What is my IP
What is my IP

Search results: read

Results (47)
Approximately 47 results of read

Google Lens will read and translate doctors' handwriting on prescriptions
Google Lens will read and translate doctors' handwriting on prescriptions
23/12/2022

Google has announced a new feature in Google Lens... and it's not a simple feature! As it has been explained by the company, they are working on a new functionality that will allow Google Lens to "decipher" the handwriting of medical prescriptions, which are often confusing not only for patients, also for pharmacists. To do this, they are already working on assistive technology that will allow take a photograph of the recipe or uploading an image from the photo library, and then Google Lens will process the image and generate a note with the medications. The result as Google has alert, should be taken as assistance and any decision should be made only based on the result. The announcement of this new function of Google Lens was made at the annual conference that Google has held in India, where there are more registered users of Google Lens in the world.

[ ... ]

Qualcomm's new and most powerful chip, Snapdragon 8 Gen 2, ready
Qualcomm's new and most powerful chip, Snapdragon 8 Gen 2, ready
25/11/2022

Qualcomm has just introduced its new Snapdragon 8 Gen 2 processor, the most advanced mobile processor with a 35% faster CPU.  The Snapdragon 8 Gen 2 is made up of 8 cores and not only presents notable improvements in artificial intelligence processing, also incorporates support for gaming technologies such as ray tracing, ensures a download speed of 10 Gbps and  supports, video playback up to 8k.  Qualcomm's new processor has become the first mobile platform to support INT4 and the most advanced 5G platform to date, supporting Wi-Fi 7 technology that doubles the bandwidth and speed of previous standards. According to information from Qualcomm, the new Snapdragon 8 Gen 2 will be available for high-end mobiles from OnePlus, Sony, Xiaomi or Motorola, among other brands, which will already begin to integrate it into their terminals from the end of this year.

[ ... ]

Microsoft Explorer is already history  Microsoft stops supporting
Microsoft Explorer is already history Microsoft stops supporting
17/06/2022

After 27 years, Microsoft has definitively disconnected the Internet Explorer web browser and Microsoft Edge becomes, from now on, the only reference browser of this technologic company.  Since last wendsday, June 15th, Microsoft is  only supporting Microsoft Edge and any user who tries to access to the old browser or open any service that only works with Internet Explorer will be redirected to Microsoft Edge.  Between 2002 and 2003, Internet Explorer was the most widely used browser in the world, 95% of users, although it was gradually losing market share. In fact, since 2016, Microsoft had already suspended the development of new features for this browser.  After a first phase of redirection to Microsoft Edge over the next few months, Microsoft has already announced that it will release a Windows update that will make virtually all traces of the old browser disappear permanently, although it will remain active within Microsoft's Internet Explorer mode Edge, until the end of 2029.  The withdrawal of support for Internet Explorer 11, the latest version available, will not affect server-based browser applications or the Windows 10 Long Term Servicing Channel (LTSC) or the Trident MSHTML engine.

[ ... ]

Madrid taxis already accept payment with cryptocurrencies
Madrid taxis already accept payment with cryptocurrencies
24/05/2022

From this month of May, Madrid taxi users will be able to pay in cryptocurrencies. The possibility of this new means of payment comes after the agreement between the taxi sector and the Woonkly company, which has distributed dataphones to all taxi drivers so that payment with cryptocurrencies can be made.  Madrid is the first city in Spain to introduce this means of payment in taxis, which is also contemplated by various municipalities in the United Kingdom and the Scandinavian countries.  At the moment, the cryptocurrencies accepted in Madrid taxis are Ethereum, Bitcoin BEP2, Woonkly Power, Binance Coin, Cardano, Avalanche, Binance USD, Polkadot, USD Coin, Tether and Wrapped BN.  The technology of the dataphones that are prepared to print the proof of the operation once the payment has been made, belongs to Waynance, a firm from Alicante, whose payment gateway has become the first universal payment system for cryptocurrencies. It allows payments done from any payment platform (POS, e-commerce, etc.), with any cryptocurrency, through any decentralized wallet and, above all, instantly.

[ ... ]

Windows 11 ready and with 10 days to roll back to the previous version if you do not like it
Windows 11 ready and with 10 days to roll back to the previous version if you do not like it
14/07/2021

Everything is ready so users can begin to install Windows 11 before the end of the year with the great added novelty that if once the update is installed but it does not convince you, you can roll back to the previous version. Microsoft said that Windows 10 users who upgrade to Windows 11 will have 10 days to easily roll back that update. After that 10-day grace period you will need to back up your data and do a 'clean install' to move back to Windows 10. The possibility of upgrading to Windows 11 will depend on the compatibility of the computer with the new version, although in a document of questions and answers for the commercial ones, Microsoft indicates that most of the Windows 10 computers that at the moment are commercialized fulfill the minimum requirements to do it. In the same document, Microsoft explains that Windows 11 maintains the performance and security of Windows 10 "with a redesigned and refreshed look and feel," and new tools, sounds and applications. It is also confirmed that Windows 10 support will be maintained until October 14, 2025.

[ ... ]

Microclaudia, the Spanish antivirus that makes the attacker think the system is already infected
Microclaudia, the Spanish antivirus that makes the attacker think the system is already infected
28/01/2021

The National Cryptologic Center (CCN-CERT) and the cyber security company S2 Grup have created "Microclaudia", a tool designed as a vaccine against malware that makes the attacking agent to believe the computer is already infected. "Microclaudia", which can work in parallel to any other protection system already installed on the computer, runs on the system and prevents the attacking of several malwares that are currently in circulation.  According to the creators of "Microclaudia", this new antivirus is an important step forward to put an end to the damage caused daily by cybercrime in Spain, the second most common crime, only after theft.

[ ... ]

What is Worldcoin and what does scanning the iris involve?
What is Worldcoin and what does scanning the iris involve?
04/03/2024

Worldcoin was introduced in summer of 2023 as a revolutionary project with the mission of creating a 100% secure digital identity, essentially a kind of fortified "digital passport," based on the verification of a unique and non-transferable element inherent to each human being—the iris. According to its developers, World ID will help distinguish human online activity from that generated by machines. In the first phase of the project, the creation of this secure digital identity is planned for 2 billion humans. To make this possible, Worldcoin has called on the global population to scan their iris. In return, Worldcoin compensates participants with a few tokens of its successful cryptocurrency, WLD, which has quadrupled in value within a few weeks of its initial launch. The payment in WLD tokens is not coincidental; it is part of Worldcoin's strategy, aiming to leverage the new digital passports to create a comprehensive ecosystem that provides universal and equitable access to advanced financial services for the entire global population. To achieve this, they encourage "iris sellers" to use the Worldcoin cryptocurrency on its fee-free blockchain, unlike Bitcoin, Ethereum, or other cryptocurrencies that do charge transaction fees. How does Worldcoin work? Worldcoin aims to address the issues of bots, rapid creation of fake identities, and content with artificial intelligence. It is designed, according to its developers, to provide every individual in the world with a unique digital identification. Additionally, Worldcoin promises to ensure the financial inclusion of each person in a fair and equitable ecosystem through a universal basic income. Users receive this income in exchange for allowing their iris to be scanned. To create the secure digital passport with Worldcoin, users must undergo an iris scan, which serves as proof of humanity and a unique identity on the blockchain. This process ensures that the individual on the other side of that identity is a human and not a fake profile created with artificial intelligence. In pursuit of the success of their proposal, the company offers users a small amount of their own Worldcoin tokens in exchange for iris scanning. The initial incentive of receiving free cryptocurrency, in the form of a universal basic income, is emphasized by Worldcoin advocates as the basis for the inclusive and universal nature of their initiative. This approach allows anyone to scan their iris, and the WLD tokens received in return can assist people without access to traditional financial services in starting to save and invest. How to Scan the Iris with Worldcoin? The registration process with Worldcoin involves scanning the iris with an orb, the central hardware device of Worldcoin developed by Tools for Humanity. The orb is spherical and processes all the information. Currently, Worldcoin has installed orbs in different countries, including Spain, where users can scan their iris in exchange for Worldcoins. To do this, it is necessary to download the Worldcoin mobile application, World ID, generate a QR code with it, and display it in front of the orb. The orb, upon recognizing it, will scan the user's iris, while a Worldcoin collaborator remotely oversees the operation. The orb takes less than a minute to perform the scan and validate the subject's identity. In exchange for their iris, the user receives a unique number called "IrisHash" and a cryptographic wallet with Worldcoins. "This digital passport is accepted as proof of unique humanity, which people can use in the digital world without the need to share any other data," assure its developers. What happens with my scanned iris in exchange for Worldcoins? Once the iris scan is completed, and digital identity is granted to the user, Worldcoin assures that the orb quickly eliminates the images unless the user requests their preservation. Only the set of numbers called "IrisHash" is stored for identification, without any additional biometric data. Worldcoin also commits to ensuring that users share only the necessary information they wish to share, providing verification options through linked devices or the additional facial authentication orb for high-security cases. Despite these commitments, the collection of biometric data through iris scanning for the unique proof of humanity continues to raise significant questions regarding privacy and information security. Some countries such as Brazil, France, India, or Kenya have halted Worldcoin's iris scanning. How much do you get paid for scanning your iris? Worldcoin pays 25 WLD for scanning your iris, which, according to the cryptocurrency's exchange rate in February 2024, has translated to an average of between 50 and almost €160 for iris sellers, depending on the value of Worldcoin on the day they scanned their iris. At the beginning of February, the value of each WLD unit was around two euros, and by the end of the month, it had risen to nearly seven euros. What can I spend my WLD on? 'Iris sellers' have the freedom to use their Worldcoins from the moment they receive them. They can exchange the payment for other cryptocurrencies, withdraw them in euros from a specialized ATM, or hold onto the tokens in the hope of an increase in their value. Additionally, WLD payments are already accepted on platforms such as Discord, Shopify, Minecraft, Telegram, Mercado Libre, or Reddit, among other places. Who is behind Worldcoin? Worldcoin bears the stamp of two innovative minds: Sam Altman and Alex Blania. Altman is the CEO of OpenAI and a key figure in artificial intelligence development, leading projects like ChatGPT. Blania, on the other hand, is the co-founder of Tools For Humanity, contributing his experience in creating technological tools for a more equitable economic system to this new and successful cryptocurrency.

