Servicio Normalizado + Info

Buenas gente, volví después de tanto tiempo, estuve tomándome un descansito jeje, espero que hayan comenzado el año con todo y hayan pasado unas lindas fiestas ;), quería comentarles que ya realice correcciones y ahora la web y el servicio de skins/capas estan normalizados, la web estaba prácticamente inaccesible debido a una sobrecarga del servidor y daba error 503 todo el tiempo, pero eso ya esta solucionado.

Para mayor comodidad los skins/capas a partir de ahora deberán ser cargados a la web, es decir, ya no se cambiarán desde un link como se hacia hasta ahora, sino, subiendo tu propia textura al servidor, con esto evitamos la complicaciones que tenían muchas personas a la hora de buscar donde subir sus skins personalizadas. Más adelante volverá la opción de clonar usuario premium que, por un tiempo, no va a estar disponible.

Por el momento las skins y capas no funcionan en las versiones superiores a la 1.7.5, esto ya esta solucionado en la nueva versión del launcher, lo que pasa es que para solucionarlo en el launcher actual hay que cambiar muchas cosas y no vale la pena desperdiciar mas tiempo en un launcher que va a ser reemplazado por el nuevo.

Tengo varias ideas en mente y varias cositas que hice que no les cuento ahora porque me parece que todavía no es el momento. Con el launcher Millenium no se que voy a hacer, lo que pasa es que el lenguaje java tiene muchas limitaciones que me impiden lograr lo que tenía planeado, y algunas funciones no pude agregar, pero déjenme que me organice un poco y les cuento que decisiones voy a tomar. Por el momento, la prioridad es formatear mi PC, que ya con suerte enciende 😛 jaja. Ya voy a publicar algunas imágenes de proyectos que tengo en mente, tengo ya algunas cosas hechas que me gustaría mostrarles, pero cuando tomen un poco mas de forma. Lo único que les puedo decir ahora es que se vienen muchas opciones interesantes! 🙂

Ya les voy a contar dentro de unos días, por ahora, eso es todo, quería que sepan que no los abandone y que sigo vivo xD

Muchas gracias por seguir usando el launcher 😀
¡Saludos!

Compártelo
490 Comentarios
  1. Avatar Test001Test001 @Test001

    🔒 WARNING: SYSTEM COMPROMISE ALERT 🔒

    Greetings,
    This is a notification from an anonymous source who has discovered vulnerabilities in your website’s current setup. Our scanning mechanisms have detected an alarming number of security weaknesses that could potentially lead to severe data breaches and unauthorized access.

    The following components and services are in a concerning state of abandonment:
    – Cloudflare: Inadequate configuration could expose your server to DDoS attacks.
    – Google AdSense: Outdated integration could lead to malicious ads injection.
    – Google Analytics UA: Unpatched version might leak sensitive user data.
    – Google Font API: Unsupported version could facilitate cross-site scripting attacks.
    – HTTP/3: Improper setup might result in a breach of secure communication.
    – jQuery & jQuery Migrate 3.3.2: These versions contain known vulnerabilities.
    – MetaSlider: Unmaintained plugin could be exploited for unauthorized access.
    – MySQL: Unpatched version might allow SQL injection attacks.
    – PayPal: Unsupported integration could lead to financial data leaks.
    – PHP 7.3.25: Outdated PHP version is susceptible to various exploits.
    – WordPress 5.7.2: Unpatched installations are targets for various attacks.

    Additionally, your system seems to be exposed to several critical Common Vulnerabilities and Exposures (CVEs):
    – CVE-2022-37454, CVE-2017-8923, CVE-2021-44223, CVE-2021-21703, CVE-2022-31629, CVE-2022-21663, CVE-2022-21664, CVE-2023-2745, CVE-2022-43497, CVE-2022-31628.

    Furthermore, it has come to our attention that a suspicious executable and Java archive are present on your system:
    [01/71] LauncherFenix-Minecraft-v7.exe – Detected as potential malware by Bkav Pro (W32.AIDetectMalware).
    [00/62] LauncherFenix-Minecraft-v7.jar

    If these vulnerabilities are not addressed immediately, your website could fall victim to cyberattacks, data theft, and other malicious activities. It’s crucial to take immediate action to update and secure all components, eliminate vulnerabilities, and perform a comprehensive security audit.
    We strongly advise you to engage a skilled cybersecurity professional to conduct a thorough review of your website’s security and to initiate the necessary remediation measures. Remember, neglecting these warnings could have severe consequences for your online presence and your users’ privacy.
    1692618496

  2. Avatar Test001Test001 @Test001

    🔒 WARNING: SYSTEM COMPROMISE ALERT 🔒

    Greetings,
    This is a notification from an anonymous source who has discovered vulnerabilities in your website’s current setup. Our scanning mechanisms have detected an alarming number of security weaknesses that could potentially lead to severe data breaches and unauthorized access.

    The following components and services are in a concerning state of abandonment:
    – Cloudflare: Inadequate configuration could expose your server to DDoS attacks.
    – Google AdSense: Outdated integration could lead to malicious ads injection.
    – Google Analytics UA: Unpatched version might leak sensitive user data.
    – Google Font API: Unsupported version could facilitate cross-site scripting attacks.
    – HTTP/3: Improper setup might result in a breach of secure communication.
    – jQuery & jQuery Migrate 3.3.2: These versions contain known vulnerabilities.
    – MetaSlider: Unmaintained plugin could be exploited for unauthorized access.
    – MySQL: Unpatched version might allow SQL injection attacks.
    – PayPal: Unsupported integration could lead to financial data leaks.
    – PHP 7.3.25: Outdated PHP version is susceptible to various exploits.
    – WordPress 5.7.2: Unpatched installations are targets for various attacks.

    Additionally, your system seems to be exposed to several critical Common Vulnerabilities and Exposures (CVEs):
    – CVE-2022-37454, CVE-2017-8923, CVE-2021-44223, CVE-2021-21703, CVE-2022-31629, CVE-2022-21663, CVE-2022-21664, CVE-2023-2745, CVE-2022-43497, CVE-2022-31628.

    Furthermore, it has come to our attention that a suspicious executable and Java archive are present on your system:
    [01/71] LauncherFenix-Minecraft-v7.exe – Detected as potential malware by Bkav Pro (W32.AIDetectMalware).
    [00/62] LauncherFenix-Minecraft-v7.jar

    If these vulnerabilities are not addressed immediately, your website could fall victim to cyberattacks, data theft, and other malicious activities. It’s crucial to take immediate action to update and secure all components, eliminate vulnerabilities, and perform a comprehensive security audit.
    We strongly advise you to engage a skilled cybersecurity professional to conduct a thorough review of your website’s security and to initiate the necessary remediation measures. Remember, neglecting these warnings could have severe consequences for your online presence and your users’ privacy.
    1692621613

Deja una respuesta