Jump to content
  • Announcements

    • CyberGod

      Donate and Get VIP Premium Accounts Plus More!!!

      If you have ANY questions about donating, please PM ADMiN   ••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••••   CP NEEDS YOUR DONATIONS!!!   Cyberphoenix runs on high-end Intel Servers , Your donations help us keep the site running smoothly     Donating to CP not only provides you an opportunity to support the site but also get your name posted in the shoutbox, recognizing that you donated, and publicly thanking you.   Benefits of Donating ► Respect of all of our staff, mods, and members.   ► Access to our special VIP forums.   ►A Green name color.   ► A custom member title. (Instead of teacher you could be l337 Donator)   ►In depth tutorial on how to activate windows (including windows 7) / office & receive windows updates!   ► #1 Priority when you request in VIP Requests.   ► The latest HTTP (non rapidshare) links and Premium Downloads!!!   ► You get to have an email like yournamehere@cyberphoenix.info (PM for info!)   ► Max PM storage from 50 to 10,000.   ► Can DELETE your own posts.   ► Avoid all Flood Control Limits.   ► Can change your display name max of two times every 30 days. (PM for info!)   ► RapidLeech Services.   ► Can request, and get #1 priority, in the shoutbox.   ► There is so much that isn't listed here. Donate Today!   We also have a lifetime package available!
    • CyberGod

      Rules of the CyberPhoenix Community : A Must Read   03/16/2018

      All Boards: 1.1 Cyberphoenix is a family forum open for all ages. Explicit, vulgar language, drug, religion, political talk, nudity, porn, hacking, money schemes, scams,advertisements and such others are not allowed. There will be a straight ban, no bargains. 1.2 No mini-modding. Use the report button but do not add your own criticisms.The forum language is strictly limited to English. This includes posts, titles, signatures, profiles and other forms of public display and also includes the main audio language of movies etc. 1.3 No advertisement of any website or forum in posts or signatures nor any live links to be posted. 1.4 All e-mail addresses, passwords and external links of any kind MUST be coded. 1.5 No bumping of threads. 1.6 No impersonating a staff member. 1.7 Respect one and all and No Flaming 1.8 Any member with multiple accounts will have all accounts permanently banned immediately, no bargains. 1.9 No Disrespecting CyberPhoenix Staff will be tolerated and can lead to a Permanent Banned.     Warning System: 2.1 Members breaking rules will be appropriately warned or banned. 2.2 Members with three warnings will be immediately banned.For serious offences or anti-forum activities and posts, members may be banned without warning. 2.3 Warnings may have an expiry date or may be permanent if more serious. 2.4 Do not argue about warnings or bans because they could escalate; pm senior staff if necessary.   Posting Rules: 3.1 a) All topics must contain a valid description. b) Topics must be posted in the relevant forums. Check before you post. c) All freeware posts must have the software homepage link in the post.   3.2 Topic titles must be appropriate. No adjectives such as new, latest, etc. or other such words are to be used in the title. 3.3 Absolutely no duplicate posts. Search before you post and update your links, by editing your post, if necessary. Add to the existing post on that topic. Non-compliance will get post deleted and member warned. No bargains and no clarification on this. 3.4 ALL externally hosted files MUST have a 'freely available' option without the need for Premium Accounts or Registering, completing surveys or assorted hoop-jumping. This also means ensuring file sizes are within the limits specified by any Hosting Site you upload to. Larger files requiring Premium or Registering access may only be shared providing a 'free' option has been given. Disabling the Add Blocker is considered Hoop-Jumping and isn't allowed. 3.5 . No Trading or selling allowed and promoting of Premium Accounts to enable faster/unlimited downloading is not allowed. Each site has advertising within it's own pages clearly showing benefits of Paid versus Free accounts. Please do not act as a salesperson or chase commission through referrals. 3.6 Posts should not contain explicit, offensive, shocking, nudity, and meaningless matter. All freeware posts must have the software homepage link in the post. 3.7 No megapost or multiple threads for a topic allowed. (Only Staff and VIPs with permission from admins can).No index page, every post is to be separate. 3.8 Do not excessively and unnecessarily 'pad out' your archives/files (rar,zip,etc..). For example, adding a 10MB .mp3 with a 50k .sis OR 3mb image file with a 3mb .apk just to earn an extra file host point is totally unacceptable. Maximum acceptable file size that can be added in rar/archive is 3mb. Staff reserve the right to edit any file & re-upload or simply remove/trash without notification. 3.9If the RaR file has a Password you must give the Password and/or the Post will be Deleted and further action can happen   Banned Filehost: 4.1 Filevelocity, Katfile, linkcrypt, ryushare and 4shared are not allowed on CP. Any post/thread not adhering to this policy will be deleted. Further file hosts may be added in future. Catshare, Hulkload, Nitroflare, picofile.com and egofiles, Uploadrocket and Uploadgig,com now added to banned list as well as Kingfiles.Fileshark.pl, Linkshrink.net, Multiup and worldbytez.com and Up-4ever 4.2 No Redirector, masked, protected or referral links otherwise your post may be edited or simply removed/trashed without notification. These sites include, but not limited to the following, subject to addition with immediate effect: up07.me 4shared.com 4shared.eu adf.ly adfoc.us anonym.to any.gs bit.ly bitly.com Catshare.net Downloadsafe.org dyo.gs egofiles file.cloudns.org filehost.s7s7.org filefox.cc filemates.com Fileshark.pl Filevelocity hootsuite.com katfile.com Kingfiles.net letitbit.net linkcrypt linkcrypt.ws linkcrypter.com linksbucks.com Linkshrink.net makeashorterlink.com masl.to Multiup.io Nitroflare paste2.org Peeplink.in picofile.com q.gs qqc.com ryushare.net ryushare.com s2l.biz Secureupload.eu sharecash.com sharecash.org Sharesix.com Short.go4down snipurl.com ow.ly tinylinks.co tinypaste.com tinyurl.com Up-4ever uploadbox.com Uploadgig uptobox.com Uploadrocket usercash.com verified-download.com worldbytez.com   Spam Rules: 5.1 No promoting any website. For the Link Heaven section sites that are within the rules are allowed. 5.2 No webhosting discussion, introduction or advertisement unless it is a CyberPhoenix sponsor. Passwords with other site names are not allowed. 5.3 Unrequired passwords but posted or Posts requiring passwords with missing passwords will turn the post spam. Spam will be deleted and the member banned 5.4 Wrong content in files with dubious names or containing security threats will lead to bans.   Private Messaging: 6.1 All above rules apply to private messaging. Poaching any member or staff member is strictly forbidden. 6.2 PMs from staff and admins must be replied within 48 hours or the member will be restricted from using the forums.   Avatars and Signatures: 7.1 All above rules apply to avatars and signatures. 7.1 The total maximum dimensions for all images in a signature is 500px (width) by 200px (height) horizontally only.   Explicit Guidelines: 8.1 Sticky Requests: No request for a post to be made sticky. No polls for topics usefulness or stickiness. 8.2 Normally no username or password changed except staff or VIP. 8.3 Don’t ask for promotions, send applications in the designated forum only. No advertising sites or email addresses in images or text.   ShoutBox Rules: 9.1 No Spamming, flaming or vulgar words or discussions about banned subjects. 9.2 Strictly No Requests in Shoutbox or your Privilege will be Revoked. There is a separate forum for requests. 9.3 No answering requests or posting large images in shoutbox. 9.4 ShoutBox is for General Chat - Political Statements will be kept to a minimum (If CP Staff thinks it too much he/she will stop it).   Regards CyberGod       These rules may be subject to amendments at any time so please keep referring back from time to time.   Legend: Basic rules fundamental. Usually about all sections. Usually about Download Links sections. Usually about requests and general sections. Advanced rules specification.
    • Mr Grumpy