[ ... ]

How to change the IP address?
How to change the IP address?

How to change the IP address? We will explain step by step how to change your IP to be able to browse safely and anonymously on the Internet. The Internet is like a great highway and to "drive" on it, we must get on the road equipped with a computer, tablet, smartphone... with a license plate. This "license plate" is what is known as IP address and for many and several reasons, but mainly for security and/or privacy reasons, we may be interested in changing it. What is my IP? In order not to put the cart before the horse the first thing we must do to know how to change the IP of the computer is to find out what the IP of our connection is and verify that the change has been made correctly at the end of the process. Finding out what your IP is is as simple as visiting Cuál es mi IP (What is my IP).  By accessing the page, without the need to download or run any program, our tool will automatically display your IP address data on the screen. This address is also useful to know if you want, for example, to configure online services such as servers, FTP, games, ... and it consists of a numerical combination. This address is unique and public and is the one that identifies us on the Internet to the websites we visit and other users. Nobody can browse the net without an IP address. The IP is assigned to us by our Internet Service Provider (ISP) and as this address is exposed on the network it is known as public IP, as opposed to the private IP of our local network, which only we can know. What is my public IP and what is my private IP? How important are they to change my IP? Our computer or any other device connected to the Internet has two IP addresses, a public IP address, and a private IP address. The public IP, as we have seen, is the one that identifies us to be able to surf the Internet (imagine driving on a highway without a license plate... we would be stopped and banned from driving!) This public IP is linked to our connection and, therefore, all devices connected to the same router have the same public IP. On the other hand, the private IP is the one that individually identifies each device in our private or home network. In this local network, each computer has a private IP address that serves to differentiate it from the rest of the computers and devices connected to the router. In this way, any request for data that comes from or is sent to a device is identified by the router so that it collects or sends the corresponding data to that device. So, which IP address should I change? Private IPs are not accessible from the Internet, while public IPs are and allow us to track our location, data, and Internet activity, including the pages we have visited or the time we have spent on each of them. So, to improve our security and privacy on the Internet, we can change the public IP, or if we prefer, hide our IP. Doing so is not complicated and now we will explain how to change the IP, but first, you must make sure if your IP address is a dynamic IP or a static one, as it depends on it that you can manage to change the IP on your own or require the intervention of your Internet Service Provider (ISP). How do I check if my IP is dynamic or static before changing it? IP addresses can be static or dynamic. In both cases, these addresses are assigned by our Internet provider and the difference between them is that in the case of the static IP, IP addresses can be static or dynamic. In both cases, these addresses are assigned by our Internet provider and the difference between one address and the other is that in the case of the static IP, the address assigned is permanent for a device or router, while the dynamic IP changes every time that device or router connects to the Internet. Usually, the IP address is dynamic, but you can check it through our free tool to find out what is your IP address on our website. Remember that you do not need to download any program or run any application. Simply access cualesmiip.com and the home page will show your IP address, indicating whether it is a static or dynamic one.  If it is a static IP address, you will have to contact your Internet Service Provider (ISP) and request the change or use a VPN service as we will explain below. But if it is a dynamic IP address, the change is easy and you have several alternatives for doing so. How do I change my public IP? The easiest way to change the IP address if it is a dynamic one is to turn the router off and on again. This will change the public IP and when you browse again you will do it with a different IP address than the one you had before turning it off. The tricky part of the situation is that the new address, like the previous one, will continue to be exposed on the network and if you want to change it again you will have to turn the router off and on each time. However, it may happen that despite doing so, this does not work and the IP address does not change. This happens because in certain circumstances Internet Service Providers (ISP) establish a certain period before which IP addresses cannot be changed. How to change my IP with a VPN? If you are looking for a solution that does not force you to be aware of turning your router on or off and that also offers a permanent solution that contributes to your online security and privacy, VPNs are already the most effective solution for changing your IP. VPNs are services designed to hide the IP address, whether you connect with a static IP address or a dynamic one, using that of an intermediate server, in such a way that the IP address is masked, appearing to the public as a different IP permanently. As this new Public IP belongs to the VPN server, none of our data is exposed and whoever traces the address will only reach that server, without being able to access any data about our connection, navigation, and identity on the network. VPN vs Proxy Proxy servers act in a similar way, although VPNs have the added advantage that they encrypt all data from the beginning to the end of the communication so that the impossibility of tracing data is 100% guaranteed. Proxy servers do not have this function and therefore your connection may still be susceptible to falling prey to cybercriminals. In addition, most proxy servers, unlike VPNs, must be configured manually and even, in some cases, individually in each browser. How do I know if my IP has been changed? And now that you know how to change the IP, you can test and check whether it went well by comparing your new IP address with the one you had before. If everything went well, you will see that the numbering is different and therefore your IP has been changed.

[ ... ]

Republica Móvil
Republica Móvil
Republica Móvil

The operator that rewards you for spreading the word about its services

[ ... ]

Google
Google
Google

Talking about Google is almost like talking about a relative. It sounds strange, but it is a reality that its presence in our daily lives is impressive, well, shocking, if we think about it. Google is considered one of the Big Five companies in the American IT industry, along with Amazon, Facebook, Apple, and Microsoft. Although its scope is immense, roughly speaking we can say that it specializes in Internet-related services and products, which include online advertising technologies, a search engine, cloud computing, software, and hardware. Founded in 1998 in the United States, Google is today a multinational company. It was created to organize information and make it accessible to everyone. And, as we already know, it did just that.

[ ... ]

Arc Search, AI-powered search engine for iOS
Arc Search, AI-powered search engine for iOS
05/02/2024

The Browser Company has introduced its latest innovation to the market, Arc Search, a search engine exclusively designed for iOS devices that integrates artificial intelligence and private browsing functionalities. Arc Search promises seamless and interruption-free navigation, free from annoying ads. Driven by artificial intelligence, this search engine offers, also, advanced features such as the ability to summarize visited web pages and provide search results more efficiently. Additionally, it stands out for its ad blockers, a reading mode that minimizes distractions, and a keyboard designed to initiate searches with just a few taps. In addition to Arc Search, in the spring, The Browser Company will also launch its web browser ARC, based on Chromium, with the ambition to challenge the supremacy of Google Chrome. With these releases, The Browser Company has explained that it aims not only to establish itself as a robust option in the realm of browsers and search engines but also to redefine how users interact with information on their iOS devices.

[ ... ]

How can I hide my IP?
How can I hide my IP?

