{"id":70,"date":"2006-06-12T11:04:14","date_gmt":"2006-06-12T15:04:14","guid":{"rendered":"https:\/\/skatox.com\/blog2\/?p=70"},"modified":"2015-01-31T10:24:33","modified_gmt":"2015-01-31T14:54:33","slug":"securedvd-livedvd-para-el-hacking-desde-gnu-linux","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","title":{"rendered":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux"},"content":{"rendered":"<p>Este LiveDVD es una gran herramienta\/sue\u00f1o para Hackers, Auditores de Seguridad, Inform\u00e1ticos, etc. Pues consiste en nada mas que 10 Distribuciones de Gnu\/Linux basadas en Seguridad, las cuales corren sin tener que instalarse (sin embargo pueden instalarse si quieres) entre las cuales se incluyen: BackTrack, Operator, PHLAK, Auditor, L.A.S, Knoppix-STD, Helix, F.I.R.E., nUbuntu, INSERT Rescue Security Toolkit.<\/p>\n<p>Entre las herramientas que se pueden conseguir en estas distribuciones estan Crackeadores de contrase\u00f1as, Crackeadores de cifrado, Crackeadores de conexiones inal\u00e1mbricas, Colecci\u00f3n de Exploits listos para usar, Escaneadores de puertos, Escaneadores de Vulnerabilidades, HoneyPots, Firewalls, herramientas para TCP, Herramientas de Recuperaci\u00f3n de datos (forensia), etc. <strong>\u00a1\u00a1Y lo mejor de todo es que son software libre!!<\/strong><\/p>\n<p>Suena incre\u00ed\u00adble pero lo es, lo \u00fanico fastidioso es tener que probar cada una de las 10 distros, pero valen la pena ya que algunas son mas especializadas a ciertos fines que otras como por ejemplo: LAS, Insert, FIRE, Helix son distros dedicadas a an\u00e1lisis forenses (Hablando en inform\u00e1tica,claro); BackTrack, Auditor, PHLAK, son mas dedicadas a la seguridad inform\u00e1tica y PHLAK, nUBUNTU, STD, Helix son muy livianos.<\/p>\n<p>No hago reviews porque es mejor que lo prueben ustedes mismos y adem\u00e1s no se utilizar la mayor\u00ed\u00ada de herramientas que trae, sin embargo en mi opini\u00f3n, las mejores distros de ese DVD son Auditor (el mas completo e incluye muchos diccionarios para el cracking de passwords) y PHLACK (Liviano, completo y bonito).<\/p>\n<p>Eso s\u00ed\u00ad, todo lo expuesto aqu\u00ed\u00ad y el correcto uso de estas herramientas son dirigidas a Hackers, Gente especializada en Seguridad Inform\u00e1tica, Geeks y White-Hats. Es decir, se deben usar estas herramientas con fines de corregir bugs, aumentar sus conocimientos, mejorar la seguridad de sus sistemas, etc. <strong>Y NO PARA USO DA\u00ed\u0091INO<\/strong><\/p>\n<p>Para descargar este LiveDVD pueden hacerlo desde: <del datetime=\"2015-01-31T14:52:32+00:00\">https:\/\/www.securedvd.org<\/del>, de verdad se los recomiendo si son geeks en este asunto de la seguridad inform\u00e1tica.<\/p>\n<p>Gu\u00ed\u00adas y tutoriales:<br \/>\n<a title=\"Sitio de gu\u00edas de seguridad inform\u00e1tica\" href=\"https:\/\/www.remote-exploit.org\/\" target=\"_blank\">https:\/\/www.remote-exploit.org\/<\/a><br \/>\n<a title=\"Sitio de gu\u00edas de seguridad inform\u00e1tica\" href=\"https:\/\/www.irongeek.com\/\" target=\"_blank\">https:\/\/www.irongeek.com\/<\/a><br \/>\n<span class=\"removed_link\" title=\"https:\/\/forum.s-t-d.org\/\">https:\/\/forum.s-t-d.org\/<\/span><\/p>\n<p><strong>Cuando se habla de hackers, me refiero a su correcto termino, en otras palabras a los WhiteHats<\/strong><\/p>\n<p>Mi Screenshot de Auditor corriendo el scaneador de Vulnerabilidades Nessus, y haciendo un Traceroute a mi p\u00e1gina:<\/p>\n<div style=\"text-align: center\"><a title=\"\"  href=\"https:\/\/skatox.com\/blog\/images\/2006\/06\/auditor_screen.png\" data-rel=\"lightbox-gallery-0\" data-rl_title=\"\" data-rl_caption=\"\" target=\"_blank\"><img decoding=\"async\" src=\"https:\/\/www.skatox.com\/blog\/images\/2006\/06\/mini_auditor_screen.png\" border=\"0\" alt=\"\" \/><\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Este