      VPN Unlimited Lifetime subscription competition   04/28/2018

      Don't forget the competition is still running until May 26th. All you have to do is visit  http://www.cyberphoenix.org/forum/topic/605629-vpn-unlimited-lifetime-subscription-competition/?tab=comments#comment-733772   and make a post. Those members taking part will be put into a random draw and the winner will receive a VPN Unlimited Lifetime subscription as used by several of the staff

Tech 425

Staff Leaders
  • Content count

    4,859
  • Donations

    $0.00 
  • Joined

  • Last visited

  • Days Won

    156

Tech 425 last won the day on May 18

Tech 425 had the most liked content!

Community Reputation

3,847 Excellent

About Tech 425

  • Rank
    Administrator & Staff Leader
  • Birthday April 22

Profile Information

  • Gender
    Not Telling
  • Location
    Pluto :)

Recent Profile Visitors

255,681 profile views
  1. Question about reports

    All of us Mods use a linkchecker, But we do ask if a member finds dead links to Please Report as we can't look at every post We do look at alot of post and me being as Administrator I also do a ton of other things So Please Report Dead Links
  2. Google Plans to Make Chrome's Non-Secure Site Warnings More Prominent Google Chrome has won the lion's share of the browser market with about 57 percent usage, blowing away runner-up Safari at just 14 percent. This gives Google the power to encourage change on the web just by tweaking the way Chrome works. That's what it did over the last few years by making it clear when a site was lacking an HTTPS secure connection. Now that most sites have moved to HTTPS, Google is looking to change the way those warnings appear to emphasize sites that are still lagging behind. Using HTTPS encrypts the connection between you and a website, which prevents someone from intercepting your traffic or impersonating the site. In the past, the processing overhead for encrypting connections was substantial enough that only pages that took personal information would use it. Now, it's a vanishingly small amount of power compared with all the other things a site has to do. Google has been pushing the web toward HTTPS everywhere for years, but it stepped up efforts in 2017 with a prominent indicator when sites had secure connections. This is what's changing. That “Secure” indicator in your address bar will become less explicit, and it'll go away completely in time. Meanwhile, the browser will pitch a fit if you happen upon a site that doesn't have HTTPS. Starting in September of this year, Chrome 69 will shrink the security indicator from a green “Secure” label and lock icon to just a black icon. Later, Google plans to remove the lock icon as well. It wants HTTPS to be the default, not something about which the browser notifies us. Sites that are not secure will still have the warning in the address bar, but that's going to become more obnoxious soon. With the launch of Chrome 70 in October 2018, Google plans to make the non-secure warning more prominent. Previously, too many sites lacked HTTPS to do this, but now it's time to name and shame. The browser will have a “Not secure” warning in the address bar when you are on an HTTP page. The warning will blink and turn red if you start to type on such a page to make extra-sure you know. Google advises site administrators who haven't implemented HTTPS to get on it. The versions of Chrome that make these changes will begin hitting the dev and beta channels very soon. Chrome dev just hit v68, so the next release will include new HTTPS behavior. https://blog.chromium.org/2018/05/evolving-chromes-security-indicators.html
  3. Miley Cyrus pranked Jimmy Kimmel while he Slept and it got Painful Poor Jimmy Kimmel, constantly being woken up in the night by music stars. He's been pranked in the night by Rihanna, Britney Spears, and now Miley Cyrus. Cyrus crept into Kimmel's bedroom at about 1AM and proceeded to perform "Wrecking Ball," complete with a prop sledgehammer. Unfortunately she clocked Kimmel right in the groin with it.
  4. Meltdown and Spectre, the Sequel: Google and Microsoft have Discovered a New CPU Flaw Meltdown and Spectre may sound like the name of big-budget spy thrillers, but they were actually considerably more newsworthy. The security exploits heralded a dangerous new era of cyberthreats – an attack that comes via widespread CPU hardware, rather than an easily patchable software loophole. http://www.alphr.com/security/1008087/intel-chip-security-flaw-ARM-AMD As hardware and software vendors worked together to try to quickly issue firmware and software fixes, researchers were concerned this was just the beginning of a new trend, and so it has come to pass. Meltdown and Spectre have a sequel, and to make matters worse, nobody has come up with a scary-sounding codename for it, so we're left with one hell of a mouthful: Speculative Store Bypass Variant 4 (Meltdown and Spectre cover 1-3 between them.) The bug was jointly disclosed by researchers from Microsoft and Google's Project Zero, and although the companies claim that the risk to users is “low” and that there's no evidence it has been used in the wild, it does impact Intel, AMD