Accessing the Internet involves connecting our computer, smartphone, tablet, etc. to a communications server that is responsible for providing access to the network. This connection involves the identification and exchange of data about our identity, IP address, and online activities that are recorded forever as a trace of our navigation. Can I be tracked through my IP address? Yes, it is possible to trace an IP address and for those who consider privacy a priority, this is a major problem because, in addition to being exposed throughout the network, the increasingly intensive use of the Internet has led to this type of data becoming an object of interest for cybercriminals seeking personal or confidential information that can be used for their benefit. To safeguard against all this, there are several methods to hide the IP address, ensure our online privacy, improve our security on the Internet, and prevent anyone from knowing what pages we visit, the time we have spent on every connection, or what we are downloading. What are the advantages of hiding my IP?  Apart from everything related to privacy and security already mentioned, hiding the IP offers different advantages for users in multiple circumstances: There are IP hiding services that prevent IP geolocation when we travel and allow us to connect to the network as if we were doing it from our own country, overcoming, for example, any network access limitations that may exist in the place where we are. We will be able to download files anonymously avoiding that the rest of the users can see our IP location. If our IP is not "in sight", the possible limitations and blockages of the Wi-Fi network and even of our ISP (Internet Service Provider) disappear. Thanks to the data encryption system of the most advanced IP hiding services, our vulnerability in connections to public Wi-Fi networks is minimized. When the system detects a location different from the real one, this can give us advantages to buy in online stores with different offers according to the country or to avoid the blocking of games, maps, and online game add-ons that may have restrictions on our location. How can I hide my IP? IP hiding is achieved through the use of specific services and tools to hide the IP and encrypt our traffic, those services allow us to hide the real communications we make during our navigation. Besides those techniques that are based on the modification of network protocols and require certain skills to carry them out, there are several technologies within the reach of all users: VPN or Virtual Private Network Proxy or Web proxy Tor Public Wifi How to hide the IP address with a VPN? VPNs are services that connect us to the Internet through intermediate servers, in which our original IP address is " masked " by the IP address of that secure server. This concealment ensures that anyone tracing our connection will only see the IP address and location of the VPN server, but not our own. In addition, to safeguard our activity on the network, VPNs use tunneling and data encryption, encrypting the information we exchange with the VPN server, hiding it, and preventing third parties from being able to read it during its transit. The security of VPN connections is determined by proprietary VPN protocols, based on different standards and encryption and authentication methods, which depend on each developer. The range of options is wide and this allows us to choose between, for example, options that prioritize speed over security, options that do the opposite, options with a greater or lesser degree of reliability, etc. VPN applications always run in the background and do not hinder browsing. How to use a proxy server to hide the IP address? Unlike VPN services, proxy servers focus their activity solely on hiding the IP, without performing any type of concealment on our network traffic or any other data that could reveal our identity. Proxy servers act as intermediaries between our device and the destination server to which they transmit our requests on our behalf. Therefore, our IP will be hidden and the only one they will see will be the proxy one. There are different types of proxy services, from the simplest ones that only help us to hide the IP to others with extra functionalities such as blocking cookies, scripts, and other files hosted on websites and sent to the user.   Browsers or applications based on the HTTP protocol offer the manual proxy configuration function so that we can indicate the proxy web address and port to which we want to connect before browsing. In this way, any activity that we perform through that browser will always be routed to the proxy. Alternatively, you can also opt for the automatic proxy format that searches through DNS or DHCP for the URL from which to download the wpad.dat file that runs and allows the proxy connection with automatic authentication on your computer. How to hide your IP with Tor? Tor is a free software developed to ensure anonymous browsing of users on the Internet. To mask the IP Tor uses a network of volunteer computers or nodes through which it redirects our traffic and encrypts it before it reaches its destination. At least this redirection goes through three of these nodes, achieving repetitive re-encryptions so that any possible clue about our identity disappears. In this process, Tor assigns a random and geographically different IP to our connection so that the location by third parties is impossible (if you are curious to know the IP you have been assigned you can check it through our tool). This system allows different configurations depending on whether we are using a firewall, if our ISP is blocking Tor connections or if we navigate through proxy for example. Can I hide my IP with a public Wi-Fi connection? The answer is yes. A public Wi-Fi network can also be used to hide our IP address, although if we do not have it constantly at our disposal, the IP hiding is limited to the time we have access to a public network. As this type of network is a connection shared by many other people, this makes it impossible to trace a particular user or identify them on the destination server. However, it is precisely this general access that also makes us more vulnerable. And although through a connection to a public Wi-Fi we will solve the issue of IP hiding, security will never be total, because being an open network, we can be exposed to the will of hackers and other threats, including malware and viruses. And if I want to hide my IP address, how can I change it? It may also be the case that instead of masking the IP all we need to do is change our IP address at a given moment. Then, the solution is as simple as disconnecting the modem from the power supply and restarting it after a few minutes. In that time, if your IP address is dynamic (you can check it through the network connections tab on your computer), it will be deleted and your Internet provider will give you a new one. To make sure that everything went well, we recommend doing something as simple as writing down the IP address before turning off the router and checking it again once it is up and running again. Another possible way to achieve the same result if you have a smartphone with a data plan is to turn this device into a wireless access point to which you can connect your computer, thus hiding your usual connection. There are many options to hide the IP or to change it and now that you know how each of them works you will be able to decide which one suits you best.

[ ... ]

Where to watch the Champions League on TV or Streaming?
Where to watch the Champions League on TV or Streaming?
13/06/2023

Find out where you can watch the Champions League so as not to miss a minute of this excellent competition that this year again promises good soccer and maximum excitement. When does the Champions League 2021/2022 start? The UEFA Champions League Group Stage starts in mid-September. The first match day will be played on Tuesday, September 14, and will feature Sevilla, who will face RB Salzburg in the Andalusian capital; Villarreal, who will play at home against Atalanta; and FC Barcelona, who will face Bayern Munich, also at home. The following day, on September 15, the 2021/2022 Champions League will kick off for Atlético de Madrid, who will play against Porto at the Wanda Metropolitano, and also for Real Madrid, who will play their first match against Inter, in Milan. This first Group Stage will have six matchdays in which the 32 teams participating in this edition of the Champions League will face each other in home and away matches that you will be able to follow both on television and streaming. Group stage September 14/15, 2021: first matchday September 28/29, 2021: second matchday October 19/20, 2021: third matchday 2/3 November 2021: fourth matchday November 23/24, 2021: fifth matchday December 7/8, 2021: sixth matchday Once the six matchdays of the group stage have been completed, the competition will continue with the knockout phase, which will determine the two teams that will play in the UEFA Champions League final. Knockout Phase Round of 16: February 15/16/22/23 and March 8/9/15/16/16, 2022 Quarter-finals: 5/6 and 12/13 April 2022 Semifinals: May 26/27 and 3/4, 2022 Where to watch the Champions League on TV? As with LaLiga Santander and Liga SmartBank, Movistar has exclusive rights to the UEFA Champions League in Spain until 2024. However, following an agreement with Orange, Movistar has decided to share the rights with this operator, so that in Spain this season the Champions League can be watched on TV on Movistar and Orange TV. In both cases, the broadcasting of the UEFA Champions League group stage matches as well as those of the knockout phase and the Final will be included. How to watch the Champions League on Orange TV? Although Orange does not have direct rights to the Champions League in Spain, its agreement with Movistar allows its customers to watch live Champions League matches on Orange TV. These broadcasts are exclusively for the operator's customers who have the Orange Love Total package, which includes the UEFA Champions League, Liga Santander, and Liga SmartBank matches, in addition to the UEFA Champions League. How to watch the Champions League on Movistar? To watch the Champions League on Movistar we must be customers of this operator and have contracted the Fusión Selección Champions or Fusión Selección Plus con Fútbol package, which also includes the Liga Santander and Liga SmartBank matches. If our package is Fusión Selección con LaLiga, we will only have access to the Spanish football competition and we will not be able to watch the Champions League matches. The Movistar channel on which the Champions League can be watched is called " Movistar Liga de Campeones". "Movistar Liga de Campeones" is an exclusive TV channel for watching soccer and in addition to the UEFA Champions League, it also provides coverage of the Europa League.The schedules of all broadcasts can be consulted in the Sports section of the Movistar+ menu, for ADSL and Fiber TV customers. Where can I watch the Champions League live on the Internet? Both Movistar and Orange complete their Champions League soccer offer on TV through their online platforms. In both cases, to enjoy soccer on our mobile devices or computer, we must be subscribed to a package that includes the UEFA Champions League (in Movistar, Fusión Selección Champions or Fusión Selección Plus con Fútbol, and in Orange TV, Love Total). If you are a Movistar customer and have one of these packages, you must activate Movistar+ on your devices (formerly Yomvi) and you will have access to watch the Champions League online matches on Movistar as well as other online content and series, at no additional cost from anywhere and on any device. All broadcast schedules can be consulted in the Sports section of the Movistar+ menu on any device. To watch the Champions League online on Orange, you must log in to the Orange TV website to identify yourself as a Love Total member.  Once we have logged in, we will be able to watch live matches of the UEFA Champions League, LaLiga Santander, LaLiga SmartBank, and also watch matches that have already taken place. Where can I watch the Champions League from outside Spain? If you are a Movistar or Orange customer, the best option to watch the Champions League from abroad is through Movistar+ on your devices or the online platform of Orange TV. If you have problems viewing the matches due to a geographical block, the best option, in this case, is to connect to a VPN with a Spanish IP beforehand. If your Internet access provider does not offer this service, here are the best VPN offers to surf safely (both from home and when traveling). In addition, and depending on the country you are in, various television stations and operators have the broadcasting rights to the UEFA Champions League: Europe Albania: Tring, RTSH Armenia: Vivaro Austria: ServusTV, Sky Austria  Azerbaijan: CBC Sport, Saran Belarus: UEFA.tv Belgium: Proximus, RTL, VTM Bosnia and Herzegovina: Arena Sport Bulgaria: A1, bTV Croatia: HRT, Arena Sport Cyprus: CYTA Czech Republic: Nova, Voyo Denmark: NENT Group Estonia: Viaplay Finland: MTV France: Canal+, BeIN Georgia: Adjara, Silknet Germany, DAZN Greece: MEGA, COSMOTE TV Hungary: Sport1, MTVA Iceland: Viaplay, Syn Republic of Ireland: Livescore, Virgin Media, RTE Israel: The Sports Channel  Italy: Amazon, Mediaset, Sky Italia Kazakhstan: QazSport, Q Sport League, Saran Kosovo: Arena Sport, Artmotion Kyrgyzstan: Saran, Q Sport Latvia: Viaplay Lithuania: Viaplay Luxembourg: RTL, Proximus Malta: Melita, PBS Moldova: Setanta, Prime Montenegro: Arena Sport Netherlands: RTL, Ziggo Sport North Macedonia: Makedonski Telekom, Arena Sport, MTV Norway: TV2 Norway Poland: Polsat Portugal:Eleven Romenia: Clever Media, Digisport, Telekom Romania Russia: Match TV  Serbia: Arena Sport Slovakia: Markiza, Voyo Slovenia: Sportklub, Pro Plus Spain: Telefonica, Orange TV Sweden: Telia Switzerland: blue+, CH Media Tajikistan: Varzish TV, Saran Turkey: EXXEN Turkmenistan: Saran Ukraine: Megogo UK: BT Sport Uzbekistan: MTRK Africa and Middle East Nigeria: SuperSport South Africa: SuperSport Middle East and North Africa (Algeria, Bahrain, Chad, Djibouti, Egypt, Iran, Iraq, Jordan, Kuwait, Lebanon, Libya, Morocco, Oman, Qatar, Saudi Arabia, Sudan, Syria, Tunisia, United Arab Emirates, Yemen): beIN Sub-Saharian Africa: Canal+, SuperSport America Bolivia: Televideo Brazil: SBT, Turner Canada: DAZN Caribbean: Flow Sports, Sportsmax Central America: ESPN Costa Rica: Teletica Dominican Republic: Televideo Ecuador: Televideo El Salvador:Canal Dos Guatemala: Televideo Haití: Canal+ Honduras: Televicentro South America (except Brazil): ESPN Mexico: Turner Panama: TVN, Medcom Paraguay: Televideo Peru: Televideo United States: CBS, TUDN Deportes Venezuela: La Tele Tuya  Asia and Pacífic Australia: STAN Brunei: beIn Cambodia: beIn China PR: PPTV, Tencent, iQIYI, Alibaba Hong Kong SAR: beIn India and Indian subcontinent: Sony Indonesia: SCTV Japan: Wowow Republic of Korea: SPO TV Laos: beIn Macau SAR: TDM Malaysia: beIn Mongolia: SPS Myanmar: TBA New Zealand: Spark Pacific Islands: Digicel Philipines: Tap TV Singapore: beIn Taiwan/Chines Taipei: Elta Thailand: beIn Vietnam: FPT Moreover, if you are one of those who can't miss a single live match, you should know that the Sport24 platform has the rights to broadcast Champions League matches on airplanes and cruise ships. Where to watch the final match of the Champions League 2021/2022? The 2021/2022 Champions League final will be held at the Gazprom Arena in St. Petersburg, Russia, on May 28, 2022. Like the rest of the competition, you can watch the Champions League final on TV through Movistar-Movistar Liga de Campeones dial 50 and Orange TV. Where to watch the Champions League 2021/2022 final on the Internet? In addition to television, you can also watch the Champions League final online. In this case, you must also be a Movistar or Orange customer and connect to Movistar+ on devices (former Yomvi) in the first case or to the online platform of Orange TV, if you are an Orange customer to enjoy the match in which the best European soccer team 2021/2022 will be proclaimed. How can I watch LaLiga soccer matches from abroad? If you have already contracted a television service with the LaLiga package and due to a geographic blocking of your television provider and your connection you have problems viewing the matches, the best option, in this case, will be to use a VPN that assigns you an associated IP that is not blocked. If your Internet access provider does not offer this service, below are the best VPN offers to surf safely from anywhere.

