{"id":3734,"date":"2018-05-02T08:00:00","date_gmt":"2018-05-02T12:00:00","guid":{"rendered":"https:\/\/skatox.com\/blog\/?p=3734"},"modified":"2018-05-06T14:05:27","modified_gmt":"2018-05-06T18:05:27","slug":"el-pasado-presente-y-futuro-de-la-seguridad-informatica","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","title":{"rendered":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica"},"content":{"rendered":"<p>En Mozilla suelen invitar a sus oficinas grandes profesionales para compartir su experticia en un \u00e1rea. Las ponencias son compartidas en tiempo real al personal y algunos voluntarios. De esta forma todos podemos aumentar nuestros conocimientos en diversas \u00e1reas de la web abierta. Hace unas semanas estuvo <a title=\"Web oficial de Mikko\" href=\"https:\/\/mikko.hypponen.com\/\" target=\"_blank\" rel=\"noopener\">Mikko Hypponen<\/a>, un experto en seguridad inform\u00e1tica. Comentando sobre los ataques inform\u00e1ticos desde los inicios, los actuales y el futuro de los mismos.<\/p>\n<h3>El contenido del v\u00eddeo<\/h3>\n<p>Me encant\u00f3 esta charla porque es interesante ver la evoluci\u00f3n de las fallas inform\u00e1ticas, da nostalgia recordar como eran. Es incre\u00edble darse cuenta c\u00f3mo lo que sucede actualmente, hace unos a\u00f1os era considerado ciencia ficci\u00f3n. Adem\u00e1s, en la \u00faltima secci\u00f3n del v\u00eddeo da un an\u00e1lisis muy interesante de como ser\u00e1 el futuro de esto. \u00a1Ojal\u00e1 no sea tan feo como lo predice!<\/p>\n<div class=\"lyte-wrapper\" title=\"Computer Security in the Past, Present and Future\" style=\"width:640px;max-width:100%;margin:5px auto;\"><div class=\"lyMe\" id=\"WYL_s1y3VjZTDRk\" itemprop=\"video\" itemscope itemtype=\"https:\/\/schema.org\/VideoObject\"><div><meta itemprop=\"thumbnailUrl\" content=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fs1y3VjZTDRk%2Fhqdefault.jpg\" \/><meta itemprop=\"embedURL\" content=\"https:\/\/www.youtube.com\/embed\/s1y3VjZTDRk\" \/><meta itemprop=\"duration\" content=\"PT1H5M44S\" \/><meta itemprop=\"uploadDate\" content=\"2018-03-21T00:07:00Z\" \/><\/div><meta itemprop=\"accessibilityFeature\" content=\"captions\" \/><div id=\"lyte_s1y3VjZTDRk\" data-src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fs1y3VjZTDRk%2Fhqdefault.jpg\" class=\"pL\"><div class=\"tC\"><div class=\"tT\" itemprop=\"name\">Computer Security in the Past, Present and Future<\/div><\/div><div class=\"play\"><\/div><div class=\"ctrl\"><div class=\"Lctrl\"><\/div><div class=\"Rctrl\"><\/div><\/div><\/div><noscript><a href=\"https:\/\/youtu.be\/s1y3VjZTDRk\" rel=\"nofollow\"><img decoding=\"async\" src=\"https:\/\/skatox.com\/blog\/wp-content\/plugins\/wp-youtube-lyte\/lyteCache.php?origThumbUrl=https%3A%2F%2Fi.ytimg.com%2Fvi%2Fs1y3VjZTDRk%2F0.jpg\" alt=\"Computer Security in the Past, Present and Future\" width=\"640\" height=\"340\" \/><br \/>Ver este v\u00eddeo en YouTube<\/a><\/noscript><meta itemprop=\"description\" content=\"Computer security researcher Mikko Hypponen has been hunting hackers since 1991. In this Mozilla Speaker Series presentation, he shares his insights and stories. Mikko will also tell us where we are today, and where we will be going in the future. But the real question is: how are we ever going to secure ten billion new devices that will be going online over the next decade? From the Mozilla Speaker Series.\"><\/div><\/div><div class=\"lL\" style=\"max-width:100%;width:640px;margin:5px auto;\"><\/div><\/p>\n<p>Espero que te haya gustado y recuerda compartirlo con otros.<\/p>\n<p>Happy hacking!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>En Mozilla suelen invitar a sus oficinas grandes profesionales para compartir su experticia en un \u00e1rea. Las ponencias son compartidas en tiempo real al personal&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/\">Seguir leyendo<span class=\"screen-reader-text\">El pasado, presente y futuro de la Seguridad Inform\u00e1tica<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica por Mikko Hypponen","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[193,582],"tags":[725,898,944,337,216,543],"class_list":["post-3734","post","type-post","status-publish","format-standard","hentry","category-hacking-seguridad-informatica","category-planetas-linux","tag-hackers","tag-hacking","tag-firefox","tag-security","tag-seguridad","tag-seguridad-informatica","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>El