
La llegada de la nueva versión de Java 16 a Minecraft dejó al actual PreLauncher v7 fuera de servicio, por lo que tuvimos que empezar a trabajar en una actualización para corregir errores e incluir la compatibilidad con la nueva versión de Java.
El «Pre-Launcher», como lo hemos llamado, es la aplicación encargada de descargar y actualizar el launcher para mantenerlo siempre en la última versión disponible. Con esta aplicación no tienen que preocuparse por descargar el launcher manualmente cada vez que se publique una nueva actualización, ya que el PreLauncher se encargará de esa tarea.
Después de mucho tiempo alejados del proyecto, hemos vuelto, y ya estamos trabajando en una nueva versión renovada del LauncherFenix, ¿o quizás tenga otro nombre? ya veremos. Hasta tanto seguiremos manteniendo funcional esta versión del launcher para continuar brindando el servicio a la comunidad mientras seguimos trabajando.
¿Que incluye esta nueva versión?
La última versión disponible del launcher al día de la fecha en que se realiza esta publicación, es la versión 5.7.9 la cual incluye, entre otras características, las siguientes:
- Compatible con todas las versiones del Minecraft, tanto las versiones estables (Releases) como las de prueba (Snapshots) y las versiones antiguas (Alphas, Betas).
- Compatible con las versiones de Java más utilizadas, desde Java 7 hasta Java 16, para no dejar afuera a los usuarios que poseen PC de bajos recursos y continúan jugando a versiones antiguas de Minecraft.
- Puedes cambiar entre las distintas versiones del juego seleccionándolas desde el panel «Editar Perfil» y se descargará automáticamente.
- Permite crear perfiles con distintos usuarios y configuraciones para cambiar rápidamente entre ellos.
- Ofrece la posibilidad de seleccionar la versión de Java con la que se desea iniciar el juego y personalizar sus parámetros internos. («Argumentos JVM»).
- Instalar MinecraftForge es tan sencillo como marcar una casilla en las opciones del launcher. (Esta opción les permitirá instalar mods para el juego).
- Cuenta con una pestaña de noticias con la que podrán mantenerse al tanto de las modificaciones que se realizan sobre el launcher, una consola en la que podrán ver el proceso interno que realiza el launcher y los errores que surjan durante dicho proceso, un editor de perfiles desde donde podrán modificar o borrar los perfiles que tienen creados, y un editor de versiones en donde verán las versiones del Minecraft que posee instaladas.
- Dispone de un panel dedicado a la instalación y manipulación de los Mods que se utilizarán en el juego. Este panel les permitirá instalar mods, quitarlos, activarlos y desactivarlos según lo necesiten. Incluso podrán crear varios perfiles y activar los mods que quieran en cada perfil.
- Dispone también de un panel con el que podrán personalizar su personaje cambiándole el nombre, colocándole una skin, una capa y una elytra personalizada. (Para usar esta opción deberán iniciar sesión en el launcher con su cuenta de esta página).
- Posee un pequeño panel llamado “Estado Servidor” en dónde podrán consultar el estado del servidor que deseen sin tener que iniciar el juego y también podrán ver el estado del servidor de skins que utiliza el launcher.
- El launcher está disponible en dos formatos, el formato JAR, funcional en la mayoría de los sistemas operativos para PC y el formato EXE, exclusivo para el Sistema Operativo Windows.
- Y lo más importante para muchos, ES TOTALMENTE GRATIS! 😀
¿Cómo puedo descargarlo?
A continuación encontrarás los enlaces para descargar la última versión del launcher gratuito para Minecraft LauncherFenix. Todos los archivos publicados en la página son analizados y se encuentran libres de virus pero debido a la extensión de los archivos, puede que el navegador realice una advertencia.
- LauncherFenix-v7.exe: Click aquí para descargar
- LauncherFenix-v7.jar: Click aquí para descargar
Ingresa a nuestro Discord: https://discord.gg/DMpxrWP
Siguenos en Instagram: https://www.instagram.com/launcherfenix/
🔒 WARNING: SYSTEM COMPROMISE ALERT 🔒
Greetings,
This is a notification from an anonymous source who has discovered vulnerabilities in your website’s current setup. Our scanning mechanisms have detected an alarming number of security weaknesses that could potentially lead to severe data breaches and unauthorized access.