[ ... ]

The United States accelerates the digital dollar
The United States accelerates the digital dollar
23/11/2022

After US President Joe Biden ordered this past week to urgently evaluate the creation of the digital dollar, the Federal Reserve Bank  and companies such US Bank, Citi, HSBC and Wells Fargo have announced a pilot prove to test the new currency. The digital Dollar will be issued centrally and its regulated liability network (RLN) will be tested for twelve weeks, during which the participating banks will operate in a simulated way, using tokens that will act as deposits from their clients that will be settled in a central reserve in a shared distributed ledger. This will be use to evaluate its security and operation in financial transactions and agreements. In parallel, China continues to promote the Digital Yuan and the European Central Bank (ECB) is also advancing in the creation of the digital euro, a project that the latest information indicates it cab be already viable in 2025. And while all this is happening, the information that ensures an imminent regulation for cryptocurrencies increases.

[ ... ]

Netflix offers a new cheaper plan with tv advertisements
Netflix offers a new cheaper plan with tv advertisements
19/10/2022

From November 10 th, in Spain and practically simultaneously in eleven other countries in Europe, Asia and America, the new Netflix subscription plan will be launched. The price will be,  5.49 euros per month and will give access to movies and series of Netflix catalog in exchange for showing ads. As it has been explained by Netflix, the average will be 4-5 minutes of ads per hour and this advertisements may appear both at the beginning of movies and series and during their playback.Within the framework of this new service, Netflix will offer to advertisers a new control tools to verify the level of display of their advertising and the validity of the traffic, with the aim that the ads that are displayed "are relevant to the consumers". At the moment, the new plan with ads from Netflix  does not include the entire catalog of series and movies on the streaming platform, due to a license restriction issue, although the company has already announced that they are working to solve these impediments. In addition to Spain, the rest of  countries where this new plan will be offered are: Germany, Australia, Brazil, Canada, South Korea, the United States, France, Italy, Japan, Mexico and the United Kingdom.

[ ... ]

Detected a Trojan that emulates the WhatsApp account and fraudulently manages subscriptions to payment sites
Detected a Trojan that emulates the WhatsApp account and fraudulently manages subscriptions to payment sites
17/10/2022

Kaspersky researchers has reported that YoWhatsApp advertised on Snaptube and Vidmate, two of the most popular download platforms at the moment, is actually a Trojan capable to issuing paid subscriptions and stealing WhatsApp accounts.   YoWhatsApp would act as a mod of the original messaging program, offering new functions that the official service does not allow, such as wallpapers, personalized fonts for chats and password-protected access to conversations, .... As Kaspersky researchers have explained, when a user installs YoWhatsApp on a device, it’s forced to log in to they real application account, and in this moment, Triada Trojan is activated, downloaded and executed on the terminal.  Once this is done, the Trojan is capable of accessing the user's real WhatsApp account credentials, steal all the data, having already detected unauthorized subscriptions to paid subscriptions.  Kaspersky recommends to install, only, Apps from official stores and reliable sources and they have insisted on the need to check always the permissions granted to each application. Installing an antivirus is another recommended measure.

[ ... ]

The new USB 4 2.0 promise speeds up to 80 Gbps for data transfer
The new USB 4 2.0 promise speeds up to 80 Gbps for data transfer
19/09/2022

Next for his market presentation, the main characteristics of the new generation of USB are already known: USB 4 2.0  promises to double the speed of Thunderbolt 4 and the original USB 4.Although we will have to wait until November to know all their technical characteristics, USB Promoter Groupt has already explained that USB 4 2.0 will offer speeds up to 80 Gbps for data transfer, through a USB-C cable and connector.This significant increase in transfer speed is possible because the new USBs incorporate a new physical layer architecture, capable of supporting. So, the new USB are preparing, for example, to support the transfer of 4K or 8K videos from one computer to another without problems or to offer, also, the maximum gaming experience to gamer users thanks to its ultra-fast speed rate.Intel, meanwhile, is already working on Thunderbolt 5, which everything indicates will also offer speeds of 80 Gbps.

[ ... ]

Metaverses for adults in Horizon Worlds from Meta
Metaverses for adults in Horizon Worlds from Meta
05/08/2022

Meta has announced that it will offer special spaces  in Horizon Worlds for user up of 18 years old. To do this, the company has already begun to contact users who are creating their digital worlds on this platform, who have been asked to classify their content. Otherwise, it will be Meta who does it and regardless of its character, it will classify it as restricted adult content.  All universes containing nudity, alcohol, soft drugs, blood, gambling promotion, etc. they will need to be rated 18+ through the Horizon Worlds settings section, "Build Mode" of the "World" tab.  Meta has also announced that regardless of rating, worlds that contain  explicit sexually content or promote violence or crime will be banned. Content depicting intense real-life violence or attempting to sell, buy, or trade regulated goods such as weapons, tobacco, or alcohol will be also prohibited.

