{"id":2584,"date":"2013-03-29T12:48:37","date_gmt":"2013-03-29T17:18:37","guid":{"rendered":"https:\/\/skatox.com\/blog\/?p=2584"},"modified":"2024-08-11T08:45:08","modified_gmt":"2024-08-11T13:45:08","slug":"hackers-con-h-de-heroes","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/","title":{"rendered":"Hackers con \u00abH\u00bb de Heroes"},"content":{"rendered":"<p>Leyendo una entrada en <a title=\"Ir a la fuente original\" href=\"https:\/\/www.microsiervos.com\/archivo\/tecnologia\/h-hacker-heroe-cracker.html\" target=\"_blank\" rel=\"noopener\">Microsiervos<\/a>, encontr\u00e9 este documental de tan solo 7 minutos sobre los <strong>Hackers<\/strong>, lo ch\u00e9vere es que se trata de los verdaderos Hackers: el t\u00e9rmino utilizado en los d\u00e9cada de los 70 para aquellos entusiastas en llevar mas all\u00e1 los l\u00edmites de la inform\u00e1tica. Algo que me gust\u00f3 y no habia caido en cuenta, fue sobre ser Hacker hoy en el 2013: existen tantos aparatos para aplicar Hacks en ellos, permitiendo mayor acceso a este mundo que en el pasado.<\/p>\n<p>El v\u00eddeo est\u00e1 en ingl\u00e9s, lo adjunt\u00e9 con la traducci\u00f3n autom\u00e1tica de Google para tener subt\u00edtulos en espa\u00f1ol pero no est\u00e1n agarrando (ni en la p\u00e1gina de Youtube), igual si les gusta este mundo no dejen de verlo.<\/p>\n<div class=\"lyte-wrapper\" title=\"Can Hackers Be Heroes? | Off Book | PBS Digital Studios\" style=\"width:640px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_NVtrA7juc-w\" itemprop=\"video\" itemscope itemtype=\"https:\/\/schema.org\/VideoObject\"><div><meta itemprop=\"thumbnailUrl\" content=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FNVtrA7juc-w%2Fhqdefault.jpg\" \/><meta itemprop=\"embedURL\" content=\"https:\/\/www.youtube.com\/embed\/NVtrA7juc-w\" \/><meta itemprop=\"duration\" content=\"PT7M29S\" \/><meta itemprop=\"uploadDate\" content=\"2013-03-29T01:19:08Z\" \/><\/div><meta itemprop=\"accessibilityFeature\" content=\"captions\" \/><div id=\"lyte_NVtrA7juc-w\" data-src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FNVtrA7juc-w%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\" itemprop=\"name\">Can Hackers Be Heroes? | Off Book | PBS Digital Studios<\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/NVtrA7juc-w\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FNVtrA7juc-w%2F0.jpg\" alt=\"Can Hackers Be Heroes? | Off Book | PBS Digital Studios\" width=\"640\" height=\"340\" \/><br \/>Ver este v\u00eddeo en YouTube<\/a><\/noscript><meta itemprop=\"description\" content=\"Viewers like you help make PBS (Thank you \ud83d\ude03) . Support your local PBS Member Station here: http:\/\/to.pbs.org\/Donateoffbook Many people think of hackers as cyber criminals, breaking into computer systems with ill-intent. Though there are plenty of destructive hackers in the world, there have always been people who hack with a different purpose. Some define hacking as &quot;finding creative solutions to technical problems.&quot; To them, hacking means having an exploratory mindset about technology, and a willingness to &quot;get under the hood&quot; to tinker and see what happens. Other groups, like Anonymous, employ more subversive hacking practices to forward social and political causes, embedding a social consciousness into the traditionally murky dark-side of security hacking. Looking beyond the media hype and scare tactics, it is clear that &quot;hacking&quot; is a term whose meaning should be up for debate, and that some hackers could in fact be heroes, and not just villains. Featuring: Chris Wiggins, Columbia University Steven Levy, WIRED Cole Stryker, Internet Researcher Evan Korth, NYU Music &quot;Running Away&quot; by MegaEnx http:\/\/soundcloud.com\/megaenx\/running-away &quot;New Problems&quot; by MegaEnx http:\/\/soundcloud.com\/megaenx\/new-problems &quot;Ambient&quot; by Mihai Tuhari http:\/\/www.liquiddnb.com\/mix\/mihai-tuhari-ambient &quot;Fortune&quot; by Calibur Music http:\/\/soundcloud.com\/caliburmusic\/fortune &quot;Agent 855&quot; by MegaEnx http:\/\/soundcloud.com\/megaenx\/agent-855 &quot;Flying Over Water&quot; by MegaEnx http:\/\/soundcloud.com\/megaenx\/flying-over-water &quot;Goof&quot; by Binarpilot http:\/\/www.jamendo.com\/en\/artist\/1125\/binaerpilot &quot;Sakti - Midnight Inspiration&quot; by MMMontageMusic More Off Book: The Rise of Webcomics: http:\/\/youtu.be\/6redB3Xev14 Will 3D Printing Change The World? http:\/\/youtu.be\/X5AZzOw7FwA Our video on The Art of Illustration http:\/\/youtu.be\/ZPQ-8Kty8X4 We celebrated The Rise of Competitive Gaming &amp; E-Sports http:\/\/youtu.be\/GpO76SkpaWQ What&#039;s The Deal With Internet Comedy? http:\/\/youtu.be\/LhmhbjuL2HQ\"><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:640px;margin:5px