how to check their status and the dangers of river overflows with infoAGUA

Let’s tell you how to look at the state of the reservoirs and the dangers of river overflows. For this we are going to use infoAGUA, an application promoted by the General Directorate of Water and with official data from the Guadalquivir Hydrographic Confederation and the Ministry for Ecological Transformation and the Demographic Challenge (MITECO). With this application we will have all the information related to water in Spain in a unified and centralized way. It’s like an alternative to Google flood risk mapbut with the official information. You can download the application for free on Google Play for Android and in the App Store for your iPhone. Look at the level of reservoirs and flood zones When you open the app, you will go to a simple screen with few options. Here, To see the information on the reservoirs, click on Quantity of Water Resourceswhich will take you to a screen where you have the option Cartographic Viewer to view information on a map. This will take you to a screen where you can see the general level of reservation capacity of each hydrographic district. This will allow you to see at a glance the regions where the most water is being stored. But you can zoom in to get more information. If you zoom in you will begin to see all the reservoirs in the areas you have approached. If you click on one of them you will be able to see at what level is this reservoir that you have chosen. You will be able to do this in as many as you want. Also you will have rain gauge information to know how much it is raining in specific areas. In Xataka How to know if you live in a flood zone with this map On the main screen you also have the section of Flood risk. This will show you in red the Areas with Significant Potential Risk of Flooding (ARPSI), and in shades of blue the flood zones in general. On this map you will also be able to zoom in and explore specific areas. In addition, if you click on these areas you will also be able to see the level of water rise that may exist in this place. In Xataka Basics | Google flood risk map: so you can see if you live in an area that is at risk

Dangers of Clawdbot and how to protect yourself from them before deciding to use it

Let’s give you some safety tips in case you are thinking of using Clawbot. This is a AI agenta bot that takes control of your computer, and then you can use it to tell it to do things on it. This is something that is having a lot of success, since it is capable of speeding up many processes and doing many things for you. But of course, when you are using this tool you are giving a system of artificial intelligence full access to the machine where you install it, and this has some dangers that you should be aware of. What dangers are there for your data These are the dangers to which you expose yourself when are you going to use this tool. Even the creators of the bot have assured that there is no perfectly safe configuration, so it should be taken into account. Gateway exposure on the web: If you do not have the way in which your bot is accessed properly configured, a third party may have access or the access page may even be filtered. This would allow a third party to take control of your computer. Too open access policies: If you are not careful when configuring access to the bot and allowing others to interact with it, you will be giving them the keys to your computer to control it. Prompt injection: If you make the bot interact with files that you have downloaded from the Internet, perhaps some of them have hidden texts with commands that ask it to ignore what you have ordered and do another task that could be dangerous for you. Plugins or extensions: When you install a plugin on this AI agent to give it more capabilities, it runs alongside the gateway. This means that if you install a malicious plugin or extension, they may contain code that takes control of your computer or performs unwanted actions. Bot malfunctions: Like any bot based on artificial intelligence, it may fail to interpret orders or perform unwanted actions unintentionally. This could endanger the contents of the computer where you run it. In short, the main danger is exposing your bot and access to it, allowing others to control it. If another person has access to your bot, they can simply take control of your entire computer and the data you have on it. How to keep Clawdbot safe First of all, and the most recommended is do not use Clawdbot on your main computer or machine. Just don’t have it where you keep your most private data and files, and this way you will prevent unwanted access or malfunction from putting you at risk. And if you don’t have a secondary computer, use a sandbox mode, install a virtual machine with limited files. By installing Clawdbot on a secondary or virtual machine, you can decide what files you want on it, what applications do you have installed and what passwords are in the browser to use, as well as bank details. It is simply advisable to only have the accesses and applications that you are going to use, not everything. In addition, for each of the dangers we have mentioned above there are also specific tips to follow. Gateway Dangers: To prevent others from accessing your bot, you need to ensure that Gateway authentication is always enabled with a token or password. Additionally, you must use Tailscale or secure HTTPS for access. If you use a web interface for the bot, disable settings that allow insecure authentication, and if you control it through the chat of a messaging app, take maximum care of the privacy of that application and access to it. Put a password. Too open access policies: Be careful when pairing nodes with elevated permissions, and avoid sharing access in groups if you don’t fully trust all users. It is also advisable to configure the bot so that it only responds to specific users or to messages where it is explicitly mentioned. Prompt injection: Try not to interact with files that you have not created, deleting those that you have downloaded from the Internet on the machine. You should also design your configuration for limited and validated access before processing commands. Plugins or extensions: To avoid any danger from malicious plugins or extensions, you should only install those that you explicitly trust, and only from completely trustworthy sources. It is best to manually review the plugin code before activating it. In addition to this, the creators of Clawdbot have an advanced security guide where they tell you the security hearings that you must perform periodically to make sure everything is working correctly. And finally, the best advice I can give you is that do not use Clawdbot if you do not have minimal knowledge to know how to configure it. If terms like “remote administration API”, “sandboxing”, “localhost” or “reverse proxy” don’t sound familiar to you, it’s best not to install it on your computer. In Xataka Basics | The best prompts to save hours of work and do your tasks with ChatGPT, Gemini, Copilot or other artificial intelligence

