scale. First, it is necessary to standardize the solutions of nanomaterials to achieve consistent and repeatable results, in addition to adapting the use of the electric field method.
  8. Although perhaps many of you do not know, one of the most significant ways in the current times to filter private data of users when making use of the Internet, is through our web browser. In fact this filtering to which we refer, can not be even solved by the increasingly po[CENSORED]r VPN or virtual private networks, since all this is foreign to the service they usually provide. Well, to give you a more accurate idea of all this, then we are going to make a summary of the most important types of data that we are making known, unwittingly, to these programs increasingly used in all types of platforms and devices. Hardware and Software To begin we will say that as a general rule, the web browser that we use daily, collects a large amount of data about the hardware of our team, as well as part of the software we have installed. In this way the program knows the operating system that we use, our IP address, or the add-ons and extensions we use. At the same time and if we focus on the hardware, here is gathered information as important as the installed CPU, the GPU, or the battery of the equipment. One of the options to reduce leaks in this regard, is making use of a plugin focused on the privacy of users, such as the well-known NoScript. Geolocation This is a section that, as mobile devices have been advancing and gaining in features and versatility, at the same time has been extended. Specifically, we refer to the way in which the web browser itself knows exactly where we are at each moment, all thanks to the geolocation it uses. Thus, a website can accurately estimate our location, even if we have not given access to our GPS coordinates. Instead, you can use the Google API for these tasks, even if we are accessing the web from a browser on a mobile device. We will say that to avoid this type of actions related to geolocation and that the browser filters the data of our location, we can always use a web proxy to access the websites, among which we can also find several free alternatives. At the same time if we do not want Google to be able to use the aforementioned API, we will have to disable JavaScript in the software or, once again, use applications such as NoScript Browsing history One of the most known types of data that our browser collects about us while we are using it, is the browsing history. Of course we can always delete this navigation data, however it is worth knowing that even then, this history may not have disappeared completely. As an example, in the middle of this year, that is, just a few months ago, it was learned that Google keeps records about the way we use Chrome in relation to the deleted data, even if they were deleted, which includes this history of which we speak. With everything and with it it will never be more than every so often we make a cleaning of the data that is stored automatically in these browsers. Mouse movements One of the most curious types of data we can find and that these programs are able to filter to third parties, are the movements that we constantly make with the mouse, in addition to the clicks that we carry out on the websites that we visit. As a demonstration of this and for you to see this section in action, we recommend you take a look at this free web tool. Where we have our device In mobile terminals in recent years, it is more than usual that we find elements such as built-in gyroscopes, since these sensors are used in a multitude of applications, although they are also used to perform monitoring and status tasks, all based on the movements that we make. Well, these data are collected, among other sections, through our browser, because the software knows if the device has a gyroscope, a compass, or other similar sensors to know where we are at that time, in addition to other details technicians What's more, the program can even know where the terminal is physically: on a table, in a backpack, or in a pocket. Social network information As expected, these programs that we are talking about collect personal information about the social networks to which we are connected, all while we move through them and interact with other users. At the same time we will say that the browser is prepared to relate this information collected with other types of data, all this so that advertisers, for example, know where and how to contact us and thus achieve maximum impact and success. Fonts, language and photographs On the other hand, we will tell you that these programs also know exactly the sources that we have installed on our computer, in addition to the language in which we are using the operating system. In addition, it is interesting to know that each time we upload a new image using our favorite web browser, it is scanning the metadata of the file to know more about us. And of course, these metadata can include information such as the location, the resolution of the image, the technical specifications of the file, or even the camera model we use to take the photograph. Technical information To conclude, we will tell you that in addition to everything discussed so far, these Internet browsers so widespread today, also collect large amounts of technical data on how we are accessing the web. These data to which we mention, include the user agent of the browser itself, if we have touch screen support, if the heading "Do not track" or DNT is enabled, the size of the screen, and many other things.
