DETAILED BUILD GUIDE: We build a beautiful, clean streaming machine with an AMD Ryzen 3700X CPU, Asus TUF X570 Gaming-Plus (WiFi) motherboard & Asus TUF 1660 Super OC 6GB GPU using it's new Turing die and newer NVENC encoder. OBS (Open Broadcasting Software),

 STAY TUNED for PART 2 where we get OBS and all the Streaming software running!

 Please just fast forward through any parts you don't like. No need to be a Debbie Downer and leave negative comments. I already know there are issues with the audio in places. It was also late at the end of the build

 

My Review on the Montech Air900 Mesh Case here: https://youtu.be/rneVG00U-VA

Visit my Website: https://IntenseWebs.com/

Follow me on Twitter: https://twitter.com/IntenseWebs

DISCLAIMER. No one but myself paid for any of these products; I paid for everything in this video with my own own USD $$$ but the below links are affiliate links and don't cost you any extra. 3700X Streamer parts below:

 

AMD Ryzen 3700X CPU: https://amzn.to/2Ppq4FD

ASUS AM4 TUF Gaming X570-Plus (Wi-Fi): https://amzn.to/2EnbqbC

Asus TUF Gaming GeForce GTX 1660 Super Overclocked 6GB: https://amzn.to/35pQTze

Team T-FORCE NIGHT HAWK Legend RGB 16GB (2 x 8GB) 3200Mhz CL14: https://amzn.to/37OgfIx

Sabrent 1TB Rocket NVMe PCIe 3.0: https://amzn.to/35Bw0Ru

Montech Air900 Mesh Case: https://amzn.to/2rIBhbr

 

All Music from Google Audio Library. You’re free to use these songs in any of your videos. RAINFIRE ROXXX!!!

Patrick Patrikios - Good Times

Patrick Patrikios - 2 Hearts

Otis McDonald - La, La, La

SC MAG

Even dead employees pose a security risk when their accounts are still active

Ransomware attackers compromised deceased employee's account to access a domain admin account. The incident is a sad reminder of some cyber hygiene standards too often overlooked. The post Even dead...


Apple Patches Three New iOS Zero-Days

While Apple has a significant focus on making iOS secure, one researcher said increasingly complex capabilities often bring vulnerabilities. The post Apple Patches Three New iOS Zero-Days appeared...


‘One of the most beautiful bugs I’ve seen’: Decade-old sudo bug grants Linux root access

Cybersecurity researchers and the U.S. Cyber Command are warning users about a decade-old buffer overflow bug in sudo that can grant root access to malicious users with low level access to systems....


Law enforcement strikes back at Emotet, one of the world’s most popular ransomware loaders

The voluntary, collaborative posture taken by different private and public stakeholders is what sets this takedown apart from others. The post Law enforcement strikes back at Emotet, one of the...


Think of remote access as a business continuity issue

FBI Director Christopher Wray speaks at an event in Washington, D.C. Security pros knew that attacks on VPNs had become serious when the FBI and CISA issued a warning last fall. Today’s columnist,...


Phishing scheme shows CEOs may be ‘most valuable asset,’ and ‘greatest vulnerability’

Cybercriminals have been using a phishing kit featuring fake Office 365 password alerts as a lure to target the credentials of chief executives, business owners and other high-level corporate...


BEC attack techniques exploit Microsoft 365 messages

Attackers exploit Microsoft 365 “read receipt” and “out of office” message loopholes to evade auto-remediation of a malicious email. The post BEC attack techniques exploit Microsoft 365 messages...


The cyber ‘journeymen’: Apprentices may be the solution to the skills gap

Aspiring infosec professionals have the opportunity to hone their craft as companies develop talent from within, potentially with government funding, and chip away at the diversity problem. The post...


Google to offer suite of new zero trust capabilities through Chrome browser

With backing from Google infrastructure and support from a host of industry partners, the features have the potential to significantly expand the footprint of zero trust solutions within industry...


Google discloses spearphishing targeting security researchers

Depending on how widespread the compromises were, it could potentially taint some research and defensive strategies that threat intelligence firms share with businesses and other organizations. The...