{"id":2746,"date":"2013-10-10T11:16:32","date_gmt":"2013-10-10T15:46:32","guid":{"rendered":"https:\/\/skatox.com\/blog\/?p=2746"},"modified":"2024-08-11T08:36:00","modified_gmt":"2024-08-11T13:36:00","slug":"documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/","title":{"rendered":"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica"},"content":{"rendered":"<p>DEF CON es la conferencia mas grande de Hacking que se realiza en todo el mundo desde 1992. Contiene muchas conferencias sobre seguridad en diversas tecnolog\u00edas, no solo en\u00a0 inform\u00e1tica sino tambi\u00e9n en cerraduras, fotocopiadoras, chips de tarjetas de cr\u00e9dito, acceso a centros de datos, entre otros.<\/p>\n<p>Una reconocida pol\u00edtica en este evento, es la prohibici\u00f3n de filmar las sesiones o partes del evento. Por eso es dif\u00edcil encontrar alguna presentaci\u00f3n o actividades del evento en Internet, sin embargo, en la edici\u00f3n del 2012 se permiti\u00f3 un grupo de personas filmar el evento, junto a los participantes y organizadores para dar a conocer la filosof\u00eda e historia del DEF CON en su 20do aniversario.<\/p>\n<p>Les recomiendo ver este v\u00eddeo si alguna vez han querido participar en este tipo de eventos, desean ver como es el DEF CON, conocer el esfuerzo para llevar a cabo un evento de esta magnitud, la cultura hacker, como los asistentes crean amistades y lazos profesionales, como existen actividades para todo tipo de publico tanto como para ni\u00f1os como profesionales en el \u00e1rea.<\/p>\n<p>El documental est\u00e1 disponible en Youtube de forma gratuita, se los recomiendo ver en alta resoluci\u00f3n y con calma porque dura 2 horas aproximadamente, pero vale la pena. As\u00ed que finalmente, les dejo el video insertado para que puedan verlo.<\/p>\n<div class=\"lyte-wrapper\" title=\"DEF CON: The Documentary - 720p\" style=\"width:640px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_SUhyeY0Fsvw\" itemprop=\"video\" itemscope itemtype=\"https:\/\/schema.org\/VideoObject\"><div><meta itemprop=\"thumbnailUrl\" content=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FSUhyeY0Fsvw%2Fhqdefault.jpg\" \/><meta itemprop=\"embedURL\" content=\"https:\/\/www.youtube.com\/embed\/SUhyeY0Fsvw\" \/><meta itemprop=\"duration\" content=\"PT1H50M57S\" \/><meta itemprop=\"uploadDate\" content=\"2013-08-11T00:18:34Z\" \/><\/div><meta itemprop=\"accessibilityFeature\" content=\"captions\" \/><div id=\"lyte_SUhyeY0Fsvw\" data-src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FSUhyeY0Fsvw%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\" itemprop=\"name\">DEF CON: The Documentary - 720p<\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/SUhyeY0Fsvw\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FSUhyeY0Fsvw%2F0.jpg\" alt=\"DEF CON: The Documentary - 720p\" width=\"640\" height=\"340\" \/><br \/>Ver este v\u00eddeo en YouTube<\/a><\/noscript><meta itemprop=\"description\" content=\"DEF CON is the world&#039;s largest hacking conference, held in Las Vegas, Nevada. In 2012 it was held for the 20th time. The conference has strict no-filming policies, but for DEF CON 20, a documentary crew was allowed full access to the event. The film follows the four days of the conference, the events and people (attendees and staff), and covers history and philosophy behind DEF CON&#039;s success and unique experience. Written by Jason Scott Like this? Leave feedback on IMDB: http:\/\/www.imdb.com\/title\/tt3010462\/ Get involved with DEF CON: https:\/\/forum.defcon.org\/ https:\/\/www.defcon.org\/\"><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:640px;margin:5px auto;\"><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>DEF CON es la conferencia mas grande de Hacking que se realiza en todo el mundo desde 1992. Contiene muchas conferencias sobre seguridad en diversas&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/\">Seguir leyendo<span class=\"screen-reader-text\">Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[1206,193],"tags":[],"class_list":["post-2746","post","type-post","status-publish","format-standard","hentry","category-videos","category-hacking-seguridad-informatica","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica - El blog de Skatox<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica - El blog de Skatox\" \/>\n<meta property=\"og:description\" content=\"DEF CON es la conferencia mas grande de Hacking que se realiza en todo el mundo desde 1992. Contiene muchas conferencias sobre seguridad en diversas&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-10T15:46:32+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-08-11T13:36:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"603\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/10\\\/10\\\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/10\\\/10\\\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica\",\"datePublished\":\"2013-10-10T15:46:32+00:00\",\"dateModified\":\"2024-08-11T13:36:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/10\\\/10\\\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\\\/\"},\"wordCount\":246,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"articleSection\":[\"Documentales o Videos\",\"Hacking \\\/ Seguridad Inform\u00e1tica\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/10\\\/10\\\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/10\\\/10\\\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/10\\\/10\\\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\\\/\",\"name\":\"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"datePublished\":\"2013-10-10T15:46:32+00:00\",\"dateModified\":\"2024-08-11T13:36:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/10\\\/10\\\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/10\\\/10\\\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2013\\\/10\\\/10\\\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778204839\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778204839\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778204839\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica - El blog de Skatox","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/","og_locale":"es_ES","og_type":"article","og_title":"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica - El blog de Skatox","og_description":"DEF CON es la conferencia mas grande de Hacking que se realiza en todo el mundo desde 1992. Contiene muchas conferencias sobre seguridad en diversas&#8230;","og_url":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2013-10-10T15:46:32+00:00","article_modified_time":"2024-08-11T13:36:00+00:00","og_image":[{"width":625,"height":603,"url":"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png","type":"image\/png"}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica","datePublished":"2013-10-10T15:46:32+00:00","dateModified":"2024-08-11T13:36:00+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/"},"wordCount":246,"commentCount":1,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"articleSection":["Documentales o Videos","Hacking \/ Seguridad Inform\u00e1tica"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/","url":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/","name":"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"datePublished":"2013-10-10T15:46:32+00:00","dateModified":"2024-08-11T13:36:00+00:00","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778204839","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778204839","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778204839","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":1942,"url":"https:\/\/skatox.com\/blog\/2010\/06\/24\/geohot-explica-la-seguridad-del-playstation-3\/","url_meta":{"origin":2746,"position":0},"title":"Geohot explica la seguridad del Playstation 3","author":"Miguel Useche","date":"24 de junio de 2010","format":false,"excerpt":"Geohot es un conocido hacker famoso por desbloquear el iPhone y el Playstation 3, hace uno meses logr\u00f3 romper la seguridad de la consola, luego modificar el firmware para arrancar GNU\/Linux a pesar de estar bloqueado. Pues hace uno d\u00edas se present\u00f3 en el famoso evento de seguridad llamado Night\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":124,"url":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/","url_meta":{"origin":2746,"position":1},"title":"Convertir a Firefox en una herramienta de Hacking (\u00e9tico)","author":"Miguel Useche","date":"19 de febrero de 2007","format":false,"excerpt":"Encontr\u00e9 en Security Database (excelente p\u00e1gina de seguridad inform\u00e1tica) un art\u00ed\u00adculo que explica como convertir el Firefox en una herramienta para hacking \u00e9tico y as\u00ed\u00ad deshacerse de tantos programas por separado. Para convertir al Firefox s\u00f3lo se necesitan instalar varias extensiones (Plugins) para agregarle funcionalidades como: Mostrar la Ip de\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"Firefox Hacking Tool","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3734,"url":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","url_meta":{"origin":2746,"position":2},"title":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica","author":"Miguel Useche","date":"2 de mayo de 2018","format":false,"excerpt":"En Mozilla suelen invitar a sus oficinas grandes profesionales para compartir su experticia en un \u00e1rea. Las ponencias son compartidas en tiempo real al personal y algunos voluntarios. De esta forma todos podemos aumentar nuestros conocimientos en diversas \u00e1reas de la web abierta. Hace unas semanas estuvo Mikko Hypponen, un\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/s1y3VjZTDRk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":4561,"url":"https:\/\/skatox.com\/blog\/2023\/04\/03\/documentales-de-google-sobre-hacking\/","url_meta":{"origin":2746,"position":3},"title":"Documentales de Google sobre Hacking","author":"Miguel Useche","date":"3 de abril de 2023","format":false,"excerpt":"Hace un par de meses Google liber\u00f3 una serie de seis videos sobre Hacking. Los cuales abarcan temas como introducci\u00f3n al hacking y cuenta casos reales donde Google ha sido v\u00edctima o han tenido que intervenir. Enumerados desde el 0 tal como se numera en la inform\u00e1tica, cada episodio ofrece\u2026","rel":"","context":"En \u00abDocumentales o Videos\u00bb","block_context":{"text":"Documentales o Videos","link":"https:\/\/skatox.com\/blog\/category\/videos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":939,"url":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/","url_meta":{"origin":2746,"position":4},"title":"La historia del Hacking","author":"Miguel Useche","date":"20 de septiembre de 2009","format":false,"excerpt":"Este art\u00ed\u00adculo se parece al anterior, es otra cronolog\u00ed\u00ada que encontr\u00e9 gracias a microsiervos acerca\u00a0 de la historia del Hacking, si son fan\u00e1ticos de la seguridad inform\u00e1tica como yo. les gustar\u00e1 ya que muestra alguno de los eventos mas importantes desde el inicio del Hacking hasta nuestros dias. Sin embargo,\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2312,"url":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/","url_meta":{"origin":2746,"position":5},"title":"Ghost in the Wires: Las historias de hacking de Kevin Mitnick","author":"Miguel Useche","date":"21 de mayo de 2012","format":false,"excerpt":"Si has estado en el mundo de la seguridad inform\u00e1tica seguro conoces a Kevin Mitnick, si no, te recomiendo leer sobre el hacker mas famoso de todos los tiempos por ser el primero en aparecer en la lista de los 10 mas buscados del FBI. Su libro \"Ghost in the\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"Ghost in the wires","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2012\/05\/ghost.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/2746","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=2746"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/2746\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=2746"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=2746"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=2746"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}