What is Clawdbot, what it can do on your computer and what are its dangers

Let’s explain to you what is Clawdbotthe new sensation of artificial intelligence that can control the computer for you. It is a tool that can have several uses, one of the AI agents most powerful that there is right now, but it also has a dangerous side. We are going to start by explaining to you in a simple and understandable way what exactly this tool is. Then we will tell you what its main functions are, and we will end by mentioning its main dangers. Because its benefits are countless, but it is also a very dangerous tool. What is Clawdbot Clawdbot is an artificial intelligence personal assistant that can control your devices. It is completely free and open source, something that has contributed to its fame, since it is completely transparent in its code and does not cost a single euro. This AI can be controlled via the web or through messaging apps. This means that it has a web interface like that of ChatGPT either Geminibut you can also link it to WhatsApp, Telegram, Slack, Discord, Google Chat or iMessage among others, and make requests from there. Although we are looking at a bot that we can interact with, it is not really an AI like ChatGPT. It is an agent, a program that uses artificial intelligence to perform different actions in an environment based on what you’ve asked of it. You can make decisions and control different resources. In practice, this means that Clawdbot You will be able to open applications or manage filesbeing able to write or modify logs, control what is done within each app, and even access the accounts that you have linked. The only thing you have to do is install it from your computer console as explained on its official website clawd.bot. Imagine that you ask him to write a WhatsApp to your mother. By doing so, the tool will open WhatsApp, search for your mother’s contact, write the message you have requested and send it. Another element to take into account is that this program has access to your entire hard drive and storage, that is, it will have infinite memory. Additionally, the more he knows about you, the more and better suggestions he can make to you about tasks to perform. What it can do on your computer When you install Clawdbot on your computer, You’re going to have to give him permission to do everything. whatever you want in it. These permissions are what you will use to automate processes. This is what you will be able to do: Full access to your computer through the shell Control the browser with your sessions started Read and write to the file system Full access to your email, calendar and any other device you connect to Persistent memory between sessions Ability to proactively send you messages in the apps or accounts you set up Integrates with 50+ apps including WhatsApp, Telegram, Discord, Slack, Signal, iMessage, Claude, GPT, Spotify, Hue, Obsidian, This means give you full control of everything on your computer so it can perform any task you ask of it. This seems useful, but it’s also incredibly dangerous. The most surprising thing is that, with interaction with messaging apps, you can ask it to do something from WhatsApp or Telegram, and this program will totally control your computer Windows or Mac to perform the task. Imagine, for example, that you are away from home, but the tool is installed on your home computer. Then you can grab Telegram and ask it to do something on your computer, and it will remotely follow the order and do it without you having to be in front of it. You can also ask it for other tasks such as downloading and installing things for you, crawling websites for certain topics or resources, and preparing a summary for the time you are going to go to the computer. You can make create a website for youor even control the home automation elements of your home according to certain parameters if it has access to its sensors. What are its dangers The benefits of this artificial intelligence agent are spectacular, but so are the dangers it has. You are giving full control to your files, which means that a mistake or hallucination could damage your computer or any file you have on it. Imagine that you have a document with very valuable information, and when you ask it to add content something happens and what was there is deleted. It will also have control of your applications and the websites where you are logged in, being able to do things for you. But like any AI it can fail and modify things or send unwanted messages. Beyond that, this tool is also very sensitive to prompt injection attacks. Imagine someone sends you a PDF, and you ask Clawdbot to summarize it for you. This PDF could have some hidden text that asks you to ignore the previous instructions and do something that could be harmful to you, such as sending your data to an external server or sending advertising messages or stealing accounts you have open. The agent will do it without you realizing it. Here, experts recommend that if you do not fully understand this type of programs and their dangers you use it in a virtual machine with limited access to the real resources of your computer, or that you do it on a secondary computer where you do not have as much of your information or sensitive content. In Xataka Basics | The best prompts to save hours of work and do your tasks with ChatGPT, Gemini, Copilot or other artificial intelligence