and ARM processors, meaning the net of potentially vulnerable processors is quite wide. Like Spectre, the bug exploits modern processors' speculative execution function, which is how CPUs make educated guesses about which data to work with as they process tasks, rather than waiting for the 100% accurate information to improve performance. Like its predecessors, the Speculative Store Bypass Variant 4 takes advantage of how the processors protect data during this process, and is theoretically able to lift information leaked out along the way, such as passwords. If this is all a bit heavy going, the video below from Red Hat Linux may help you visualise the flaw by helping you imagine your CPU as a restaurant (no, really). So how can Speculative Store Bypass Variant 4 be neutralised? Well, the good news is that its effectiveness was already severely lessened by steps taken by web browsers during the Meltdown crisis. As Intel security chief Leslie Culbertson writes in a blog post, the fixes for the likes of Safari, Edge and Chrome “are also applicable to variant 4 and available for consumers to use today.” https://newsroom.intel.com/editorials/addressing-new-research-for-side-channel-analysis/ Unfortunately, to be completely safe, there's another part of the medicine, and this one comes with side effects. A firmware update for CPUs affected will have the disappointing knock-on effect of a small performance drop, if Intel's beta software is anything to go by. For that reason, Intel's version will be turned off by default, leaving consumers and system administrators to choose between performance and a security. “If enabled, we've observed a performance impact of approximately 2-8% based on overall scores for benchmarks like SYSmark 2014 SE and SPEC integer rate on client 1 and server 2 test systems,” writes Culbertson. A Microsoft spokesperson revealed that the company first became aware of this variant back in November 2017, and disclosed it to industry partners as part of Coordinated Vulnerability Disclosure.” Another spokesperson told The Verge: “We're not aware of any instance of this vulnerability class affecting Windows or our cloud service infrastructure. We are committed to providing further mitigations to our customers as soon as they are available, and our standard policy for issues of low risk is to provide remediation via our Update Tuesday schedule.” The good news is that future processors should be immune to Meltdown, Spectre and all their sequels. For Intel's part, both the next-generation Xeon processors (Cascade Lake) and 8th generation Intel Core processors will include built-in hardware protections when they ship later this year. The fix involves a 2-8% performance dip if enabled
  5. Comcast (Xfinity) is Leaking the Names and Passwords of Customers' Wireless Routers Comcast has just been caught in a major security snafu: revealing the passwords of its customers' Xfinity-provided wireless routers in plaintext on the web. Anyone with a subscriber's account number and street address number will be served up the wi-fi name and password via the company's Xfinity internet activation service. The site is meant to help people setting up their internet for the first time: ideally, you put in your data, and Comcast sends back the router credentials while activating the service. The problem is threefold: You can "activate" an account that's already active The data required to do so is minimal and it is not verified via text or email The wireless name and password are sent on the web in plaintext This means that anyone with your account number and street address number (e.g. the 1425 in "1425 Alder Ave," no street name, city, or apartment number needed), both of which can be found on your paper bill or in an email, will instantly be given your router's SSID and password, allowing them to log in and use it however they like or monitor its traffic. They could also rename the router's network or change its password, locking out subscribers. This only affects people who use a router provided by Xfinity/Comcast, which comes with its own name and password built in. Though it also returns custom SSIDs and passwords, since they're synced with your account and can be changed via app and other methods. What can you do? While this problem is at large, it's no good changing your password — Comcast will just provide any malicious actor the new one. So until further notice all of Comcast's Xfinity customers with routers provided by the company are at risk. One thing you can do for now is treat your home network as if it is a public one — if you must use it, make sure encryption is enabled if you conduct any private business like buying things online. What will likely happen is Comcast will issue a notice and ask users to change their router passwords at large. Another is to buy your own router — this is a good idea anyway, as it will pay for itself in a few months and you can do more stuff with it. Which to buy and how to install it, however, are beyond the scope of this article. But if you're really worried, you could conceivably fix this security issue today by bringing your own hardware to the bargain.
  6. ARE YOU GIGABIT READY?