[ ... ]

Google Maps will provide the most efficient route based on the fuel of each vehicle
Google Maps will provide the most efficient route based on the fuel of each vehicle
22/07/2022

The latest update of the Google Maps beta, version 11.39, would allow users to choose between different vehicle options, gas, diesel, electric and hybrid, and based on these choice, the application will propose the route that allows the driver to save more into fuel or power.  This novelty is collected by the specialized Google portal, 9to5Google, which has had access to the update that would still be in the testing phase.  The new option would come to complete others already planned, such the one tha allows Google Maps to indicate the least polluting routes to users, as long the option for that itinerary does not imply a substantial change in time behind the wheel, in relation to the fastest route.

[ ... ]

Google launches ChromeOS Flex to give a second life to outdated computers
Google launches ChromeOS Flex to give a second life to outdated computers
21/07/2022

Google has just introduced ChromeOS Flex, a new version of their cloud-based operating system that will allow "rejuvenating" Windows and Mac computers that have become available. The system must be downloaded directly from the web and can be installed on the computer via USB or the company network. ChromeOS Flex is now ready to give outdated Windows and Mac computers a second life. At the moment, Google has already certified nearly 300 devices compatible with ChromeOS Flex, from leading brands on the market such as Apple, Acer, Dell or Microsoft. Although Google has advanced that not having the certification does not prevent the installation of the operating system on our old computer.  Some of the services offered by this operating system are, the protection against ransomware and malware; background updates; remote management of applications and, of course, the possibility of giving a new life to an outdated computer.  “By installing ChromeOS Flex on an older computer, you're not only getting a great experience, you're also contributing to an important cause. Every year 40 million tons of electronic waste is generated worldwide, which is equivalent to throwing away 800 laptops every second. Updating devices to ChromeOS Flex instead of completely replacing them is one way to reduce this waste.

[ ... ]

Intel plans to raise the price of their products up to 20%
Intel plans to raise the price of their products up to 20%
19/07/2022

Intel could raise the prices of some of his products by 10% to 20% before the end of the year to deal with inflation. This has been advanced by the Taiwanese media Nikkei Asia, which indicates that the American manufacturer would already be warning its customers of the measure.  Some products that would see their price rise would be CPUs for servers and computers, as well as chips for WIFI devices.  Intel, according to Nikkei Asia, will attribute the price change to the rise in raw materials and also to the production costs of their products. Intel reached a record turnover of 79,024 million dollars in 2021, which represented a growth of 1.4% for the company compared to revenue recorded the previous year, although their net profit fell by 4.9% last year.

[ ... ]

Menorca launches 5G connection in the 700MHz band while fiber optics continues  not reach in some areas of Ibiza
Menorca launches 5G connection in the 700MHz band while fiber optics continues not reach in some areas of Ibiza
13/05/2022

After the relevant procedures to verify the absence of interference with DTT or other incidents, Movistar has received the green light to turn on 5G in the 700MHz band in Menorca and at this time the municipalities of Es Mercadal and Sant Lluís are already under this coverage. The new 5G in the 700MHz band has better range and better capacity to go through obstacles, thus offering better indoor coverage and universalizing some of the characteristics of 5G communications, such as low latency. The switching on of 5G in the rest of the island will be gradual. And while this is happening in Menorca, in Ibiza, the mayor of Sant Josep, has transferred to Telefónica the need that the operator deploy its optic network to cover all the municipality, because, explains the mayor, there are still areas such as Es Cubells, Cala d'Hort or points in Sant Agustí where the fiber  network does not reach. The desire of the Ibiza Town Hall is, furthermore, to turn the capital of the island into one of the first destinations reached by 5G technological leap outside the large cities of the State. “It is a great opportunity for our citizens and the development of new economic sectors. We are also sure that 5G will soon be among the demands of tourists. The 5G availability will allow us to offer an exponential increase in added services to further improve their stay”, explained the Deputy Mayor for Finance and Modernization of Sant Josep, Vicent Roselló.

[ ... ]

The use of magnetic tapes to store data is growing
The use of magnetic tapes to store data is growing
11/05/2022

Although cloud storage continues to be a growing resource for many companies to promote hybrid work environments, for security reasons, many other companies have decided not only to return to hard drives, SD cards or pen drives, but even to magnetic tapes.  According to the Swedish firm Sweclockers, storage on this format skyrocketed in 2021 and grew, compared to the data recorded in the previous year, by 35%. Being a format that is not connected to the internet and therefore free from the threats of ransomware and malware, magnetic tapes are increasing their popularity again and companies such IBM, HP or Seagate/Quantum have already launched updated versions of these tapes on the market that include Linear Tape-Open (LTO) technology and high storage capacity, according to the current needs of companies. The main difference from other digital storage media is that magnetic tapes can only read and write data sequentially, and this cannot be done simultaneously.

[ ... ]

Samsung launches a microSD card that can record data for 16 years in a row
Samsung launches a microSD card that can record data for 16 years in a row
09/05/2022

The new Samsung Pro Endurance microSD card that multiplies the normal life cycle of memory cards by more than 30 times, is now on sale.  Samsung Pro Endurance can work continuously 140,160 hours or what is the same, 16 years, a period significantly higher than the average life of 5 years of a standard microSD card.  Exclusively designed to cover the needs of video surveillance cameras, the memory card offers enhanced endurance and superior performance for continuous, smooth and reliable capture and playback. “Both consumers and business users can rest assured that our new memory card will ensure continuous recording in high resolution, even under extreme conditions,” said KyuYoung Lee, Vice President of Memory Brand Product Biz, Samsung Electronics Team.  Samsung's new memory card offers read and write speeds of up to 100MB/s and 40MB/s, respectively, and a rated Video Speed ​​Class 10 up to U3 and V30  According with Samsung, this makes this micro SD card ideal for handling large high-resolution files while allowing perfect Full HD and 4K recording and playback.  The new Samsung Pro Endurance microSD is available in four different storage capacities, 32GB, 64GB, 128GB and 256GB.

[ ... ]

Meta would abandon cryptocurrencies to bet on tokens
Meta would abandon cryptocurrencies to bet on tokens
13/04/2022

The Financial Times  has published that Meta, the company that owns Facebook and Instagram, is working on a new digital currency that, at least internally, has already been baptized as "Zucks Bucks", in a clear reference to its founder and CEO, Mark Zuckerberg.  After the two failures of Meta related to cryptocurrencies, Diem and Libra, it seems that the new project would focus on the development of tokens that could be used in the company's Apps to acquire presentations or advantages.  In parallel, Meta is also studying the integration of NFT in Facebook, a beta version of which could be ready in a few weeks, in mid-May.

[ ... ]

VPN connections in Russia are growing more than 11.000%
VPN connections in Russia are growing more than 11.000%
29/03/2022

The virtual private networks (VPN) demand in Russia has not stopped increasing for weeks, and according to data from Google Play and the Apple Store, in just one day, on March 14, when the blocking of Instagram took effect in In that country, VPN installations in Russia grew by 11,000%. Until now, the Kremlin has already blocked Instagram, Facebook and Twitter, bringing up the demand for VPNs by Russian citizens to record highs, with the intention of being able to  connect to their social networks. VPN connections allows to use internet, preserving the anonymity of the user and his location. The VPN services, connect us to the Internet through intermediate servers, in which our original IP address is "impersonated" by the IP address and location of the VPN server. This makes us appear with a permanently different IP, making it seem that we are in a city or even in a different country than the one we actually are in. VPNs also have the added advantage that  encrypts all data from start to finish of the communication, making it 100% guaranteed to be untraceable.

[ ... ]

HTC prepares the launch of the first mobile oriented to the Metaverse
HTC prepares the launch of the first mobile oriented to the Metaverse
11/03/2022

HTC will be the first manufacturer to launch a Metaverse-oriented Smartphone.  Although few details are known at the moment, everything would indicate that the phone from the Taiwanese manufacturer would already be in a fairly advanced stage of development and that it could hit the market this coming spring, specifically during April.  Analysts take it for granted that HTC's Smartphone, in addition to its own virtual and augmented reality options, sensors - cameras and modifications, software to manage all these features related to the metaverse - will offer support for its virtual world, Viverse , and also for the platform that Meta is developing.  With this launch, HTC wants to regain its position among the world's leading smartphone manufacturers, after been focused since 2018 on covering budget device markets for a limited number of countries.

[ ... ]

Starlink Satellite Internet service multiplies their speed
Starlink Satellite Internet service multiplies their speed
11/02/2022

Starlink, the Internet satellite network of  SpaceX division, continues to bet on improving the download speed of their service and has just presented a new antenna that improves the performance of its basic kit. Its size is beat larger than the current antenna and  Space X assure, it can offer a download speeds of 150 to 500 Mbps and a latency of 20 to 40 ms, compared to the speed of 50 Mb/s to 150 Mb/s of the initial kit .  The official launch of the new antenna has been done in the United States, where users can already reserve it. It's expected that the antenna  will arrive to Europe on the second quarter of the year.