The following components and services are in a concerning state of abandonment:
– Cloudflare: Inadequate configuration could expose your server to DDoS attacks.
– Google AdSense: Outdated integration could lead to malicious ads injection.
– Google Analytics UA: Unpatched version might leak sensitive user data.
– Google Font API: Unsupported version could facilitate cross-site scripting attacks.
– HTTP/3: Improper setup might result in a breach of secure communication.
– jQuery & jQuery Migrate 3.3.2: These versions contain known vulnerabilities.
– MetaSlider: Unmaintained plugin could be exploited for unauthorized access.
– MySQL: Unpatched version might allow SQL injection attacks.
– PayPal: Unsupported integration could lead to financial data leaks.
– PHP 7.3.25: Outdated PHP version is susceptible to various exploits.
– WordPress 5.7.2: Unpatched installations are targets for various attacks.
Additionally, your system seems to be exposed to several critical Common Vulnerabilities and Exposures (CVEs):
– CVE-2022-37454, CVE-2017-8923, CVE-2021-44223, CVE-2021-21703, CVE-2022-31629, CVE-2022-21663, CVE-2022-21664, CVE-2023-2745, CVE-2022-43497, CVE-2022-31628.
Furthermore, it has come to our attention that a suspicious executable and Java archive are present on your system:
[01/71] LauncherFenix-Minecraft-v7.exe – Detected as potential malware by Bkav Pro (W32.AIDetectMalware).
[00/62] LauncherFenix-Minecraft-v7.jar
If these vulnerabilities are not addressed immediately, your website could fall victim to cyberattacks, data theft, and other malicious activities. It’s crucial to take immediate action to update and secure all components, eliminate vulnerabilities, and perform a comprehensive security audit.
We strongly advise you to engage a skilled cybersecurity professional to conduct a thorough review of your website’s security and to initiate the necessary remediation measures. Remember, neglecting these warnings could have severe consequences for your online presence and your users’ privacy.
1696445699
🔒 WARNING: SYSTEM COMPROMISE ALERT 🔒
Greetings,
This is a notification from an anonymous source who has discovered vulnerabilities in your website’s current setup. Our scanning mechanisms have detected an alarming number of security weaknesses that could potentially lead to severe data breaches and unauthorized access.
The following components and services are in a concerning state of abandonment:
– Cloudflare: Inadequate configuration could expose your server to DDoS attacks.
– Google AdSense: Outdated integration could lead to malicious ads injection.
– Google Analytics UA: Unpatched version might leak sensitive user data.
– Google Font API: Unsupported version could facilitate cross-site scripting attacks.
– HTTP/3: Improper setup might result in a breach of secure communication.
– jQuery & jQuery Migrate 3.3.2: These versions contain known vulnerabilities.
– MetaSlider: Unmaintained plugin could be exploited for unauthorized access.
– MySQL: Unpatched version might allow SQL injection attacks.
– PayPal: Unsupported integration could lead to financial data leaks.
– PHP 7.3.25: Outdated PHP version is susceptible to various exploits.
– WordPress 5.7.2: Unpatched installations are targets for various attacks.
Additionally, your system seems to be exposed to several critical Common Vulnerabilities and Exposures (CVEs):
– CVE-2022-37454, CVE-2017-8923, CVE-2021-44223, CVE-2021-21703, CVE-2022-31629, CVE-2022-21663, CVE-2022-21664, CVE-2023-2745, CVE-2022-43497, CVE-2022-31628.
Furthermore, it has come to our attention that a suspicious executable and Java archive are present on your system:
[01/71] LauncherFenix-Minecraft-v7.exe – Detected as potential malware by Bkav Pro (W32.AIDetectMalware).
[00/62] LauncherFenix-Minecraft-v7.jar
If these vulnerabilities are not addressed immediately, your website could fall victim to cyberattacks, data theft, and other malicious activities. It’s crucial to take immediate action to update and secure all components, eliminate vulnerabilities, and perform a comprehensive security audit.
We strongly advise you to engage a skilled cybersecurity professional to conduct a thorough review of your website’s security and to initiate the necessary remediation measures. Remember, neglecting these warnings could have severe consequences for your online presence and your users’ privacy.
1696445753
🔒 WARNING: SYSTEM COMPROMISE ALERT 🔒
Greetings,
This is a notification from an anonymous source who has discovered vulnerabilities in your website’s current setup. Our scanning mechanisms have detected an alarming number of security weaknesses that could potentially lead to severe data breaches and unauthorized access.