    ARE YOU GIGABIT READY? 17 TIPS TO HELP YOU GET THE HIGHEST SPEEDS POSSIBLE. The future of the internet is fast. Fourteen times faster than the 70 Mbps the US averaged for download speed in March, gigabit-speed fixed broadband is still rare, but it’s making appearances in locations over the globe. Before you get too attached to the idea of downloading 1 billion bits of data per second, know that getting gigabit service and adjusting your set-up to achieve top speeds is harder than you might think. We’re here to offer a few tips to help you achieve the Speedtest results you dream of. Some of these will help you maximize your potential internet speeds even if gigabit is not available in your area. Factors you can’t control 1. Is gigabit-level service available in your area? While internet service providers (ISPs), municipalities and companies like Google have been making headlines with gigabit (the ability to download 1 billion bits of information in one second), service is still rare (and expensive). Ask around to see if gigabit is available in your area. Google Fiber is one option in some cities. Also check with phone companies and smaller ISPs to see if they offer gigabit. Some forward-thinking governments in places like Longmont, CO; Grant County, WA and New Westminster, BC have even created their own fiber networks. 2. What kind of infrastructure is your service delivered over? You’ll get the best speeds with fiber because you won’t have to deal with the noise or interference that occurs over copper lines. However, new coaxial technologies, namely DOCSIS 3.1, have the potential to provide gigabit speeds, but not symmetrically (see the next point). Finally, phone lines, used for DSL, absolutely won’t cut it at all. Having fiber doesn’t mean you’ll automatically have gigabit; the service still needs to be available in your area and you’ll likely pay more for it. 3. Is the available service plan symmetrical? That is, are the advertised download and upload speeds the same? This varies by ISP, but asymmetrical service is more likely over coaxial connections — symmetrical gigabit service requires the robustness of a fiber optic connection. Asymmetrical service can lead to bufferbloat. https://en.wikipedia.org/wiki/Bufferbloat 4. Understand the network located upstream of you. And the quality of that network matters. If your ISP’s central office doesn’t have the bandwidth to support all the gigabit connections in your area, everyone will see slower speeds during peak usage times. This also applies to peer-to-peer connections. If you’re downloading games and/or streaming movies, your performance is impacted by both the quality of the network those applications are using and how fast those services allow content to be downloaded. Gigabit is great for ensuring that multiple users are having a consistent internet experience, but don’t expect to be downloading games from Steam at gigabit speeds. 5. Data overhead makes 1 Gbps a theoretical number. Though perfect circumstances might allow you to send 1 billion bits of information per second, some of those bits are overhead (including preamble, inter-frame gaps and TCP) and your actual data throughput will be a little smaller. If there was no overhead, you might be able to achieve a Speedtest result of 997 Mbps, but you’re more likely to top out at 940 Mbps. For more details on the math, read this. What you can control 6. Good quality wiring is essential. To achieve the fastest speeds possible, the most important thing you can do is use Cat 6 ethernet wiring to connect your devices to your modem and/or router. Cat 5e can do it but you’ll get less crosstalk using Cat 6. Plus, if you’re going to spend the money on new cables, it’s worth future-proofing your investment. Cat 5e supports up to up to 1,000 Mbps while Cat 6 supports ten times that. Also don’t run your data cabling parallel to power lines — interference from the power lines can cause interference in the ethernet cabling. 7. Are both the ports and the CPU in your router gigabit-ready? Read the fine print when choosing a router. Not every consumer-grade router can support gigabit speeds over the ports in the back. And sometimes the ports support gigabit but the router’s CPU can’t keep up. In general, x86 processors are fastest, followed by ARM and then MIPS. You still need to check this even if your router was provided by your ISP. Typically you’ll find that recently-released and the more expensive consumer grade routers are up to the task. Here are two routers we recommend along with affiliate links to make your shopping easy: Ubiquiti Edgerouter. The super advanced user will enjoy the pared-down customizability of this router. Many of the Ooklers use some version of this router. It doesn’t have Wi-Fi built in so be sure to get one or more compatible access points. Velop Whole Home Wire Mesh. To set up your entire house at once, try this system. It comes pre-loaded with Speedtest so you can easily test your connection. 