{"id":3597,"date":"2017-09-11T08:10:53","date_gmt":"2017-09-11T12:40:53","guid":{"rendered":"https:\/\/skatox.com\/blog\/?p=3597"},"modified":"2017-09-10T20:41:33","modified_gmt":"2017-09-11T01:11:33","slug":"hackeando-las-instrucciones-x86","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/","title":{"rendered":"Hackeando las instrucciones de x86"},"content":{"rendered":"<p>Cuando utilizamos la computadora y encontramos problemas, siempre solemos echar la culpa a las aplicaciones, nunca lo hacemos con el hardware porque asumimos que son piezas perfectas sin fallas. Tambi\u00e9n cuando hacemos auditor\u00edas de seguridad, solemos solo fijarnos en el software y vemos al hardware como una caja negra segura. Sin embargo, en esta presentaci\u00f3n vemos como un hacker estudia la <a title=\"Lee sobre la arquitectura x86 en Wikipedia\" href=\"https:\/\/es.wikipedia.org\/wiki\/X86\" target=\"_blank\" rel=\"noopener\">arquitectura x86<\/a> (utilizada en la mayor\u00eda de las computadoras de escritorio y servidores) y desarrolla un algoritmo para encontrar instrucciones no documentadas en los procesadores x86.<\/p>\n<p>El resultado es que consigue varias de ellas, demostrando que el hardware no es tan seguro o confiable como creemos. Pues contiene varias instrucciones no documentadas.<\/p>\n<h3>Instrucciones no documentadas x86<\/h3>\n<p>Las instrucciones no documentadas, permiten codificar programas para realizar acciones secretas en tu computadora. Por ejemplo, pueder acceder a direcciones de memoria especiales (podr\u00eda pertenecer a otros programas y contener informaci\u00f3n privada), acceder a registros, realizar acciones privilegiadas, entre otros.<\/p>\n<p>El peligro es que ocurre a nivel de hardware y al no estar documentadas, nadie las conoce, son indetectables. No se sabe si Intel\/AMD las coloca para colaborar con agencias gubernamentales, para ellos mismos, pruebas, entre otros.<\/p>\n<p>Si te interesa mas el tema, observa la conferencia \u00abRompiendo el conjunto de instrucciones de x86\u00bb.<\/p>\n<div class=\"lyte-wrapper\" title=\"Breaking the x86 Instruction Set\" style=\"width:640px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_KrksBdWcZgQ\" itemprop=\"video\" itemscope itemtype=\"https:\/\/schema.org\/VideoObject\"><div><meta itemprop=\"thumbnailUrl\" content=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FKrksBdWcZgQ%2Fhqdefault.jpg\" \/><meta itemprop=\"embedURL\" content=\"https:\/\/www.youtube.com\/embed\/KrksBdWcZgQ\" \/><meta itemprop=\"duration\" content=\"PT44M29S\" \/><meta itemprop=\"uploadDate\" content=\"2017-08-31T16:58:29Z\" \/><\/div><div id=\"lyte_KrksBdWcZgQ\" data-src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FKrksBdWcZgQ%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\" itemprop=\"name\">Breaking the x86 Instruction Set<\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/KrksBdWcZgQ\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2FKrksBdWcZgQ%2F0.jpg\" alt=\"Breaking the x86 Instruction Set\" width=\"640\" height=\"340\" \/><br \/>Ver este v\u00eddeo en YouTube<\/a><\/noscript><meta itemprop=\"description\" content=\"A processor is not a trusted black box for running code; on the contrary, modern x86 chips are packed full of secret instructions and hardware bugs. In this talk, we&#039;ll demonstrate how page fault analysis and some creative processor fuzzing can be used to exhaustively search the x86 instruction set and uncover the secrets buried in your chipset. Full Abstract &amp; Presentation Materials: https:\/\/www.blackhat.com\/us-17\/briefings.html#breaking-the-x86-instruction-set\"><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:640px;margin:5px auto;\"><\/div><\/p>\n<p>Esperemos ver que informaci\u00f3n oficial sale sobre estos descubrimientos, o si son vulnerabilidades que se aprovechar\u00e1n en el futuro. De todos modos, deseo que te haya gustado el v\u00eddeo y recuerda compartir tu opini\u00f3n en la caja de comentarios.<\/p>\n<p>Happy Hardware Hacking!