{"id":124,"date":"2007-02-19T09:29:06","date_gmt":"2007-02-19T13:29:06","guid":{"rendered":"https:\/\/skatox.com\/blog\/?p=124"},"modified":"2010-05-26T11:36:08","modified_gmt":"2010-05-26T16:06:08","slug":"convertir-a-firefox-en-una-herramienta-de-hacking-etico","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/","title":{"rendered":"Convertir a Firefox en una herramienta de Hacking (\u00e9tico)"},"content":{"rendered":"<p>Encontr\u00e9 en <a href=\"https:\/\/www.security-database.com\">Security Database<\/a> (excelente p\u00e1gina de seguridad inform\u00e1tica) un art\u00ed\u00adculo que explica como convertir el Firefox en una herramienta para hacking \u00e9tico y as\u00ed\u00ad deshacerse de tantos programas por separado.<\/p>\n<p>Para convertir al Firefox s\u00f3lo se necesitan instalar varias extensiones (Plugins) para agregarle funcionalidades como: Mostrar la Ip de una p\u00e1gina, mostrar donde esta ubicado f\u00ed\u00adsicamente el servidor del hosting por medio google earth, herramienta para modificar los headers, herramienta para analizar los paquetes y c\u00f3digos javascript, analizar variables, barra para insertar comandos sql malignos para auditor\u00ed\u00adas, modificar cookies, y much\u00ed\u00adsimas mas.<\/p>\n<p>El art\u00ed\u00adculo esta en ingl\u00e9s y podr\u00e1n encontrarlo <a href=\"https:\/\/www.security-database.com\/toolswatch\/Turning-Firefox-to-an-Ethical.html\">aqu\u00ed\u00ad <\/a> \u00f3 si desean la <a href=\"https:\/\/www.security-database.com\/toolswatch\/IMG\/pdf\/Turning_Firefox_Ethical_Hacking_Platform.pdf\">versi\u00f3n pdf<\/a><\/p>\n<p style=\"text-align: center;\">Aqu\u00ed\u00ad les dejo un screenshot de mi navegador con alguna de esas funcionalidades (hacer click para verlo grande y completo):<br \/>\n<a title=\"\"  href=\"https:\/\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\"><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png\" border=\"0\" alt=\"Firefox Hacking Tool\" width=\"320\" height=\"240\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encontr\u00e9 en Security Database (excelente p\u00e1gina de seguridad inform\u00e1tica) un art\u00ed\u00adculo que explica como convertir el Firefox en una herramienta para hacking \u00e9tico y as\u00ed\u00ad&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/\">Seguir leyendo<span class=\"screen-reader-text\">Convertir a Firefox en una herramienta de Hacking (\u00e9tico)<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[193,12],"tags":[947,944],"class_list":["post-124","post","type-post","status-publish","format-standard","hentry","category-hacking-seguridad-informatica","category-firefox","tag-hacking-seguridad-informatica","tag-firefox","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Convertir a Firefox en una herramienta de Hacking (\u00e9tico) - El blog de Skatox<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Convertir a Firefox en una herramienta de Hacking (\u00e9tico) - El blog de Skatox\" \/>\n<meta property=\"og:description\" content=\"Encontr\u00e9 en Security Database (excelente p\u00e1gina de seguridad inform\u00e1tica) un art\u00ed\u00adculo que explica como convertir el Firefox en una herramienta para hacking \u00e9tico y as\u00ed\u00ad&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2007-02-19T13:29:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2010-05-26T16:06:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"Convertir a Firefox en una herramienta de Hacking (\u00e9tico)\",\"datePublished\":\"2007-02-19T13:29:06+00:00\",\"dateModified\":\"2010-05-26T16:06:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/\"},\"wordCount\":149,\"commentCount\":3,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2007\\\/02\\\/firefox_hacker.miniatura.png\",\"keywords\":[\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"Mozilla \\\/ Firefox \\\/ Thunderbird\"],\"articleSection\":[\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"Mozilla \\\/ Firefox \\\/ Thunderbird\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/\",\"name\":\"Convertir a Firefox en una herramienta de Hacking (\u00e9tico) - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2007\\\/02\\\/firefox_hacker.miniatura.png\",\"datePublished\":\"2007-02-19T13:29:06+00:00\",\"dateModified\":\"2010-05-26T16:06:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/#primaryimage\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2007\\\/02\\\/firefox_hacker.miniatura.