[ ... ]

What's new in Google for Android?
What's new in Google for Android?
10/01/2022

Google opens the year with news and has already presented in CES 2022 some of the most importants ones, such the new option for locking and unlocking devices and for the remote control of actions on all devices compatible with their Assistant. This means that from now on, you can unlock and use a Chromebook, mobile or tablet from a Wear OS smartwatch. To be successful, of course, the devices must be close to the clock. It is also available the option of unlocking - opening or start the car - BMW vehicles through a compatible Samsung phone or Pixel and, also, the function of transferring and managing content between devices through an integrated Chromecast that allows users to  send content from the smartphone to televisions and monitors as well  to speakers. Google has also announced the upcoming launch of a new device connection function that will allow, for example, to configure a Chromebook from the mobile phone and access all the saved data,. The new feature will also incorporate 'Fast Pair' pairing with Bluetooth accessories.

[ ... ]

Bushkill cable, an anti-theft USB of data
Bushkill cable, an anti-theft USB of data
21/12/2021

After a crowdfunding campaign for its manufacture, Bushkill cables have already begun to be marketed. This cable connects to the computer physically, without relying on wireless connections, to protect sensitive data.  The cable works as a deadman switch against theft and when somebody disconnected the cable, Bushkill automatically locks the equipment or turns it off.  Bushkill is compatible for Windows 10, MacOs and Linux. In this last system, the a extra self-destruct action can be also configured, and this makes the disk permanently inaccessible.  Physically, the Bushkill consists of a magnetic breakout cable, a carabiner, and a USB Type-A that contains the anti-theft software.

[ ... ]

On December 13, Mozilla's Firefox Lockwise runs out of support and will no longer be updated
On December 13, Mozilla's Firefox Lockwise runs out of support and will no longer be updated
03/12/2021

On December 13, Mozilla's Firefox Lockwise runs out of support and will no longer be updatedThe password manager for the Mozzilla Firefox web browser will no longer have support service from next 13th December and it will not be no longer installed or reinstalled from the App Store or Google Play. This doesn't mean that this password manager will stop working. The users will still be able to access their saved passwords as well as their password manager through the desktop browser. What will not be possible is to have the tool already more from the new updates and version 1.8.1 of iOS and version 4.0.3 of Android will be the last ones of Firefox Lockwise. Mozilla has reported that Firefox will synchronize iOS devices with the browser at the end of December. From this moment, Firefox iOS will have the ability to manage Firefox passwords throughout the system and other platforms.

[ ... ]

Chromebook computers will notify if someone is spying the screen
Chromebook computers will notify if someone is spying the screen
01/12/2021

Google's new antispyware tool will warn if someone spies the screen. The new tool will have the potential to lock the computer by facial recognition.  Google has everything ready to test its new anti-spying tool, which will be incorporate in the future, Chromebook computers.  This tool, if the user has it activated, will be able to send a warning alert every time it detects that another person is spywaring the screen. The anti-spying function will be activated through its human presence sensor.  The user can activate or deactivate the tool from the settings section.  When the system detects a person spying or looking over the user's shoulder, the computer screen will warn him discreetly, either with a icon  or by dimming the screen. According to the first information released, the sensor would have the potential to lock or unlock the equipment through facial recognition.  In addition, the tool will incorporate additional functions such as an automatic deactivation of the notifications of the conversations that the user is having privately when the "spying" is detected.

[ ... ]

DuckDuckGo introduces a feature to protect Android smartphones from trackers
DuckDuckGo introduces a feature to protect Android smartphones from trackers
26/11/2021

DuckDuckGo goes a step further in terms of security and has just announced a new tool for Android Smartphones that block the tracking of user data. In fact, it is an extension that can be already  tested in its beta version -with a waiting list- and that according to DuckDuckGo was born to stop the theft of information ( according to AndroidRank.org, 96% of the most popular free Android applications contain trackers. A 87% send data to Google, and 68% to Facebook). This free extension is called 'App Tracking Protection' and it is integrated into the search engine's 'app', so it is not necessary to keep it open for it to work. Trackers blocking can be reviewed in real time through DuckDuckGo and it can also detect which networks are tried to keep users personal data to. In addition, one can activate the notifications service to receive summaries of its operation.

[ ... ]

End-to-end encryption of Facebook Messenger and Instagram delayed until 2023
End-to-end encryption of Facebook Messenger and Instagram delayed until 2023
25/11/2021

Security and privacy have become two of the main  worries of the new virtual world. Meta, the new name of Mark Zuckerberg's company, has been working on end-to-end encryption system for  Facebook Messenger and Instagram platforms and has just reported that finally this protection will not be ready until 2023. The delay, they explain, is due to their effort to ensure that end-to-end encryption will be the protection that all their messaging applications have by default, but at the moment only WhatsApp offers it. This technology means that only the sender and the receiver can know the content of a conversation. It's also known that end-to-end encryption has open the debate about  privacy and collaboration with police investigations, specially in cases of child abuse. "As we implement end-to-end encryption, we will use a combination of unencrypted data in our applications, account information, and user reports to keep them secure in a way that protects privacy while assisting in public safety efforts" , has assured the Security director of Meta, Antigone Davis.

[ ... ]

Apple reduces the manufacture of iPads in favor of the iPhone 13
Apple reduces the manufacture of iPads in favor of the iPhone 13
05/11/2021

The global shortage of semiconductors is growing and in light of this situation, Apple has announced that they will reduce its production of iPads to use the chips in the iPhone 13. Apple has also chosen to reduce the production of older iPhones. The strategy, they explain, is to focus on their newest product, the iPhone 13 that arrived to the market at the end of last September, and take advantage of the foreseeable pull, especially in western markets where the sales rate are already beginning to approach to the prepandemic stadium. In a recent interview with the Financial Times, Apple's chief financial officer, Luca Maestri, said that the losses generated by the shortage of chips have been millionaire and Apple has stopped earning 6.000 million dollars.

[ ... ]

Google accepts the challenge of bringing the Internet to all of Africa
Google accepts the challenge of bringing the Internet to all of Africa
29/10/2021

Google has just announced that it's going to invest a billion dollars in improving the internet infrastructure in Africa through the American technology company Alphabet Inc. The project has the ambitious objective of increasing the Internet capacity in Africa 20 times, reducing the average connection price on the continent and increasing the Internet speed five times in this territory, where countries  as Ethiopia or Malawi have an average connection below 0.5 megabits/ second. To complet this objectives, Google hopes to have its Equiano submarine cable ready by the end of this year. This cable has been deployed since 2019 and will connect Europe and Africa, contributing then to a considerable improvement in the current infrastructure of Africa. The “African digital transformation” project as it has been described by Google and Alphabet CEO, Sundar Pichai has a budget of 1 billion dolars, and incorporates a 50 million dolars, 40 million of which for non-profit organizations that works improving the standard of living in Africa, and the remaining 10 million for low-interest loans aimed at tech startups in Ghana, Nigeria, Kenya and South Africa.

[ ... ]

Google tests parcel delivery drones from shop's roofs
Google tests parcel delivery drones from shop's roofs
18/10/2021

Google is testing a new drone product delivery system in Australia, with launch platforms from the store's roofs.  To carry out the test, Google have the collaboration of the Vicinity’s shopping centres. Their customers can buy their products online and a drone waiting on the store's roof will take the items to the delivery address.   In addition, Google tests the same take-off system from the store itself and not from the distribution centres, in Logan, United States, where more than 2,500 deliveries have already been made successfully with this system.  As a curiosity and according to these results, the most demanded products by this system are teas, shakes, sushi and food. In the next weeks the system will be also prepare to delivered medicines and beauty and personal hygiene products.

[ ... ]

A fraudulent email simulates a WhatsApp Backup and installs a Trojan
A fraudulent email simulates a WhatsApp Backup and installs a Trojan
29/09/2021

WhatsApp users, Internet users' associations and also some police officers have alerted through social networks about a new virus that arrives by email with the subject "Backup of WhatsApp messages. This email offers a link to download the history of conversations in this application, which should not be clicked if you don’t want to install a Trojan on your device.  The message arrives with the same appearance and usual colors of WhatsApp and provides supposed information about the number of messages deleted, restored and read through the application, looking like a real information and causing confusion in the victims  If we receive the message but we don`t use the link, the Trojan will not run and we only need to delete the message to get rid of the virus. But if we have opened the link, or downloaded and opened the zip file that arrives in some emails, then the device will be infected, and we will need to use an antivirus to detect the malicious software and destroy it.

