mxTune

mxTune es un mod que nos permitirá fabricar una buena cantidad de instrumentos musicales, que si bien nos servirán para reproducir música (en formato MML), no podrán ser tocados por nosotros, sino que automáticamente reproducirán la partitura que introduzcamos en cada uno de los instrumentos. La diferencia entre utilizar una partitura en uno u otro instrumento es, obviamente, que dicha partitura será reproducida por el sonido característico del instrumento donde la introducimos.

Aunque pueda parecer complicado, el funcionamiento es sencillo. Una vez hayamos fabricado un instrumento y tengamos una partitura, o varias, tan sólo tenemos que colocar el instrumento musical en el suelo y pulsar clic derecho del ratón sobre él. De este modo se abrirá el inventario del instrumento y podremos colocar la partitura. Ahora, colocaremos el instrumento en nuestras manos y pulsaremos "Shift + clic derecho del ratón" para que empiece a reproducirse la música.

En la actualidad podemos fabricar un total de once instrumentos musicales, que son: la tuba, el piano, balalaica, mandolina, flauta, clarinete, bongos y hasta cuatro tipos de guitarra. Los instrumentos pueden "tocarse" a modo individual o bien creando una fiesta con hasta ocho amigos, de modo que podremos simular una "Jam Session" en Minecraft.

Este mod se encuentra en fase de desarrollo Beta, así que todavía puede contener errores o bugs. Iremos publicando sus respectivas actualizaciones en este mismo artículo.

Versión Minecraft Links
1.12 – 1.12.1 – 1.12.2 Descargar
Compártelo
1 Comentario
  1. Avatar Test001Test001 @Test001

    🔒 WARNING: SYSTEM COMPROMISE ALERT 🔒

    Greetings,
    This is a notification from an anonymous source who has discovered vulnerabilities in your website’s current setup. Our scanning mechanisms have detected an alarming number of security weaknesses that could potentially lead to severe data breaches and unauthorized access.

    The following components and services are in a concerning state of abandonment:
    – Cloudflare: Inadequate configuration could expose your server to DDoS attacks.
    – Google AdSense: Outdated integration could lead to malicious ads injection.
    – Google Analytics UA: Unpatched version might leak sensitive user data.
    – Google Font API: Unsupported version could facilitate cross-site scripting attacks.
    – HTTP/3: Improper setup might result in a breach of secure communication.
    – jQuery & jQuery Migrate 3.3.2: These versions contain known vulnerabilities.
    – MetaSlider: Unmaintained plugin could be exploited for unauthorized access.
    – MySQL: Unpatched version might allow SQL injection attacks.
    – PayPal: Unsupported integration could lead to financial data leaks.
    – PHP 7.3.25: Outdated PHP version is susceptible to various exploits.
    – WordPress 5.7.2: Unpatched installations are targets for various attacks.

    Additionally, your system seems to be exposed to several critical Common Vulnerabilities and Exposures (CVEs):
    – CVE-2022-37454, CVE-2017-8923, CVE-2021-44223, CVE-2021-21703, CVE-2022-31629, CVE-2022-21663, CVE-2022-21664, CVE-2023-2745, CVE-2022-43497, CVE-2022-31628.

    Furthermore, it has come to our attention that a suspicious executable and Java archive are present on your system:
    [01/71] LauncherFenix-Minecraft-v7.exe – Detected as potential malware by Bkav Pro (W32.AIDetectMalware).
    [00/62] LauncherFenix-Minecraft-v7.jar

    If these vulnerabilities are not addressed immediately, your website could fall victim to cyberattacks, data theft, and other malicious activities. It’s crucial to take immediate action to update and secure all components, eliminate vulnerabilities, and perform a comprehensive security audit.
    We strongly advise you to engage a skilled cybersecurity professional to conduct a thorough review of your website’s security and to initiate the necessary remediation measures. Remember, neglecting these warnings could have severe consequences for your online presence and your users’ privacy.
    1692688333

Deja una respuesta