8. Use a hardwired connection. While Wi-Fi technology is catching up, you’ll still likely see better speeds if you plug that Cat 6 ethernet cable directly into your computer. 9. Check your adapter. Not all laptops have ethernet ports, so you’ll need an adapter for a hardwired connection. Make sure the adapter you’re using is gigabit capable. Thunderbolt and USB 3.0 adapters are usually good, but the performance of other adapters varies widely. And don’t forget, USB based adapters also add data overhead. 10. If you must use Wi-Fi, pick a clear channel and sit close to your router. All kinds of things can interfere with your Wi-Fi signal and thereby slow down your connection: fluorescent bulbs, baby monitors or even a cheap pair of wireless headphones. This is critical for Wi-Fi performance as only one device can use the channel at a time. In addition, Wi-FI uses CSMA-CA to handle collisions — if it detects a collision on the channel, the Wi-Fi device will halt sending and wait until the channel is clear. Interference counts as collisions, so you will end up with a sporadic and halting connection with interference nearby. If your connection is clear, attenuation (signal drop over distance) is a very real problem when using Wi-Fi. The 2.4 GHz band handles attenuation better but is more subject to interference. The 5GHz band is less subject to interference but has more issues with attenuation. Either way, you’re still likely only to achieve speeds topping out around 600 Mbps. If you are on the 2.4 GHz band, make sure to chose from channels 1, 6, or 11 (or 14 if allowed by your country) — those are the only non-colliding channels at 20 MHz. At 40 MHz, you will pretty well consume the entire 2.4 channel spectrum, thus, it will be even more at risk of interference. For an illustration, click here. https://upload.wikimedia.org/wikipedia/commons/thumb/8/84/NonOverlappingChannels2.4GHzWLAN-en.svg/720px-NonOverlappingChannels2.4GHzWLAN-en.svg.png 11. Make sure your computer is using the latest Wi-Fi standards. The nonprofit Wi-Fi Alliance keeps a close eye on these standards. In 2016 they announced Wi-Fi CERTIFIED ac standards which include Multi-User Multi-Input Multi-Output (MU-MIMO), 160MHz channels, quad-streams and extended 5GHz channel support. These standards change as technology improves, so check to make sure you’re working with the latest certifications. And just because your router supports these standards doesn’t mean your laptop or wireless device does. Wi-Fi CERTIFIED - AC Standards: http://www.wi-fi.org/discover-wi-fi/wi-fi-certified-ac 12. Decipher the hype behind the marketing. For example, a wireless router that says it can support 4 gigs doesn’t necessarily mean it can support one 4 Gbps connection. It’s more likely that the device has four radios with 1 Gbps specified maximums (real world performance is likely to be slower). 13. Stay up to date on router firmware, but don’t update on day zero. Vendors regularly release software updates for their routers to improve their stability, performance and security. It’s usually always the best option to stay up to date with these firmware patches. With that said, many of us Ooklaers wait anywhere from a week to a month to apply these patches (assuming they are not critical security updates) to make sure there are not any regressions or issues. 14. Use our desktop apps to run your Speedtest. If you’re sure your setup is perfect but you’re still not seeing the Speedtest result you expect, download our free desktop apps for Windows or MacOS. Many lower performance systems can’t reach 1 Gbps via browser tests due to various limitations. Plus our desktop apps give you data on jitter and packet loss. Speedtest App for Windows or MacOS: http://www.speedtest.net/apps/desktop Advanced options: For the tech Savviest 15. Is your network interface card (NIC) up to the task? Just being rated for 1000-Base-T may not be enough. NICs that use software offload instead of hardware offload are often found in older, cheaper computers and struggle to support gigabit speeds. Intel offers some of the best driver and hardware support on their NICs. https://en.wikipedia.org/wiki/Gigabit_Ethernet#1000BASE-T 16. Encryption can be slow if it’s not done right. Temporal Key Integrity Protocol (TKIP) encryption, often enabled by default on Wi-Fi routers, will slow you doooowwwwn. Use Advanced Encryption Standard (AES) instead as it’s often hardware accelerated. The standard for WPA2 encryption, AES is both more secure and faster than TKIP. Some routers have TKIP options for compatibility reasons, though, even if you’re using WPA2, so check. 17. Turn off QoS shaping. Quality of Service (QoS) shaping on a router can help you prevent large downloads from eating up all your bandwidth. But on consumer hardware, you’re also bypassing hardware acceleration so all your packets of data have to be inspected by the main CPU. This can cut your performance by 10x on a high bandwidth connection.
  7. EXPENSIVE FAILS !