auto;\"><\/div><\/p>\n<p>Si quieren conocer mas del tema, pueden leer un art\u00edculo que escrib\u00ed hace a\u00f1os sobre <a title=\"Definici\u00f3n de Hacker\" href=\"https:\/\/skatox.com\/blog\/2006\/09\/10\/definicion-de-hacker\/\" target=\"_blank\" rel=\"noopener\">la definici\u00f3n de Hacker<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Leyendo una entrada en Microsiervos, encontr\u00e9 este documental de tan solo 7 minutos sobre los Hackers, lo ch\u00e9vere es que se trata de los verdaderos&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/\">Seguir leyendo<span class=\"screen-reader-text\">Hackers con \u00abH\u00bb de Heroes<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1206,193,582],"tags":[],"class_list":["post-2584","post","type-post","status-publish","format-standard","hentry","category-videos","category-hacking-seguridad-informatica","category-planetas-linux","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers con &quot;H&quot; de Heroes - El blog de Skatox<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers con &quot;H&quot; de Heroes - El blog de Skatox\" \/>\n<meta property=\"og:description\" content=\"Leyendo una entrada en Microsiervos, encontr\u00e9 este documental de tan solo 7 minutos sobre los Hackers, lo ch\u00e9vere es que se trata de los verdaderos&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-03-29T17:18:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-11T13:45:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"603\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/03\\\/29\\\/hackers-con-h-de-heroes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/03\\\/29\\\/hackers-con-h-de-heroes\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"Hackers con \u00abH\u00bb de Heroes\",\"datePublished\":\"2013-03-29T17:18:37+00:00\",\"dateModified\":\"2024-08-11T13:45:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/03\\\/29\\\/hackers-con-h-de-heroes\\\/\"},\"wordCount\":158,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"articleSection\":[\"Documentales o Videos\",\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"Planetas\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/03\\\/29\\\/hackers-con-h-de-heroes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/03\\\/29\\\/hackers-con-h-de-heroes\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/03\\\/29\\\/hackers-con-h-de-heroes\\\/\",\"name\":\"Hackers con \\\"H\\\" de Heroes - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"datePublished\":\"2013-03-29T17:18:37+00:00\",\"dateModified\":\"2024-08-11T13:45:08+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/03\\\/29\\\/hackers-con-h-de-heroes\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/03\\\/29\\\/hackers-con-h-de-heroes\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/03\\\/29\\\/hackers-con-h-de-heroes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers con \u00abH\u00bb de Heroes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers con \"H\" de Heroes - El blog de Skatox","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/","og_locale":"es_ES","og_type":"article","og_title":"Hackers con \"H\" de Heroes - El blog de Skatox","og_description":"Leyendo una entrada en Microsiervos, encontr\u00e9 este documental de tan solo 7 minutos sobre los Hackers, lo ch\u00e9vere es que se trata de los verdaderos&#8230;","og_url":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2013-03-29T17:18:37+00:00","article_modified_time":"2024-08-11T13:45:08+00:00","og_image":[{"width":625,"height":603,"url":"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png","type":"image\/png"}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"Hackers con \u00abH\u00bb de Heroes","datePublished":"2013-03-29T17:18:37+00:00","dateModified":"2024-08-11T13:45:08+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/"},"wordCount":158,"commentCount":0,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"articleSection":["Documentales o Videos","Hacking \/ Seguridad Inform\u00e1tica","Planetas"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/","url":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/","name":"Hackers con \"H\" de Heroes - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"datePublished":"2013-03-29T17:18:37+00:00","dateModified":"2024-08-11T13:45:08+00:00","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2013\/03\/29\/hackers-con-h-de-heroes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackers con \u00abH\u00bb de Heroes"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1777599971","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":3030,"url":"https:\/\/skatox.com\/blog\/2014\/06\/16\/hackers-el-sistema-inmunologico-de-internet\/","url_meta":{"origin":2584,"position":0},"title":"Hackers: el sistema inmunol\u00f3gico de Internet","author":"Miguel Useche","date":"16 de junio de 2014","format":false,"excerpt":"Hace unos d\u00edas Keren Elazari, una reconocida experta en el \u00e1rea de seguridad inform\u00e1tica, dict\u00f3 una charla TED sobre como los hackers son el sistema inmunol\u00f3gico de Internet. Me gust\u00f3 mucho su manera de explicar ante el p\u00fablico como es la manera de pensar de un hacker, como el personaje\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2597,"url":"https:\/\/skatox.com\/blog\/2013\/04\/23\/video-musical-con-escena-de-peliculas-de-hackers\/","url_meta":{"origin":2584,"position":1},"title":"Video musical con escena de pel\u00edculas de Hackers","author":"Miguel Useche","date":"23 de abril de 2013","format":false,"excerpt":"Para los fan\u00e1ticos de la seguridad inform\u00e1tica y de las pel\u00edculas de Hollywood, les dejo este v\u00eddeo de m\u00fasica electr\u00f3nica con sonidos de escenas de pel\u00edculas de Hackers. Recomiendo verlo y contar cu\u00e1ntas de esas pel\u00edculas han visto; quienes deseen tener una lista de pel\u00edculas de este tema, pueden ver\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/0ekAb-X8XOY\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3224,"url":"https:\/\/skatox.com\/blog\/2015\/11\/26\/hackers-wizards-electronic-age-antiguo-documental-sobre-los-verdaderos-hackers\/","url_meta":{"origin":2584,"position":2},"title":"Hackers Wizards of the Electronic Age: antiguo documental sobre los verdaderos Hackers","author":"Miguel Useche","date":"26 de noviembre de 2015","format":false,"excerpt":"No recuerdo como llegu\u00e9 a obtener el enlace a este documental de Hackers, pero cuando le\u00ed el t\u00edtulo pens\u00e9 que era un documental reciente porque no conoc\u00eda el t\u00edtulo. Para mi sorpresa al empezar verlo, es un documental de 1984 realizado en un encuentro de Hackers, pero incluye a leyendas\u2026","rel":"","context":"En \u00abDocumentales o Videos\u00bb","block_context":{"text":"Documentales o Videos","link":"https:\/\/skatox.com\/blog\/category\/videos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/zOP1LNr70aU\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2058,"url":"https:\/\/skatox.com\/blog\/2010\/12\/15\/mis-peliculas-recomendadas-sobre-hackers-programadores-e-informatica\/","url_meta":{"origin":2584,"position":3},"title":"Mis pel\u00edculas recomendadas sobre Hackers, Programadores e Inform\u00e1tica","author":"Miguel Useche","date":"15 de diciembre de 2010","format":false,"excerpt":"Este tipo de pel\u00edculas toda la vida me ha gustado, algunas me han inspirado a ser como soy profesionalmente y otras simplemente me han entretenido mucho. Hace a\u00f1os eran muy pocas, sin embargo, cada vez son mas populares y son vistas por gente\u00a0 normal o no relacionada con las tecnolog\u00edas\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":70,"url":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","url_meta":{"origin":2584,"position":4},"title":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux","author":"Miguel Useche","date":"12 de junio de 2006","format":false,"excerpt":"Este LiveDVD es una gran herramienta\/sue\u00f1o para Hackers, Auditores de Seguridad, Inform\u00e1ticos, etc. Pues consiste en nada mas que 10 Distribuciones de Gnu\/Linux basadas en Seguridad, las cuales corren sin tener que instalarse (sin embargo pueden instalarse si quieres) entre las cuales se incluyen: BackTrack, Operator, PHLAK, Auditor, L.A.S, Knoppix-STD,\u2026","rel":"","context":"En \u00abGnu\/Linux\u00bb","block_context":{"text":"Gnu\/Linux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1942,"url":"https:\/\/skatox.com\/blog\/2010\/06\/24\/geohot-explica-la-seguridad-del-playstation-3\/","url_meta":{"origin":2584,"position":5},"title":"Geohot explica la seguridad del Playstation 3","author":"Miguel Useche","date":"24 de junio de 2010","format":false,"excerpt":"Geohot es un conocido hacker famoso por desbloquear el iPhone y el Playstation 3, hace uno meses logr\u00f3 romper la seguridad de la consola, luego modificar el firmware para arrancar GNU\/Linux a pesar de estar bloqueado. Pues hace uno d\u00edas se present\u00f3 en el famoso evento de seguridad llamado Night\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/2584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=2584"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/2584\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=2584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=2584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=2584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}