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2007\\\/02\\\/firefox_hacker.miniatura.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2007\\\/02\\\/19\\\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Convertir a Firefox en una herramienta de Hacking (\u00e9tico)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Convertir a Firefox en una herramienta de Hacking (\u00e9tico) - El blog de Skatox","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/","og_locale":"es_ES","og_type":"article","og_title":"Convertir a Firefox en una herramienta de Hacking (\u00e9tico) - El blog de Skatox","og_description":"Encontr\u00e9 en Security Database (excelente p\u00e1gina de seguridad inform\u00e1tica) un art\u00ed\u00adculo que explica como convertir el Firefox en una herramienta para hacking \u00e9tico y as\u00ed\u00ad&#8230;","og_url":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2007-02-19T13:29:06+00:00","article_modified_time":"2010-05-26T16:06:08+00:00","og_image":[{"url":"https:\/\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png","type":"","width":"","height":""}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"Convertir a Firefox en una herramienta de Hacking (\u00e9tico)","datePublished":"2007-02-19T13:29:06+00:00","dateModified":"2010-05-26T16:06:08+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/"},"wordCount":149,"commentCount":3,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"image":{"@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/#primaryimage"},"thumbnailUrl":"https:\/\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png","keywords":["Hacking \/ Seguridad Inform\u00e1tica","Mozilla \/ Firefox \/ Thunderbird"],"articleSection":["Hacking \/ Seguridad Inform\u00e1tica","Mozilla \/ Firefox \/ Thunderbird"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/","url":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/","name":"Convertir a Firefox en una herramienta de Hacking (\u00e9tico) - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/#primaryimage"},"image":{"@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/#primaryimage"},"thumbnailUrl":"https:\/\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png","datePublished":"2007-02-19T13:29:06+00:00","dateModified":"2010-05-26T16:06:08+00:00","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/#primaryimage","url":"https:\/\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png"},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Convertir a Firefox en una herramienta de Hacking (\u00e9tico)"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1776390187","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":3734,"url":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","url_meta":{"origin":124,"position":0},"title":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica","author":"Miguel Useche","date":"2 de mayo de 2018","format":false,"excerpt":"En Mozilla suelen invitar a sus oficinas grandes profesionales para compartir su experticia en un \u00e1rea. Las ponencias son compartidas en tiempo real al personal y algunos voluntarios. De esta forma todos podemos aumentar nuestros conocimientos en diversas \u00e1reas de la web abierta. Hace unas semanas estuvo Mikko Hypponen, un\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/s1y3VjZTDRk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3102,"url":"https:\/\/skatox.com\/blog\/2014\/10\/22\/hacker-modifica-el-codigo-de-firefox-os-realiza-interesantes-experimentos\/","url_meta":{"origin":124,"position":1},"title":"Hacker modifica el c\u00f3digo de Firefox OS y realiza interesantes experimentos","author":"Miguel Useche","date":"22 de octubre de 2014","format":false,"excerpt":"Jan Jongboom hizo una grandiosa ponencia en el pasado JsConf sobre Firefox OS, en ella explica que quer\u00eda comprar una Rasberry Pi para realizar experimentos y desarrollar programas, aunque el precio del dispositivo es atractivo, observ\u00f3 que un tel\u00e9fono Firefox OS de USD $25 ofrece casi lo mismo pero con\u2026","rel":"","context":"En \u00abFirefox OS\u00bb","block_context":{"text":"Firefox