  9. Hurricane Michael, now a tropical storm, left at least 11 dead after touching land on Wednesday in Florida, officials said Friday, reporting the deaths of five people in Virginia. In the Twitter account of the emergency services of the state it was written: "5 confirmed deaths linked to Michael". The climatic phenomenon passed through Virginia on Thursday and now it moves away from the US territory, degraded to a post-tropical storm. The Emergency Department reported that 520,000 homes are without electricity in Virginia. "Floods, fallen trees, closed roads and debris are going to affect the roads this morning," said emergency services. According to the balance of the authorities, in Florida four people died, in Georgia an 11-year-old girl died, and another person died in North Carolina, a state already affected by Hurricane Florence last month. Search efforts continue The search and rescue teams worked Friday in the destroyed communities of the United States looking for victims of Hurricane Michael. According to the authorities, it has been the most powerful storm to hit the state of Virginia in years. The US military explained that more than 2,000 soldiers of the Florida National Guard were working in recovery operations. Michael's eye touched land near Mexico Beach, a town about 30 km southeast of Panama City, on Wednesday as a Category 4 hurricane of a maximum of 5 on the Saffir-Simpson scale, the National Hurricane Center reported. (NHC). My biggest worry is, of course, the loss of lives. I know that several people were injured Tearing roofs Photos and videos of Mexico Beach, of about 1,000 inhabitants, showed scenes of absolute devastation. The houses seemed to float in the middle of flooded streets, some completely destroyed after having lost the roof. There, the boats were thrown into the yards and the streets were plagued with trees and power lines. "My house in Mexico Beach is underwater," said Loren Beltrán, a 38-year-old accountant, after seeing images of her neighborhood. She and her 3-year-old son took refuge in another house in Panama City, where the outlook was not much more encouraging. Panama City looked like a war scenario after being hit by more than three hours with strong winds and heavy rain that fell horizontally. The streets were impassable and there were containers, antennas, roofs, trees and traffic lights scattered everywhere. "The winds could be heard ugly, like a big television monster," Beltran told AFP. The house where he took refuge from the storm was partially destroyed by the trees that surrounded it and that fell with the wind. "It's an unthinkable devastation," said Rick Scott, the Republican governor of Florida. "My biggest concern is, of course, the loss of life, I know several people were injured." Scott had warned that the hurricane would be "the most destructive storm that hits the panhandle of Florida in a century." The "panhandle" (pan handle) is how this tongue of land is commonly known on the coast of the Gulf of Mexico. In reporting to President Donald Trump at the White House, the head of the federal emergency agency FEMA, Brock Long, said Michael is the most intense hurricane to hit the area since 1851. Speaking to Fox News on Thursday, the president promised that "the reconstruction will be quick." On Wednesday, Trump had said he would travel to Florida "very soon." More than 400,000 homes and businesses were without power in Florida, according to a newsletter from Florida's emergency agency, SERT, and Governor Scott said about 20,000 workers were trying to restore service. A historic hurricane "Unfortunately, this is a historical situation, incredibly dangerous and life-threatening," Ken Graham, director of the NHC, had warned. General Terrence O'Shaughnessy, commander of the North American Aerospace Defense Command, said the rapidity with which the storm formed and grew took residents off guard. "When we least expected it, it was a Category 4 hurricane," O'Shaughnessy said. It is estimated that some 375,000 people from more than 20 counties received evacuation orders, mandatory or voluntary. FEMA has more than 3,000 people on the ground, while Governor Scott said he had activated 3,500 National Guard troops. In Dothan, Alabama, billboards, utility poles and various sheet metal roofs were blown up by the wind, the AFP said. Some trees that fell on the road were cut at dawn to allow traffic. Last year, a series of catastrophic hurricanes hit the western Atlantic. The most devastating were Harvey in Texas, Irma in the Caribbean and Florida, and Maria, who hit the Caribbean and left almost 3,000 dead in the US territory of Puerto Rico. The Atlantic hurricane season ends on November 30.
  10. Congratulations for the pink color

  11. Happy Birthday friend passes it well in your day

WHO WE ARE?

CsBlackDevil Community [www.csblackdevil.com], a virtual world from May 1, 2012, which continues to grow in the gaming world. CSBD has over 70k members in continuous expansion, coming from different parts of the world.

 

 

Important Links