pasado, presente y futuro de la Seguridad Inform\u00e1tica - El blog de Skatox<\/title>\n<meta name=\"description\" content=\"Disfruta de esta gran charla realizada por Mikko Hypponen (un famoso hacker) sobre la seguridad inform\u00e1tica a lo largo de todos estos a\u00f1os\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"El pasado, presente y futuro de la Seguridad Inform\u00e1tica - El blog de Skatox\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-02T12:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-05-06T18:05:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"603\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2018\\\/05\\\/02\\\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2018\\\/05\\\/02\\\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"El pasado, presente y futuro de la Seguridad Inform\u00e1tica\",\"datePublished\":\"2018-05-02T12:00:00+00:00\",\"dateModified\":\"2018-05-06T18:05:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2018\\\/05\\\/02\\\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\\\/\"},\"wordCount\":180,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"keywords\":[\"hackers\",\"hacking\",\"Mozilla \\\/ Firefox \\\/ Thunderbird\",\"security\",\"seguridad\",\"seguridad informatica\"],\"articleSection\":[\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"Planetas\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2018\\\/05\\\/02\\\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2018\\\/05\\\/02\\\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2018\\\/05\\\/02\\\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\\\/\",\"name\":\"El pasado, presente y futuro de la Seguridad Inform\u00e1tica - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"datePublished\":\"2018-05-02T12:00:00+00:00\",\"dateModified\":\"2018-05-06T18:05:27+00:00\",\"description\":\"Disfruta de esta gran charla realizada por Mikko Hypponen (un famoso hacker) sobre la seguridad inform\u00e1tica a lo largo de todos estos a\u00f1os\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2018\\\/05\\\/02\\\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2018\\\/05\\\/02\\\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2018\\\/05\\\/02\\\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"El pasado, presente y futuro de la Seguridad Inform\u00e1tica\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica - El blog de Skatox","description":"Disfruta de esta gran charla realizada por Mikko Hypponen (un famoso hacker) sobre la seguridad inform\u00e1tica a lo largo de todos estos a\u00f1os","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","og_locale":"es_ES","og_type":"article","og_title":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica - El blog de Skatox","og_url":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2018-05-02T12:00:00+00:00","article_modified_time":"2018-05-06T18:05:27+00:00","og_image":[{"width":625,"height":603,"url":"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png","type":"image\/png"}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica","datePublished":"2018-05-02T12:00:00+00:00","dateModified":"2018-05-06T18:05:27+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/"},"wordCount":180,"commentCount":1,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"keywords":["hackers","hacking","Mozilla \/ Firefox \/ Thunderbird","security","seguridad","seguridad informatica"],"articleSection":["Hacking \/ Seguridad Inform\u00e1tica","Planetas"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","url":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","name":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"datePublished":"2018-05-02T12:00:00+00:00","dateModified":"2018-05-06T18:05:27+00:00","description":"Disfruta de esta gran charla realizada por Mikko Hypponen (un famoso hacker) sobre la seguridad inform\u00e1tica a lo largo de todos estos a\u00f1os","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":124,"url":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/","url_meta":{"origin":3734,"position":0},"title":"Convertir a Firefox en una herramienta de Hacking (\u00e9tico)","author":"Miguel Useche","date":"19 de febrero de 2007","format":false,"excerpt":"Encontr\u00e9 en Security Database (excelente p\u00e1gina de seguridad inform\u00e1tica) un art\u00ed\u00adculo que explica como convertir el Firefox en una herramienta