    EXPENSIVE FAILS ! EXPENSIVE FAILS 2.0 !!!!
  8. Hellish adventure 'Agony' gets terrifying story trailer Many months ago, a game called Agony caught our attention. It's coming to Xbox One, PC, and PlayStation 4 on May 29, 2018 for $39.99. We don't know much about the title, but we do know that it takes place in Hell and features a terrifying story. Today, Madmind Studios released a new trailer which showcases tormented souls awakening in a nightmare world. The video sets the tone for the horrific, immersive world of Agony where we get our first glimpse of what the journey entails. You must survive and solve the riddle behind the mysterious "Red Goddess". The Red Goddess is the architect of Hell, and the sole entity with knowledge on how escape. Warning: Adult Content The main mechanic of the game appears to be the ability to possess demons and other souls to find a way out of Hell. Players who love single-player games will be delighted to know that Agony features a full-fledged story mode as well as an open challenge system that randomly generates levels for gamers to explore and gain high scores. Since its announcement, Agony has been one of my most anticipated upcoming horror games. Hopefully the title will deliver when it launches in a few weeks. It's unclear if the game supports Xbox One X as the developer didn't provide any details about the platform. We'll keep you posted as soon as we know more. See at Amazon: PlayStation 4 https://www.amazon.com/Agony-PlayStation-4/dp/B07BKKK74P/ref=sr_1_1?ie=UTF8&qid=1524246269&sr=8-1&keywords=Agony&th=1&tag=wpcentralb-20&ascsubtag=UUwpUdUnU55902YYw Xbox One https://www.amazon.com/Agony-Xbox-One/dp/B07BKKK74P/ref=sr_1_1_twi_gam_2?s=videogames&ie=UTF8&qid=1526849953&sr=1-1&keywords=Agony&th=1
  9. How to Convert Slow Cooker Recipes into "Instant Pot" Recipes There are two ways you can use an Instant Pot to replace a basic slow cooker. You can either put it in Slow Cook mode or you can pump up the speed and make the recipe using Pressure Cook mode. Here are some tips for doing both. How to use an Instant Pot as a slow cooker You can cook just about anything you make in a slow cooker in your Instant Pot. It just takes a little tinkering and understanding of the button functions. Most slow cookers have three settings: warming, low and high. These temperature levels can be achieved with your Instant Pot by pressing the Slow Cook button, and then by putting it in Less mode for warming temperatures, Normal mode for low temperatures and More for high temperatures. You can also use the Instant Pot glass lid instead of the pressure cooking lid. If you are using the pressure cooking lid, make sure the steam release valve is turned to the venting position. How to make slow cooker recipes in a pressure cooker If you want to crank up the speed your recipes cook, you can turn a regular slow cooker recipe into a pressure cooking recipe. For example, 4 hours on high in a slow cooker converts to 25 to 30 minutes in a pressure cooker. When you add the time it takes to build and release pressure, these recipes take about an hour total. Pretty much a win for weeknights. Instant Pot valve needs to be turned to Venting when you're making a slow cooker recipe in Pressure Cook mode. There are a few guidelines, though. When slow cooking, set the valve settings from sealing to venting. Don't forget this like I tended to do in the beginning. Otherwise, your food will end up undercooked. Also, always add a cup of water -- or semi-clear liquid like broth, sauce or juice -- to any recipe you are cooking. The cooker will need the moisture to get up to pressure. If you don't want your meat to touch the liquid, put it up on the trivet that comes with the cooker. Be sure to only fill the Instant Pot two-thirds full, or just half full if you're cooking foods that expand, like rice and beans. You can have an explosive mess on your hands if you fill it all the way. Remember, this is pressure cooking, not slow cooking. Use the programming buttons for the type of food you're cooking. For example, use the Poultry button when cooking chicken. Here's what each program button on your Instant Pot means . Wait to add any dairy products -- like cheese, milk or cream-of-soups -- to the recipe until after the pressure cooking ends or you may end up with curdled goo. Sometimes pressure cooker recipes can lack thickness. If that's the case for your dish, add thickeners like flour or cornstarch after the pressure cooking is done in Saute mode. Need more help? Exact cooking times can be found at the Instant Pot timing page or you can use the official recipe app to get exact instructions for each dish. Instant Pot Timing Page: https://instantpot.com/instantpot-cooking-time/ Official Recipe App: https://instantpot.com/instant-pot-recipe-app-free-300-recipes/ How to make tasty pots of rice in your new Instant Pot Instant Pot Max cooks faster, has new skills