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cuando utilizamos la computadora y encontramos problemas, siempre solemos echar la culpa a las aplicaciones, nunca lo hacemos con el hardware porque asumimos que son&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/\">Seguir leyendo<span class=\"screen-reader-text\">Hackeando las instrucciones de x86<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"Hackeando las instrucciones de la arquitectura #x86 #hacking #cpu #hardware","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[193,582],"tags":[299,1079,41,1078,40,1077],"class_list":["post-3597","post","type-post","status-publish","format-standard","hentry","category-hacking-seguridad-informatica","category-planetas-linux","tag-amd","tag-cpu","tag-intel","tag-procesador","tag-x86","tag-x86-64","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackeando las instrucciones de x86 - El blog de Skatox<\/title>\n<meta name=\"description\" content=\"Excelente presentaci\u00f3n sobre como se logra hackear la arquitectura x86 para descubrir instrucciones secretas y bugs de hardware\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackeando las instrucciones de x86 - El blog de Skatox\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-09-11T12:40:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"603\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2017\\\/09\\\/11\\\/hackeando-las-instrucciones-x86\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2017\\\/09\\\/11\\\/hackeando-las-instrucciones-x86\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"Hackeando las instrucciones de x86\",\"datePublished\":\"2017-09-11T12:40:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2017\\\/09\\\/11\\\/hackeando-las-instrucciones-x86\\\/\"},\"wordCount\":275,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"keywords\":[\"amd\",\"cpu\",\"intel\",\"procesador\",\"x86\",\"x86-64\"],\"articleSection\":[\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"Planetas\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2017\\\/09\\\/11\\\/hackeando-las-instrucciones-x86\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2017\\\/09\\\/11\\\/hackeando-las-instrucciones-x86\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2017\\\/09\\\/11\\\/hackeando-las-instrucciones-x86\\\/\",\"name\":\"Hackeando las instrucciones de x86 - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"datePublished\":\"2017-09-11T12:40:53+00:00\",\"description\":\"Excelente presentaci\u00f3n sobre como se logra hackear la arquitectura x86 para descubrir instrucciones secretas y bugs de hardware\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2017\\\/09\\\/11\\\/hackeando-las-instrucciones-x86\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2017\\\/09\\\/11\\\/hackeando-las-instrucciones-x86\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2017\\\/09\\\/11\\\/hackeando-las-instrucciones-x86\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackeando las instrucciones de x86\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackeando las instrucciones de x86 - El blog de Skatox","description":"Excelente presentaci\u00f3n sobre como se logra hackear la arquitectura x86 para descubrir instrucciones secretas y bugs de hardware","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/","og_locale":"es_ES","og_type":"article","og_title":"Hackeando las instrucciones de x86 - El blog de Skatox","og_url":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2017-09-11T12:40:53+00:00","og_image":[{"width":625,"height":603,"url":"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png","type":"image\/png"}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"Hackeando las instrucciones de x86","datePublished":"2017-09-11T12:40:53+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/"},"wordCount":275,"commentCount":0,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"keywords":["amd","cpu","intel","procesador","x86","x86-64"],"articleSection":["Hacking \/ Seguridad Inform\u00e1tica","Planetas"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/","url":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/","name":"Hackeando las instrucciones de x86 - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"datePublished":"2017-09-11T12:40:53+00:00","description":"Excelente presentaci\u00f3n sobre como se logra hackear la arquitectura x86 para descubrir instrucciones secretas y bugs de hardware","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2017\/09\/11\/hackeando-las-instrucciones-x86\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Hackeando las instrucciones de x86"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":57,"url":"https:\/\/skatox.com\/blog\/2006\/04\/22\/mi-primer-podcast-con-gubatron\/","url_meta":{"origin":3597,"position":0},"title":"Mi primer podcast con Gubatron","author":"Miguel Useche","date":"22 de abril de 2006","format":false,"excerpt":"Se\u00f1oras y se\u00f1ores, ayer grab\u00e9 con Gubatron mi primer podcast para la p\u00e1gina www.wedoit4you.com esc\u00fachenlo desde aqu\u00ed\u00ad en el enlace a continuaci\u00f3n o directamente desde la p\u00e1gina antes mencionada, les recomiendo que la escuchen y no s\u00f3lo esta sino las anteriores (Sobre todo las de nintendo). Gubatron y yo no\u2026","rel":"","context":"En \u00abApple\/Mac\u00bb","block_context":{"text":"Apple\/Mac","link":"https:\/\/skatox.com\/blog\/category\/applemac\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":54,"url":"https:\/\/skatox.com\/blog\/2006\/04\/17\/macos-en-intel-x86\/","url_meta":{"origin":3597,"position":1},"title":"MacOs en Intel x86","author":"Miguel Useche","date":"17 de abril de 2006","format":false,"excerpt":"Hace como un mes, logr\u00e9 instalar Mac Os en mi m\u00e1quina Intel siguiendo una de las muchas gu\u00ed\u00adas de Google. Este S.O. siempre me ha gustado mas que todo por su apariencia visual (Llevan la delantera en algunos campos) y para usar algunos programas nativos de \u00e9l como el iTunes,\u2026","rel":"","context":"En \u00abApple\/Mac\u00bb","block_context":{"text":"Apple\/Mac","link":"https:\/\/skatox.com\/blog\/category\/applemac\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.skatox.com\/blog\/images\/2006\/04\/mini_macdesk.JPG?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":10,"url":"https:\/\/skatox.com\/blog\/2005\/09\/19\/instalar-macosx-en-una-x86\/","url_meta":{"origin":3597,"position":2},"title":"Instalar MacOSx en una x86","author":"Miguel Useche","date":"19 de septiembre de 2005","format":false,"excerpt":"Bueno por ahora no tengo nada que meter a la p\u00e1gina pero les recomiendo que visiten esta pagina, alli tienen una excelente gu\u00ed\u00ada para instalar el sistema operativo Tiger de Apple en una pc cualquiera. Si logro sacar 12gb de disco lo intentar\u00e9.","rel":"","context":"En \u00abApple\/Mac\u00bb","block_context":{"text":"Apple\/Mac","link":"https:\/\/skatox.com\/blog\/category\/applemac\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4320,"url":"https:\/\/skatox.com\/blog\/2021\/09\/20\/sirve-una-mac-con-apple-sillicon-m1-para-el-desarrollo-web\/","url_meta":{"origin":3597,"position":3},"title":"\u00bfSirve una Mac con Apple Sillicon (M1, M1 Pro, M1 Max) para el desarrollo web?","author":"Miguel Useche","date":"20 de septiembre de 2021","format":false,"excerpt":"Hace unos meses adquir\u00ed una Mac mini con el nuevo procesador de Apple Sillicon (M1). Estaba buscando remplazar mi Mac mini anterior y cuando vi que sacaron nuevos equipos con el chip M1 que en las pruebas de rendimiento superaban a la mayor\u00eda de procesadores, no produc\u00edan mucho calor (vivo\u2026","rel":"","context":"En \u00abApple\/Mac\u00bb","block_context":{"text":"Apple\/Mac","link":"https:\/\/skatox.com\/blog\/category\/applemac\/"},"img":{"alt_text":"El chip de Apple Sillicon (M1)","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2021\/09\/apple-M1.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":3333,"url":"https:\/\/skatox.com\/blog\/2016\/01\/02\/playstation-4-hackeado-logran-ejecutar-linux-en-el\/","url_meta":{"origin":3597,"position":4},"title":"El Playstation 4 ha sido hackeado para correr Linux","author":"Miguel Useche","date":"2 de enero de 2016","format":false,"excerpt":"Para los amantes de la seguridad inform\u00e1tica y las consolas, tenemos una gran noticia para empezar el a\u00f1o. Pues el grupo de hackers denominado fail0verflow han realizado una presentaci\u00f3n en el pasado Chaos Communication Congress, donde muestran el Playstation 4 (PS4) hackeado para correr Linux en \u00e9l, inclusive, ejecutan un\u2026","rel":"","context":"En \u00abGnu\/Linux\u00bb","block_context":{"text":"Gnu\/Linux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/2A7V3GLWF6U\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":257,"url":"https:\/\/skatox.com\/blog\/2008\/02\/28\/el-dvd-gratuito-de-netbeans\/","url_meta":{"origin":3597,"position":5},"title":"El DVD gratuito de Netbeans","author":"Miguel Useche","date":"28 de febrero de 2008","format":false,"excerpt":"Hace como 2 semanas me lleg\u00f3 mi DVD de Netbeans a mi casa, comprobando que si es verdad que llegan sin pagar nada, tal como los CDs gratuitos de Ubuntu. El DVD de Netbeans 6.0 no incluye nada que no se consiga en su p\u00e1gina web, sin embargo es muy\u2026","rel":"","context":"En \u00abNetbeans\u00bb","block_context":{"text":"Netbeans","link":"https:\/\/skatox.com\/blog\/category\/todo-lo-relacionado-al-desarrollo-de-software\/netbeans-2\/"},"img":{"alt_text":"Netbeans 6 DVD","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2008\/02\/netbeans6_dvd.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/3597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=3597"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/3597\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=3597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=3597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=3597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}