para hacking \u00e9tico y as\u00ed\u00ad deshacerse de tantos programas por separado. Para convertir al Firefox s\u00f3lo se necesitan instalar varias extensiones (Plugins) para agregarle funcionalidades como: Mostrar la Ip de\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"Firefox Hacking Tool","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":939,"url":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/","url_meta":{"origin":3734,"position":1},"title":"La historia del Hacking","author":"Miguel Useche","date":"20 de septiembre de 2009","format":false,"excerpt":"Este art\u00ed\u00adculo se parece al anterior, es otra cronolog\u00ed\u00ada que encontr\u00e9 gracias a microsiervos acerca\u00a0 de la historia del Hacking, si son fan\u00e1ticos de la seguridad inform\u00e1tica como yo. les gustar\u00e1 ya que muestra alguno de los eventos mas importantes desde el inicio del Hacking hasta nuestros dias. Sin embargo,\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4561,"url":"https:\/\/skatox.com\/blog\/2023\/04\/03\/documentales-de-google-sobre-hacking\/","url_meta":{"origin":3734,"position":2},"title":"Documentales de Google sobre Hacking","author":"Miguel Useche","date":"3 de abril de 2023","format":false,"excerpt":"Hace un par de meses Google liber\u00f3 una serie de seis videos sobre Hacking. Los cuales abarcan temas como introducci\u00f3n al hacking y cuenta casos reales donde Google ha sido v\u00edctima o han tenido que intervenir. Enumerados desde el 0 tal como se numera en la inform\u00e1tica, cada episodio ofrece\u2026","rel":"","context":"En \u00abDocumentales o Videos\u00bb","block_context":{"text":"Documentales o Videos","link":"https:\/\/skatox.com\/blog\/category\/videos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":70,"url":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","url_meta":{"origin":3734,"position":3},"title":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux","author":"Miguel Useche","date":"12 de junio de 2006","format":false,"excerpt":"Este LiveDVD es una gran herramienta\/sue\u00f1o para Hackers, Auditores de Seguridad, Inform\u00e1ticos, etc. Pues consiste en nada mas que 10 Distribuciones de Gnu\/Linux basadas en Seguridad, las cuales corren sin tener que instalarse (sin embargo pueden instalarse si quieres) entre las cuales se incluyen: BackTrack, Operator, PHLAK, Auditor, L.A.S, Knoppix-STD,\u2026","rel":"","context":"En \u00abGnu\/Linux\u00bb","block_context":{"text":"Gnu\/Linux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3030,"url":"https:\/\/skatox.com\/blog\/2014\/06\/16\/hackers-el-sistema-inmunologico-de-internet\/","url_meta":{"origin":3734,"position":4},"title":"Hackers: el sistema inmunol\u00f3gico de Internet","author":"Miguel Useche","date":"16 de junio de 2014","format":false,"excerpt":"Hace unos d\u00edas Keren Elazari, una reconocida experta en el \u00e1rea de seguridad inform\u00e1tica, dict\u00f3 una charla TED sobre como los hackers son el sistema inmunol\u00f3gico de Internet. Me gust\u00f3 mucho su manera de explicar ante el p\u00fablico como es la manera de pensar de un hacker, como el personaje\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":2746,"url":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/","url_meta":{"origin":3734,"position":5},"title":"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica","author":"Miguel Useche","date":"10 de octubre de 2013","format":false,"excerpt":"DEF CON es la conferencia mas grande de Hacking que se realiza en todo el mundo desde 1992. Contiene muchas conferencias sobre seguridad en diversas tecnolog\u00edas, no solo en\u00a0 inform\u00e1tica sino tambi\u00e9n en cerraduras, fotocopiadoras, chips de tarjetas de cr\u00e9dito, acceso a centros de datos, entre otros. Una reconocida pol\u00edtica\u2026","rel":"","context":"En \u00abDocumentales o Videos\u00bb","block_context":{"text":"Documentales o Videos","link":"https:\/\/skatox.com\/blog\/category\/videos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/SUhyeY0Fsvw\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/3734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=3734"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/3734\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=3734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=3734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=3734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}