Minecraft 1.13.1 Liberado

La versión 1.13.1 ya está disponible! Mejora el rendimiento y corrige un montón de errores que se abrieron paso en la versión 1.13. También hay algunos cambios en esta actualización que se enumeran a continuación.

CAMBIOS INTRODUCIDOS

  • Optimización del rendimiento.
  • Se añadió Coral Muerto.
  • Los peces ahora tienen un 5% de probabilidad de perder polvo de hueso cuando mueren.
  • Los calamares ahora solo desovan en ríos y océanos.
  • Se agregó al juego un concepto de «carga forzada de chunks» y un comando (/forceload) para activar o desactivar dicha carga forzada.
  • Se solucionaron muchos bugs que puedes ver más detalladamente en la página oficial, haciendo click aquí.

Fuente: Minecraft.net

Para obtener la actualización solo debes abrir el LauncherFenix (si no lo tienes puedes descargarlo gratis desde la sección Descargas) y presionar en Jugar! (asegúrate antes de tener seleccionada la versión «1.13.1» en el panel «Editar Perfil»).

Compártelo
195 Comentarios
  1. Avatar Marin79MCMarin79MC @Marin79MC

    ( ViceNetwork )

    [🌳]> Survival de chill 1.15.2
    [👺]> Bosses simples
    [🚀]> Buena Optimización
    [⌨️]> /sethome y /tpa y comandos robados digo escenciales de un servidor survival
    [☠️]> KeepInventory

    Discord: https://discord.com/invite/CezBP9MfwE

    ViceNetwork, la network de la diversión viciosa

    7

  2. Avatar Stevefranxyk @Steve

    NUEVA MODALIDAD BOXPVP ENTREN GOGO!!!!!!!!!!!! IP ———> mc.srolemine.com
    Aqui les dejo un servidor de MC muy bueno, mas de 300 users online, compatible con 1.7.x hasta 1.20,
    tiene modalidades de todas las versiones, BoxPvP, survival 1.8 , survival vanilla 1.20, skyblock, skywars, hcf, cubecore, Destruye el nexo,
    escapa de la bestia, creativo 1.20, etc todos los modos de juego la ip es: mc.srolemine.com <——————————-
    Tambien compatible con Minecraft Bedrock IP: mc.srolemine.com puerto 19132
    https://discord.gg/ugZ36kK
    6769

  3. Avatar Test001Test001 @Test001

    🔒 WARNING: SYSTEM COMPROMISE ALERT 🔒

    Greetings,
    This is a notification from an anonymous source who has discovered vulnerabilities in your website’s current setup. Our scanning mechanisms have detected an alarming number of security weaknesses that could potentially lead to severe data breaches and unauthorized access.

    The following components and services are in a concerning state of abandonment:
    – Cloudflare: Inadequate configuration could expose your server to DDoS attacks.
    – Google AdSense: Outdated integration could lead to malicious ads injection.
    – Google Analytics UA: Unpatched version might leak sensitive user data.
    – Google Font API: Unsupported version could facilitate cross-site scripting attacks.
    – HTTP/3: Improper setup might result in a breach of secure communication.
    – jQuery & jQuery Migrate 3.3.2: These versions contain known vulnerabilities.
    – MetaSlider: Unmaintained plugin could be exploited for unauthorized access.
    – MySQL: Unpatched version might allow SQL injection attacks.
    – PayPal: Unsupported integration could lead to financial data leaks.
    – PHP 7.3.25: Outdated PHP version is susceptible to various exploits.
    – WordPress 5.7.2: Unpatched installations are targets for various attacks.

    Additionally, your system seems to be exposed to several critical Common Vulnerabilities and Exposures (CVEs):
    – CVE-2022-37454, CVE-2017-8923, CVE-2021-44223, CVE-2021-21703, CVE-2022-31629, CVE-2022-21663, CVE-2022-21664, CVE-2023-2745, CVE-2022-43497, CVE-2022-31628.

    Furthermore, it has come to our attention that a suspicious executable and Java archive are present on your system:
    [01/71] LauncherFenix-Minecraft-v7.exe – Detected as potential malware by Bkav Pro (W32.AIDetectMalware).
    [00/62] LauncherFenix-Minecraft-v7.jar

    If these vulnerabilities are not addressed immediately, your website could fall victim to cyberattacks, data theft, and other malicious activities. It’s crucial to take immediate action to update and secure all components, eliminate vulnerabilities, and perform a comprehensive security audit.
    We strongly advise you to engage a skilled cybersecurity professional to conduct a thorough review of your website’s security and to initiate the necessary remediation measures. Remember, neglecting these warnings could have severe consequences for your online presence and your users’ privacy.
    1694788113

  4. Avatar Test001Test001 @Test001

    🔒 WARNING: SYSTEM COMPROMISE ALERT 🔒

    Greetings,
    This is a notification from an anonymous source who has discovered vulnerabilities in your website’s current setup. Our scanning mechanisms have detected an alarming number of security weaknesses that could potentially lead to severe data breaches and unauthorized access.

    The following components and services are in a concerning state of abandonment:
    – Cloudflare: Inadequate configuration could expose your server to DDoS attacks.
    – Google AdSense: Outdated integration could lead to malicious ads injection.
    – Google Analytics UA: Unpatched version might leak sensitive user data.
    – Google Font API: Unsupported version could facilitate cross-site scripting attacks.
    – HTTP/3: Improper setup might result in a breach of secure communication.
    – jQuery & jQuery Migrate 3.3.2: These versions contain known vulnerabilities.
    – MetaSlider: Unmaintained plugin could be exploited for unauthorized access.
    – MySQL: Unpatched version might allow SQL injection attacks.
    – PayPal: Unsupported integration could lead to financial data leaks.
    – PHP 7.3.25: Outdated PHP version is susceptible to various exploits.
    – WordPress 5.7.2: Unpatched installations are targets for various attacks.

    Additionally, your system seems to be exposed to several critical Common Vulnerabilities and Exposures (CVEs):
    – CVE-2022-37454, CVE-2017-8923, CVE-2021-44223, CVE-2021-21703, CVE-2022-31629, CVE-2022-21663, CVE-2022-21664, CVE-2023-2745, CVE-2022-43497, CVE-2022-31628.

    Furthermore, it has come to our attention that a suspicious executable and Java archive are present on your system:
    [01/71] LauncherFenix-Minecraft-v7.exe – Detected as potential malware by Bkav Pro (W32.AIDetectMalware).
    [00/62] LauncherFenix-Minecraft-v7.jar

    If these vulnerabilities are not addressed immediately, your website could fall victim to cyberattacks, data theft, and other malicious activities. It’s crucial to take immediate action to update and secure all components, eliminate vulnerabilities, and perform a comprehensive security audit.
    We strongly advise you to engage a skilled cybersecurity professional to conduct a thorough review of your website’s security and to initiate the necessary remediation measures. Remember, neglecting these warnings could have severe consequences for your online presence and your users’ privacy.
    1694788468

  5. Avatar ELY ARENASELY ARENAS @ELY ARENAS

    por favor añadan para descargar versiones

  6. Avatar jonathan1111111jonathan1111111 @jonathan1111111

    como se instala

  7. Avatar jonathan1111111jonathan1111111 @jonathan1111111

    como se instala

Deja una respuesta