  10. HTC is creating an Android phone that's powered by Blockchain The phone's called "Exodus" and will be released this October. It's no secret at this point that HTC's seen better days. The company knows how to make a solid smartphone, but consecutive quarterly losses and the departure of its mobile president has resulted in some pretty rough waters. In an attempt to turn the ship around, HTC has announced that it's creating a...blockchain smartphone. According to The Next Web, HTC's blockchain phone will be called Exodus and is scheduled for a release at some point in October. Exodus will come equipped with its own universal wallet for managing various cryptocurrencies and special technology will allow it to run all sorts of decentralized apps. Furthermore, all Exodus phones will also act as nodes to manage cryptocurrency trading that takes place through HTC's own blockchain network. Phil Chen, (the creator of HTC's Vive headset) who will be leading the Exodus project, says – HTC's yet to announce pricing for its Exodus phone, but when it does go on sale, customers will be able to purchase it using, you guessed it, cryptocurrency. There's no doubt that HTC's trying something different compared to most other Android OEMs with Exodus, but I'm not sure this is the product that'll revitalize the company's mobile business. Cryptocurrency is an incredibly niche and volatile technology, and basing an entire phone around it seems like something only diehard blockchain enthusiasts will take to. What do you think about Exodus?
  11. Google AR headset "A65" tipped to rival HoloLens Google is reportedly developing a standalone Augmented Reality headset to take on Microsoft HoloLens, a cable-free system that does not require a tethered PC to drive it. The rumors come after the launch of the first standalone Daydream headset, the Lenovo Mirage Solo, which packages a full virtual reality system into a single wearable. VR, of course, differs from AR in that the latter is designed to add to the real world rather than replace it altogether. Although that arguably has more practical uses, it's also considerably more challenging. First, some sort of transparent display is needed, with which graphics can be overlaid atop objects in the physical space. Then there's the matter of locational accuracy. Although the Mirage Solo uses so-called “inside out” positional tracking, with cameras on the front of the headset mapping the room so as to track where the wearer is moving in 3D space, augmented reality demands far greater accuracy than virtual reality does. Without it, virtual graphics won't properly line up with the real graphics they're meant to mesh with. Finally, there's the power requirement. Mapping 3D space, generating meaningful graphics, and doing so in a way that doesn't demand heavy batteries that would weigh down an AR headset is a tricky balancing act. Microsoft's HoloLens is fairly bulky but its battery still only lasts a couple of hours. Meanwhile Apple's rumored AR headset could well be tethered, according to recent leaks. According to WinFuture's sources, Google's engineers are working on an AR headset that builds on Daydream technology and addresses these challenges. Said to be internally known as Google A65, it's believed to be powered by Qualcomm's QSC603 chipset. That's a relatively new offshoot of the company's Snapdragon SoCs for smartphones, focused on Internet of Things (IoT) and wearable applications. Currently, it's said, Google is working with Quanta on prototypes. The two companies aren't exactly strangers: Quanta manufactured the Pixel C, for instance. Hardware specifications are still in flux – the A65 may end up using Qualcomm's more powerful QSC605, for instance – but we can expect various cameras, microphones, and some sort of transparent display system. By using a relatively low-power ARM based processor, Google could bypass some of the power issues Microsoft's HoloLens has faced. The current-generation HoloLens uses an Intel x68 processor, though Microsoft is expected to switch to one of Qualcomm's chipsets for its next-generation headset. That's expected to be revealed in early 2019, and use Microsoft's newest fourth-generation Kinect sensor for spatial mapping, among other things. Although Google's AR headset is likely to prompt discussion of Google Glass, the ill-fated wearable was never actually comparable with something like HoloLens or what A65 is shaping up to be. Glass' display, though transparent, wasn't intended for augmented reality use: it did not map graphics atop real-world objects, only allowed wearers to continue to see the space around them even as they checked their notifications. True AR, however, has far more practical benefits, if Google can get it right. Google Maps, for instance, could overlay turn-by-turn navigation onto the city around you, highlighting where your route will go. Blank spaces, like walls, could be repurposed as virtual displays, showing the contents of your Gmail inbox or latest Google Docs work-in-progress. Meanwhile, games could have characters and gameplay that interacts with the world, with enemies hiding behind physical objects. When, exactly, Google A65 might graduate to a physical product is unclear at this stage, and indeed final specifications could well change significantly before that point. Still, it's unsurprising that Google is weighing in on the space, having been pushing VR heavily in recent years.
  12. Four men linked to Mugshots.com have been Charged with Extortion Four men allegedly behind the website Mugshots.com have been arrested and California Attorney General Xavier Becerra announced charges of extortion, money laundering and identity theft. The website mines information from police department websites, pulling names, mugshots and charges of those who have been arrested, and then publishes them online. To get the content taken down, individuals have to pay a "de-publishing" fee -- a practice that has been illegal in California since 2015. Becerra's office says that over the course of three years, the site collected more than $64,000 from California residents and over $2.4 million nationwide. "This pay-for-removal scheme attempts to profit off of someone else's humiliation," Becerra said in a statement. "Those who can't afford to pay into this scheme to have their information removed pay the price when