OS","link":"https:\/\/skatox.com\/blog\/category\/firefox\/firefox-os\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/Uy062kp-LM4\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":367,"url":"https:\/\/skatox.com\/blog\/2008\/09\/14\/la-guerra-de-navegadores-por-discovery-channel\/","url_meta":{"origin":124,"position":2},"title":"La guerra de navegadores por Discovery Channel","author":"Miguel Useche","date":"14 de septiembre de 2008","format":false,"excerpt":"Gracias a la p\u00e1gina Xombra, que es una excelente p\u00e1gina de seguridad inform\u00e1tica de Venezuela, me enter\u00e9 de este programa que hizo Discovery Channel sobre la historia de los navegadores web, desde sus inicios, las peleas entre las empresas y Bill Gates, entre otros. Totalmente recomendado para los que les\u2026","rel":"","context":"En \u00abDesarrollo web\u00bb","block_context":{"text":"Desarrollo web","link":"https:\/\/skatox.com\/blog\/category\/todo-lo-relacionado-al-desarrollo-de-software\/desarrollo-web\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/tfqjrZxr4IM\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1746,"url":"https:\/\/skatox.com\/blog\/2010\/02\/13\/mis-plugins-de-firefox\/","url_meta":{"origin":124,"position":3},"title":"Plugins recomendados para Firefox","author":"Miguel Useche","date":"13 de febrero de 2010","format":false,"excerpt":"Una de la cosas mas atractivas de Firefox son los complementos que ofrece para extender las funcionalidades del navegador, se qu\u00e9 Google Chrome tambi\u00e9n ahora ofrece extensiones pero (para el momento de escribir este art\u00ed\u00adculo) no est\u00e1n tan maduras como las de Firefox por ello no he migrado a ese\u2026","rel":"","context":"En \u00abMozilla \/ Firefox \/ Thunderbird\u00bb","block_context":{"text":"Mozilla \/ Firefox \/ Thunderbird","link":"https:\/\/skatox.com\/blog\/category\/firefox\/"},"img":{"alt_text":"Firefox bajo GNU\/Linux con KDE 4","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2010\/02\/FirefoxPlugins-KDE-600x462.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2010\/02\/FirefoxPlugins-KDE-600x462.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2010\/02\/FirefoxPlugins-KDE-600x462.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":3545,"url":"https:\/\/skatox.com\/blog\/2017\/05\/02\/estare-en-el-maracaibo-tech-meetup\/","url_meta":{"origin":124,"position":4},"title":"Este s\u00e1bado 6 de mayo estar\u00e9 en el Maracaibo Tech Meetup","author":"Miguel Useche","date":"2 de mayo de 2017","format":false,"excerpt":"El Maracaibo Tech Meetup, es uno de encuentros (meetups) con mas antig\u00fcedad y con mas ediciones en el pa\u00eds, el cual re\u00fane a personas para conocer sobre lo \u00faltimo en tecnolog\u00eda. En la edici\u00f3n del pr\u00f3ximo de 6 mayo fui invitado y estar\u00e9 presente hablando sobre \"Construye tu web desde\u2026","rel":"","context":"En \u00abEventos Inform\u00e1ticos\u00bb","block_context":{"text":"Eventos Inform\u00e1ticos","link":"https:\/\/skatox.com\/blog\/category\/actividades-locales\/"},"img":{"alt_text":"Afiche de mi ponencia en el Maracaibo Tech Meetup","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2017\/04\/TechMeetup-600x487.jpeg?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2017\/04\/TechMeetup-600x487.jpeg?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2017\/04\/TechMeetup-600x487.jpeg?resize=525%2C300&ssl=1 1.5x"},"classes":[]},{"id":70,"url":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","url_meta":{"origin":124,"position":5},"title":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux","author":"Miguel Useche","date":"12 de junio de 2006","format":false,"excerpt":"Este LiveDVD es una gran herramienta\/sue\u00f1o para Hackers, Auditores de Seguridad, Inform\u00e1ticos, etc. Pues consiste en nada mas que 10 Distribuciones de Gnu\/Linux basadas en Seguridad, las cuales corren sin tener que instalarse (sin embargo pueden instalarse si quieres) entre las cuales se incluyen: BackTrack, Operator, PHLAK, Auditor, L.A.S, Knoppix-STD,\u2026","rel":"","context":"En \u00abGnu\/Linux\u00bb","block_context":{"text":"Gnu\/Linux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/124","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=124"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/124\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=124"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=124"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=124"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}