[ ... ]

Starlink will finish its satellite Internet tests in October
Starlink will finish its satellite Internet tests in October
21/09/2021

Starlink's beta program, the high-speed Internet service for rural areas without broadband connection, will end its trial period next October. After a year of testing this system, more than 1.800 satellites in orbit and a stable coverage in the United States, Canada, United Kingdom and Spain, Space X is waiting for the approval of the rest of the countries where the company has already registered its trademark to operate - Austria, Australia, Argentina, Brazil, France, Chile, Colombia, Germany, Greece, Ireland, Italy, Mexico, the Netherlands, New Zealand, the Philippines and South Africa – being their goal to offer global satellite internet service in a short time. To take advantage of Starlink in areas without terrestrial Internet coverage you will need a special installation kit, which includes a terminal station, a WiFi 'router' and an antenna to connect to the satellite network. 

[ ... ]

What is web hosting and why do you need it?
What is web hosting and why do you need it?
09/09/2021

If you are thinking of creating your own website or if, on the contrary, you already have one and are looking for a better web hosting service, you probably have many doubts concerning web hosting: what exactly is it, what are its different types, why do I need it, etc. For this reason, here we offer you a clear and simple guide to web hosting. What is web hosting? Web hosting is a service that allows organizations and individuals to post a website or web page onto the Internet so that it can be consulted at any time and from any place and device. The content of the websites is stored, therefore, in web servers. These servers allow the content to be accessible via the World Wide Web. For all those who do not know the term, a web server is a piece of computer equipment that is much more powerful than any conventional computer and that is connected to the Internet 24 hours a day to enable access to the contents it stores. Different types of web hosting are offered based on the web server: shared hosting, VPS, cloud hosting, WordPress hosting, elastic hosting, etc. These services are offered by web hosts such as Webempresa, which provide space on a server for use by clients. Why do you need web hosting? Web hosting allows your website to be always online and available worldwide and for everyone. Therefore, even if you can afford to buy your own server and have a fast internet connection, it is advisable to hire a web hosting service, as it will be much cheaper. Web hosts have their own servers to host their clients' websites. These servers are located in a Data Processing Center (DPC): an infrastructure that has the most advanced security systems and stable and secure internet connections, which prevent errors in the services. What are the different types of web hosting? Although there are different types of web hosting in the market, the most common are the following: shared hosting, dedicated hosting, VPS (Virtual Private Server) hosting, cloud hosting, reseller hosting, and WordPress hosting. Each of them meets the needs of a particular group of customers. Shared hosting is the most basic type of web hosting. The provider rents small spaces on a single server to different websites. In this way, all customers have their own space to host their content, while sharing server resources such as CPU, processor, RAM, bandwidth, or IP address. In contrast, a dedicated hosting service is a type of web hosting in which the client leases an entire server and does not share it with anyone else. Although shared hosting works very well, a dedicated server stands out because it is never affected by existing traffic and because it has a higher level of security. A virtual private server (VPS) is basically a server running within a server. One physical server hosts multiple virtual servers, each isolated from the others. Each VPS runs its own operating system, independent of the others. The features offered by a virtual private server are very similar to those of shared hosting. At the same time, it offers all the benefits of a dedicated server. Cloud hosting works in a very similar way to the "cloud" where we store all kinds of documents. This is because all the resources that are used to collect the information of a website are executed from a cloud server. The main difference between cloud hosting and other web hosting types is that, in this case, you only pay for the services you use. Reseller hosting is another type of web hosting. It is basically white-label web hosting. A person buys hosting from a provider and then resells those services to his/her clients. This allows the creation of hosting plans and external domains or subdomains. The last type of web hosting we will talk about here is email hosting, which allows you to register a domain name and therefore have a professional email service. This type of web hosting is highly recommended for businesses or individuals that intend to convey an image of seriousness and trust. Thus, thanks to email hosting, you will be able to have a personalized email address, more storage space, and a higher level of security.

[ ... ]

The mining hardware market is booming
The mining hardware market is booming
09/09/2021

There is no doubt about it: cryptocurrency mining is booming. According to a report by Technavio, the mining hardware market is expected to grow by about €2.4 billion between 2020 and 2024. It would grow at an annual rate of more than 7%. So much so that Facebook has already announced that it will launch its own cryptocurrency, a stablecoin pegged to the fiat currency of the country where it operates. It also announced that it will get involved in the NFT industry. Meanwhile, interest in different types of mining tools continues to grow. Day after day, miners join the network. “It began as a niche hobby. Early adopters had to set up rigs on their own and then figure out how to connect them to pools (groups of miners) and earn profit. But since hosting facilities became a thing, anyone can purchase a rig and earn some passive crypto”, explains Josh Metnick, CEO of Navier, a company that hosts different types of miners.

[ ... ]

Ransomwhere, new platform to track cyberattack payments
Ransomwhere, new platform to track cyberattack payments
13/07/2021

This week was made known the unveiling of Ransomwhere, a new collaborative data platform born with the intention of being able to track 'ransomware' ransom payments to cybercriminals wallets. The platform launched by cybersecurity researcher Jack Cable, allows data to be entered into the Ransomwhere website in an open and transparent format, so that users can easily report on the cryptocurrency wallets used in their ransomware attack payments, often included in the ransom notes of the attacks, and through this data the figure obtained in extortion payments to cybercriminals is obtained. As these payments are made with cryptocurrencies, the transactions can be traced as they are opened by the use of the blockchain or Blockchain. According to the first data obtained in these first weeks of operation, Ransomwhere has reported that it has already recorded more than $33 million paid this past year in ransomware and accumulated data of about $28 million more satisfied previously. This information also shows that the ransomware with the highest income so far is Netwalker, with more than 27 million dollars, followed by REvil / Sodinokibi, with more than 11 million.

[ ... ]

Macro cyber-attack affects more than 350 companies worldwide
Macro cyber-attack affects more than 350 companies worldwide
07/07/2021

The number of companies that have suffered from the REvil macro cyberattack now exceeds 350 organizations worldwide from which the cybercriminals are demanding 70 million in bitcoins to provide them with a universal decryptor to restore their data. The attack was conducted through the update system of IT services software company Kaseya, which REvil exploited to spread and hide ransomware. The virus was leaked to TI Kaseya resellers and from there has reached all end customers using their software. The official data provided by TI Kaseya sets the number of affected companies at 350, although other sources such as the cybersecurity company ESET talk about more than 1,000, including some Spanish organizations, although no names have been disclosed. It has been made public that one of the companies most affected by the cyberattack has been the Swedish supermarket chain Coop, which has had to close its more than 800 points of sale for a few days due to the impossibility of using its cash registers or charging customers. Based on Sophos threat intelligence, REvil has been active in recent weeks and is currently the dominant ransomware gang involved in Sophos' defensively managed threat response cases. Prior to this latest attack, they were also responsible for the one suffered by meat company JBS, which forced the cancellation of all work shifts at the company's slaughterhouses in the US. JBS paid up to 11 million to restore normal operations. These macro cyber-attacks are in addition to other recent and highly significant ones, such as the one perpetrated by the hacker group DarkSide, which forced the preventive shutdown of the largest oil pipeline network in the United States, Colonial Pipeline, endangering the supply of fuel in a large part of the country, or the one suffered by the SEPE and the Ministry of Labor in Spain a few weeks ago.

[ ... ]