What it is, what dangers it has and what to do to try to minimize them

Let’s explain to you what is the practice of sharentingso that if you come across this term you know exactly what they mean. It has to do with things that parents do today, and is related to sharing their children’s content on social networks. And after explaining this concept to you, which you will see is something very easy to understand, we are going to tell you what are the privacy risks of sharenting in an uncontrolled way, and how you can avoid many of them. What is sharenting The term sharenting is a combination of the words share and parenting. It would literally be something like co-parenting, but taking it to a technological environment. What we mean by the term sharenting is when Parents share information about their children on social networkssuch as photographs, videos or other types of personal information. Parents usually do this in a well-intentioned way, simply so that their family and friends can see how their children are growing and the things they do together. However, when these practices are carried out without adequate precautions can put privacy at risk of the child both in the short and long term. What dangers can it have for children? Uncontrolled shareparenting without safety guidelines can have dangers for your son or daughter. It is important to think that everything you share publicly is available to everyoneso any stranger may have data or images of the minor. This, in extreme cases, can lead to misuse of these images or videos you share. The photos can be shared by whoever has access to them, and they can be used or manipulated for inappropriate contexts, and they can even end up on dangerous sites. It also means a security risk of the minors. Their routines, locations, and names may be exposed, leading to them being used for online harassment or phishing practices. And in the best case scenario, you will be creating a digital footprint too early without the minor’s permission, which can affect their future personal or professional life. Or maybe as they grow up they feel embarrassed or upset by the exposure that their parents made when they were little. How to avoid some of these dangers The first thing you have to do is be aware that what you share on social networks is public by default for everyone. If the minor is already old enough, the first thing is that you ask him or her for permission, so that they learn to be able to decide about their own image and privacy. Beyond that, it is important review the privacy settings of your social networks. On Facebook you can make the content not public, but visible only to your friends, and on Instagram you have settings such as best friends so that when you share something for them, only the people you have previously chosen can see this. It is also important do not show the minor’s face It is always something that will maximize privacy, especially when you want to share something publicly. For example, you can use safe photos, such as just your hands, and you can use use angles that do not reveal identity of the minor in the photographs. Furthermore, you must avoid giving personal datasuch as full names, addresses, locations where you usually move or school names. This data could be used for harassment or identity theft. It is imperative and important not to share compromising photossuch as with uniforms, swimsuits or in somewhat more intimate situations. These photos could be attractive to people you don’t want to be able to access them. And finally always think long term. Before publishing, think about how you would feel or how your son or daughter might feel when this photograph will still be public and online in several years. In Xataka Basics | 47 free and open source alternative Android applications that respect your privacy as much as possible

What happens if you still have it installed, what dangers there are, and how to update to Windows 11