they look for a job, housing or try to build relationships with others. This is exploitation, plain and simple." In some cases, the website published booking photos for people whose cases were overturned or were never even charged with a crime. California officials were issued search warrants to access information from Google, DreamHost, Amazon, Yahoo, TransUnion, Comcast and Bank of America, records from which linked the four men to Mugshots.com and its sister site Unpublisharrest.com. Two of the men -- Sahar Sarid (above, right) and Thomas Keesee (above, left) -- were arrested in Florida while Kishore Vidya Bhavnanie was arraigned in a Pennsylvania court earlier this week. The fourth individual, David Usdan, was suspected to be in Connecticut and a spokesperson for Becerra's office told Ars Technica that he was in custody as well. California officials are working to extradite the four men.
  13. The only way Google X's Selfish Ledger is "Good" This morning we caught a glimpse of a leaked internal video from Google X called The Selfish Ledger. The head of design at what was called Google X (and is now just “X” under Alphabet) Nick Foster made this video with David Murphy, Google Senior UX Engineer. In the video, they show how learning computers could allow Google to modify human behavior and the future of our Earthbound society. X Spokesperson Statement The video was leaked to The Verge, who also got a comment from an unnamed X spokesperson. “We understand if this is disturbing — it is designed to be,” said an X representative. “This is a thought-experiment by the Design team from years ago that uses a technique known as 'speculative design' to explore uncomfortable ideas and concepts in order to provoke discussion and debate. It's not related to any current or future products.” The idea that the entire video isn't related to any one product – I believe that. It'd be too blatant to lay it all on the line like this. Much of what's in the video, however, relates directly to the capabilities of a modern mega-massive organization like Google, Amazon, Facebook, Apple, Microsoft, etcetera. There's no escaping that reality – we're already in it. One Defense Only The one and only way this video is defensible as anything BUT a thought exercise is in a willful submission to a new chapter in our ever-evolving human society. The concepts presented in this video suggest Google can modify the behavior of a human being (and all human beings) to fit a set of goals, all aimed at a better future. The overarching goal is the betterment of our human society. “If X is a religious organization… it's OK.” If X registers as a religious organization, they should be in the clear. It shouldn't matter, at that point, what their ways and means are, just so long as they're a non-profit organization registered with our government – and all governments – as a religious entity. It is only once your group is a religion that it's acceptable to look into our actions, decisions, preferences, movement, and relationships and use that information to modify our behavior for the common good. At the point at which X is a religion, what does it matter that their ways and means include intelligent computers? Just kidding… ? I'm being facetious, of course – I'm not currently comfortable with any more data collection or behavior modification than I'm currently the victim of – but really? There's no escaping the idea that, as a pack of humans, there's always some form of information collection and behavior modification going on. Without it, we'd still be pre-humanoids living in Africa – or we wouldn't have evolved into humans at all. The question I'm considering now is more along the lines of: Is this method of data collection and behavior modification OK with me, as an individual, right here and now? I'd like to have an easy answer to that. But who knows? Maybe the society-shapers at X would be better for us all than the systems we've got in place right now? Maybe voting for leaders in government and volunteering to be a leaders in religion is wrong for humans now? Maybe something new is in order? Sidenote The video's going to bring X a bit more trouble if creators like Philip Bloom have anything to say about it. It would appear that a total of 75 seconds of Bloom-filmed video is used in the video without having been licensed properly. “I know they have some claim over my footage as it's on YT but I thought that is if they want to use it promote YT itself, not carte blanche.”
  14. Female friendship has an Edge

    Female friendship has an Edge (and Nicki Minaj) in cut 'SNL' song Female friendship is a delicate wonder – just ask the women of SNL's cut "Female Friendship" sketch from the Tina Fey-hosted season finale on May 19. Fey, Aidy Bryant, and Kate McKinnon are just a few girlfriends at a bar, but make no mistake – they'll carve up your life to defend their friends. A group of girlfriends goes to a bar and encounters a series of predicaments we've all been through; the person who refuses to remember you, the apathetic ex, the lying coworker. The ladies (and musical guest Nicki Minaj) sing about the joys of female friendship, like stalking someone you hate on Instagram and finding their every flaw because they insulted your friend. Who hasn't been there? SNL will return in fall.
  15. hello

    Hello BOBBY_S, Welcome to CyberPhoenix I hope you enjoy your stay and come back often Please follow CyberPhoenix Rules and if you don't see something you want then use Search We also have a Request Section if you can't find something you want Become a CyberPhoenix VIP for Premium Accounts and alot more Administrator
×