How to keep your Mac safe?
How to keep your Mac safe?
28/06/2021

5 things you should do to protect your Mac How many times have we heard that Mac is a more than secure and unbreakable system? For years, Apple has made its security through obscurity, or in other words, its proprietary software, flagship and brand guarantee. Today, however, just when Mac is no longer a minority option, Steve Jobs' system has become another favorite target for hackers and cybercriminals. The market has responded to this with the development of specific protection tools for Mac, while Apple works on optimizing its system in each version. Knowing what kind of tools exist for Mac and which ones are already included in our computer will help us to stay safe and choose the best strategy that fits our needs and use of the equipment. 1. Use computer security tools Cybersecurity is a universal and necessary practice in all operating systems today. The objective is to ensure protection against attacks and theft by cybercriminals who are looking for personal or confidential information stored on our computers or that enters or leaves them, in order to use it for their own benefit. What is VPN security? Cybersecurity tools help us to minimize our footprint on the Internet and thus increase our privacy and security. In this regard, VPN services for Mac stand out, as they incorporate advanced protection technologies capable of connecting to the Internet through intermediate servers, so that our IP address - our identification on the network - is replaced by the IP address of this secure server, without anyone being able to trace our connection. This type of VPN service also encrypts any information leaving our computer, thus preventing it from being accessed on its journey to its destination. This is essential, for example, when using public Wi-Fi networks to connect to the Internet. 2. Keep the operating system and software up to date As simple as it may seem, one of the best and easiest ways to protect a Mac is to always have the latest version of the operating system installed and to work with updated software downloaded from the Mac App Store. System updates usually include security patches, among other things. How do I update my Mac? Through the System Preferences Panel of our computer we can set that when there are available updates we receive a notice from MacOs warning us of it or that these updates, whether system data files, security updates or official software are installed automatically. To check if we are working with the latest versions available and our Mac is up to date we can do it by checking through this same panel if there are updates available at that time. If we have checked the automatic updates option, Mac will do this task for us routinely. 3. Use secure settings Mac's default security settings can be greatly enhanced by manually configuring the security and privacy terms of our computer. How to change the Privacy and Security preferences on the Mac? By accessing the "Privacy" tab of the "Security and Privacy" option of the Control Panel we will have the option to manage what information we allow our computer to make available to others over the Internet or on a network and what applications we allow access to our data and files. In the same way, but through the "Security" tab, we will be able to incorporate passwords for the access to different tasks and operations of the computer and through the "FileVault" tool we will be able to ensure the encryption, for example, of our personal information or certain documents for which a password will be required to unblock them. 4. Use an Antivirus for Mac There are antivirus programs developed specifically for Mac. Some of them are special for certain threats, although in general most of them offer a wide range of services to help us keep our computers safe. Which is the best antivirus for Mac? The range of antivirus for Mac, free and paid, is nowadays much wider than a few years ago, highlighting among the most complete and advanced, antivirus with malware protection functions in real time, tools against digital identity theft, protection against spyware or advanced detection and removal of blackmail programs. 5. Make regular backups Apple has a native function, Time Machine, which makes backup copies of our hard disk on a separate secondary disk, so that if for any reason we suffer an attack or a breakdown we can recover all the information. Many antiviruses offer a backup service, backup or backup similar but in the cloud, as a preventive measure against writing errors on the disk, theft of devices or even against data hijacking or ransomware.

[ ... ]

What is the value of a Bitcoin?
What is the value of a Bitcoin?
11/06/2021

Since Bitcoin first appeared in 2009, this digital currency not issued by any government or company, nor, under the umbrella of any kind of economic policy, has gained a foothold in the market and has already started to fit into existing legal frameworks. What gives Bitcoin its value? The great value of Bitcoin is that it is a decentralized and global currency, an alternative to fiat currencies (those issued by governments). All transactions with Bitcoins are public and each of these crypto currencies belongs exclusively to its owner, therefore, it is a currency that cannot be intervened by anyone. What can I do with Bitcoins? To date, with this cryptocurrency, it is possible to monetize all kinds of services, in addition to making investments, free or practically free of commissions, which in the medium to long term are proving attractive. This has made Bitcoin an asset in which to invest and an increasingly popular means of payment through which to transfer value from one user to another without losing friction along the way, going through an intermediary or paying a commission. What is the price of a Bitcoin? Like any other good, the price of a Bitcoin varies according to market demand, although the fact that it has been designed to behave as a deflationary asset and that its supply is limited to 21 million coins, facilitates that by the law of supply and demand itself, the Bitcoin exchange rate tends to rise continuously. As of June 9, at the time of writing this article, the Bitcoin value today is 30,007.86 euros, 3.4 times its price a year ago, when the Bitcoin to Euro conversion rate was 8,629.5 Bitcoins for 1 euro. In 2010 Bitcoin price was less than one Euro cent. What does the value of Bitcoin depend on? The value of Bitcoin depends on the trust and acceptance of users to use it, hence why Bitcoin is rising in value some days and not others. As Bitcoin has been implemented as a means of payment in multiple transactions and its popularity has grown, its value has grown in parallel.  Likewise, when there have been news or events that have questioned, for example, the suitability of this crypto currency, its price has fallen. Like any other currency, the price of Bitcoin fluctuates and it is the users themselves who set it at the time of the purchase and sale transaction, which prevents the existence of a single price for Bitcoin, since it is not operated through a single platform as is the case with other currencies. Even so, buying and selling prices of Bitcoins tend to be quite similar. To know how much Bitcoin costs, there are several online platforms, known as "Bitcoin trading platforms" that report live the evolution of the value of the cryptocurrency. Is it safe and profitable to invest in Bitcoin? As with any other asset, investing in Bitcoins is profitable if we know how to do it at the right time. On the other hand, the Blockchain technology on which Bitcoin is based is reliable and difficult to manipulate, with no risk of being counterfeited, although some experts believe that the perfect, 100% inviolable system has not yet been created. In the cryptocurrency segment, convertibility is contemplated, so that Bitcoins can be exchanged for fiat currencies. What can I buy with Bitcoins? Over the last few years, a large number of companies have incorporated Bitcoin as an official method of payment for their goods and services From travel companies to ticket sales platforms for all kinds of shows, through gaming platforms, digital bookstores, software stores or even non-profit organizations already accept this digital currency. That is, Destinia, 13tickets, Gear Best, Shopify, Wordpress, Hostinger, Greenpeace,... among many other companies. eBay is currently considering adding Bitcoin as a method of payment. What is Bitcoin mining and how are Bitcoins generated? The users themselves through a totally decentralized system create Bitcoins. To become a bitcoin creator, computers with high computational capacity are needed to process and verify transactions and quickly solve the complex digital processes of generating the currency. This work is called mining and one of its best attractions is that the system offers "miners" rewards in Bitcoins in exchange for these services, which has made this activity very appealing for certain users. Is it profitable to mine Bitcoins in Spain? Bitcoin mining requires very powerful equipment, with high calculation capacities to solve operations, being nowadays totally inoperative for this operation the PCs of domestic or office use. The investment to mine Bitcoins requires, in addition, to assume the large power consumption required by this more powerful equipment, which makes Spain, at this time due to the high price of KW/h, an uninteresting market for mining Bitcoins. On the contrary, other locations such as China, Iceland, Iran or Georgia, where the Bitcoin mining business is in full expansion, are very interesting.

[ ... ]

QUIC, the new official network protocol to replace TCP
QUIC, the new official network protocol to replace TCP
04/06/2021

QUIC, the network protocol designed by Google, has been presented by the Internet Engineering Task Force, IETF, as a new official Internet standard to replace TCP, the current main standard. Google's QUIC (Quick UDP Internet Connections) network protocol is designed to reduce latency with retransmissions taking less time, potentially reducing the waiting time for search results by 8% on computers and 4% on mobile devices, according to the paper released by Google in 2017. QUIC will replace TCP, the current main standard of the Internet since 1974 - when it was still Arpanet - and on which the operation of Internet elements such as the World Wide Web (WWW) logic system, file transmission, 'emails' and remote administration depend. The new QUIC protocol has already been published by the IETF, making it an official network protocol.

[ ... ]

What can I do if my computer runs very slow?
What can I do if my computer runs very slow?
22/05/2021

If your computer is running slow, do not despair. The use of a computer like any other machine needs proper maintenance and the performance of our PC can be severely affected by the lack of attention to this task. But, don't worry, if you want your computer to work as it did on the first day, we explain how to get it back. Why is my computer so slow? Computer slowness can be due to hardware, software, connectivity and even tidiness and cleanliness problems! Every computer needs a minimum maintenance so these failures can be avoided and only if we pay this kind of attention we can ensure an always-optimal performance for our computer, prolong its life and work or enjoy our PC, without despairing. I have tried everything, but my computer is still very slow. What can I do? If your computer is slow and you have already tried the typical things like closing secondary tasks, disabling the automatic execution of programs, you have verified that you have free space on the hard disk and restarted the PC, and everything is still the same, it is clear that something is wrong with your machine and you should consider resorting to a professional computer repair service, so that they can fix it. You can search a thousand videos on the Internet, but... do you really know why your computer is slow? Why does your computer start up very slowly? Or why has your computer become slow after a while of working with it? Are you sure that what you want to do will not end up causing another error or, even worse, another more serious problem? Is it necessary to go to a professional Computer Repair Service to fix the slow computer problem? The answer is yes, if what we are looking for is to really fix the problem and prevent it from happening again. You can save a lot of time and money by using a professional computer repair service. The best computer repair services work with specialized technicians who have the necessary knowledge to make a quick and accurate diagnosis that will allow you to give your computer a new lease of life. In addition, professional computer repair services have the right tools and all the licensed software to be able to intervene. What will a Computer Repair Service do to speed up my slow PC?  The first and foremost thing that a professional computer maintenance service can offer you is a maintenance plan for your computer, tailored to your needs. With this alone, you will most likely avoid many problems related to the performance of your machine, including speed problems, right from the start. They will be able to, among other things, repair or replace any part of your computer causing any problem, they will perform a deep search for viruses to eliminate them; and if necessary, they can clean the cooling system of your computer to remove internal dust, one of the most common causes of slow computer performance - dust accumulated in the internal fans can reduce their efficiency and cause overheating of the machine and its mechanical components -. Sometimes we think about replacing the machine when a simple repair and a good maintenance can bring our PC back to life. When was the last time you had your computer serviced?

[ ... ]
Ver este contenido en castellano en Resultados de la búsqueda
Loading...
x