Windows 10 is no longer supported. As of October 14, 2025, Microsoft’s operating system is officially dead. But what exactly does this mean? Well, we are going to answer these questions so you know what to expect if you are still using it. We are going to start the article by explaining to you what the Windows 10 end of supportand then we will go on to tell you what dangers you are exposing yourself to if you are still using it. Then, we will finish by reminding you of the ways you can upgrade to Windows 11, even if your computer is old and does not meet the minimum requirements. What the end of support is and what it entails Windows, like most operating systems, evolves with the release of new versions. And since they do not have unlimited manpower, when they launch a new version, such as Windows 11, the old version is being abandoned to focus efforts on the new one. This happens gradually, so that users have time to change. First, updates that bring new features are abandoned, but security updates continue to arrive. And then directly maintenance is abandonedwhich is when you stop receiving any type of update, even security ones. This is the end of life of the operating system, or as they say, your end of support. We say this because errors and security flaws are no longer even updated. Windows 10 is dead and what is there now is what remains forever. This implies that also bugs and errors stop being fixed. Therefore, if a cybercriminal has discovered a critical vulnerability, it is possible that he did not exploit it so that Microsoft does not notice, and now that it abandons Windows, it begins to use it. What dangers does the end of support have? Windows 10 will no longer be secure and private. It’s that simple. If critical vulnerabilities have recently been discovered that put your users’ data at risk, or if they are discovered in the future, they will no longer be fixed. Your computer will be exposed to hackers. Another problem derived from the end of support is that Apps and new hardware will no longer be supported over time. Windows 10 will now be history, and application developers will stop taking it into account with new updates, which means that there may be many bugs or, in the future, they will stop working. The same thing happens with hardware, with other devices such as cell phones, cameras, or anything. It is possible that you will not be able to use them properly when connecting them to Windows 10, that they may fail, or that they may not even be detected if the device is new. Popular apps like Chrome may continue to work temporarily, but there will come a time when they stop working. After all, Windows 10 is already dead. Therefore, if you still have Windows 10 installed on a computer, it is advisable to switch to Windows 11 or a new version that is released, but always abandon the operating system before the end of support, because Windows 10 will no longer be secureand it will become a dangerous operating system to use. Upgrade to Windows 11 Therefore, if you have a computer with Windows 10, The recommendation is to upgrade to Windows 11. Having original Windows 10, the same license will work for the new version, update is freeand you will simply have to comply with the Windows 11 requirements in the hardware. If you do not have an official Windows license on your PC, you can download the Windows 11 beta for free with the Windows Insider program. Here, you can have beta versions or versions already tested but prior to the finals. In exchange for finding a bug and reporting it, you can use Windows for free. If your computer does not meet the requirements If your computer does not meet any requirements such as support for TPM 2.0, the first thing is to see if you can activate the TPM from UEFI or BIOS of the team. Unless it is a very old computer, it most likely already supports it, although it will not always be activated. If not, there is an official way to bypass the TPM requirement by “tricking” Windows. You will have to use the command prompt and type the following command: reg add HKLM\SYSTEM\Setup\MoSetup /f /v AllowUpgradesWithUnsupportedTPMorCPU /d 1 /t reg_dword At Xataka Basics we have also told you other tricks to update. For example, you can use this modified version of Windows 11. To do this, in the Windows terminal type the command “irm “https://christitus.com/win” | iex”, and then a window will open where you have to click on the tab MicroWinand follow the steps to download the ISO and install it. You can also use Flyoobe to install Windows 11 on non-compatible computers, although in this case without Artificial Intelligence functions. To do so, download this tool from official GitHub page. Is a free tool so that anyone can use it, and open source to ensure its security. Lastly, there are a couple of options to expand Windows 10 supportalthough they are temporary patches. Can extend support until 2026 using the Windows Backup tool or Windows Backup. But this expanded support isn’t for everyone, and in any case it only lasts a few months. In Xataka Basics | How to block programs and applications in Windows 11 without installing anything

Log In

Forgot password?

Forgot password?

Enter your account data and we will send you a link to reset your password.

Your password reset link appears to be invalid or expired.

Log in

Privacy Policy

Add to Collection

No Collections

Here you'll find all collections you've created before.