The following components and services are in a concerning state of abandonment:
– Cloudflare: Inadequate configuration could expose your server to DDoS attacks.
– Google AdSense: Outdated integration could lead to malicious ads injection.
– Google Analytics UA: Unpatched version might leak sensitive user data.
– Google Font API: Unsupported version could facilitate cross-site scripting attacks.
– HTTP/3: Improper setup might result in a breach of secure communication.
– jQuery & jQuery Migrate 3.3.2: These versions contain known vulnerabilities.
– MetaSlider: Unmaintained plugin could be exploited for unauthorized access.
– MySQL: Unpatched version might allow SQL injection attacks.
– PayPal: Unsupported integration could lead to financial data leaks.
– PHP 7.3.25: Outdated PHP version is susceptible to various exploits.
– WordPress 5.7.2: Unpatched installations are targets for various attacks.
Additionally, your system seems to be exposed to several critical Common Vulnerabilities and Exposures (CVEs):
– CVE-2022-37454, CVE-2017-8923, CVE-2021-44223, CVE-2021-21703, CVE-2022-31629, CVE-2022-21663, CVE-2022-21664, CVE-2023-2745, CVE-2022-43497, CVE-2022-31628.
Furthermore, it has come to our attention that a suspicious executable and Java archive are present on your system:
[01/71] LauncherFenix-Minecraft-v7.exe – Detected as potential malware by Bkav Pro (W32.AIDetectMalware).
[00/62] LauncherFenix-Minecraft-v7.jar
If these vulnerabilities are not addressed immediately, your website could fall victim to cyberattacks, data theft, and other malicious activities. It’s crucial to take immediate action to update and secure all components, eliminate vulnerabilities, and perform a comprehensive security audit.
We strongly advise you to engage a skilled cybersecurity professional to conduct a thorough review of your website’s security and to initiate the necessary remediation measures. Remember, neglecting these warnings could have severe consequences for your online presence and your users’ privacy.
1696445804
🔒 WARNING: SYSTEM COMPROMISE ALERT 🔒
Greetings,
This is a notification from an anonymous source who has discovered vulnerabilities in your website’s current setup. Our scanning mechanisms have detected an alarming number of security weaknesses that could potentially lead to severe data breaches and unauthorized access.
The following components and services are in a concerning state of abandonment:
– Cloudflare: Inadequate configuration could expose your server to DDoS attacks.
– Google AdSense: Outdated integration could lead to malicious ads injection.
– Google Analytics UA: Unpatched version might leak sensitive user data.
– Google Font API: Unsupported version could facilitate cross-site scripting attacks.
– HTTP/3: Improper setup might result in a breach of secure communication.
– jQuery & jQuery Migrate 3.3.2: These versions contain known vulnerabilities.
– MetaSlider: Unmaintained plugin could be exploited for unauthorized access.
– MySQL: Unpatched version might allow SQL injection attacks.
– PayPal: Unsupported integration could lead to financial data leaks.
– PHP 7.3.25: Outdated PHP version is susceptible to various exploits.
– WordPress 5.7.2: Unpatched installations are targets for various attacks.
Additionally, your system seems to be exposed to several critical Common Vulnerabilities and Exposures (CVEs):
– CVE-2022-37454, CVE-2017-8923, CVE-2021-44223, CVE-2021-21703, CVE-2022-31629, CVE-2022-21663, CVE-2022-21664, CVE-2023-2745, CVE-2022-43497, CVE-2022-31628.
Furthermore, it has come to our attention that a suspicious executable and Java archive are present on your system:
[01/71] LauncherFenix-Minecraft-v7.exe – Detected as potential malware by Bkav Pro (W32.AIDetectMalware).
[00/62] LauncherFenix-Minecraft-v7.jar
If these vulnerabilities are not addressed immediately, your website could fall victim to cyberattacks, data theft, and other malicious activities. It’s crucial to take immediate action to update and secure all components, eliminate vulnerabilities, and perform a comprehensive security audit.
We strongly advise you to engage a skilled cybersecurity professional to conduct a thorough review of your website’s security and to initiate the necessary remediation measures. Remember, neglecting these warnings could have severe consequences for your online presence and your users’ privacy.
1696445857