LiveDVD es una gran herramienta\/sue\u00f1o para Hackers, Auditores de Seguridad, Inform\u00e1ticos, etc. Pues consiste en nada mas que 10 Distribuciones de Gnu\/Linux basadas en&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/\">Seguir leyendo<span class=\"screen-reader-text\">SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[3,193],"tags":[175,947,174],"class_list":["post-70","post","type-post","status-publish","format-standard","hentry","category-gnulinux","category-hacking-seguridad-informatica","tag-distros-seguridad","tag-hacking-seguridad-informatica","tag-secure-dvd","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux - El blog de Skatox<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux - El blog de Skatox\" \/>\n<meta property=\"og:description\" content=\"Este LiveDVD es una gran herramienta\/sue\u00f1o para Hackers, Auditores de Seguridad, Inform\u00e1ticos, etc. Pues consiste en nada mas que 10 Distribuciones de Gnu\/Linux basadas en&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2006-06-12T15:04:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-31T14:54:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.skatox.com\/blog\/images\/2006\/06\/mini_auditor_screen.png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"SecureDVD: LiveDVD para el hacking desde Gnu \\\/ Linux\",\"datePublished\":\"2006-06-12T15:04:14+00:00\",\"dateModified\":\"2015-01-31T14:54:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/\"},\"wordCount\":391,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.skatox.com\\\/blog\\\/images\\\/2006\\\/06\\\/mini_auditor_screen.png\",\"keywords\":[\"distros seguridad\",\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"secure dvd\"],\"articleSection\":[\"Gnu\\\/Linux\",\"Hacking \\\/ Seguridad Inform\u00e1tica\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/\",\"name\":\"SecureDVD: LiveDVD para el hacking desde Gnu \\\/ Linux - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.skatox.com\\\/blog\\\/images\\\/2006\\\/06\\\/mini_auditor_screen.png\",\"datePublished\":\"2006-06-12T15:04:14+00:00\",\"dateModified\":\"2015-01-31T14:54:33+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.skatox.com\\\/blog\\\/images\\\/2006\\\/06\\\/mini_auditor_screen.png\",\"contentUrl\":\"https:\\\/\\\/www.skatox.com\\\/blog\\\/images\\\/2006\\\/06\\\/mini_auditor_screen.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2006\\\/06\\\/12\\\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SecureDVD: LiveDVD para el hacking desde Gnu \\\/ Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux - El blog de Skatox","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","og_locale":"es_ES","og_type":"article","og_title":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux - El blog de Skatox","og_description":"Este LiveDVD es una gran herramienta\/sue\u00f1o para Hackers, Auditores de Seguridad, Inform\u00e1ticos, etc. Pues consiste en nada mas que 10 Distribuciones de Gnu\/Linux basadas en&#8230;","og_url":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2006-06-12T15:04:14+00:00","article_modified_time":"2015-01-31T14:54:33+00:00","og_image":[{"url":"https:\/\/www.skatox.com\/blog\/images\/2006\/06\/mini_auditor_screen.png","type":"","width":"","height":""}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux","datePublished":"2006-06-12T15:04:14+00:00","dateModified":"2015-01-31T14:54:33+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/"},"wordCount":391,"commentCount":2,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"image":{"@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.skatox.com\/blog\/images\/2006\/06\/mini_auditor_screen.png","keywords":["distros seguridad","Hacking \/ Seguridad Inform\u00e1tica","secure dvd"],"articleSection":["Gnu\/Linux","Hacking \/ Seguridad Inform\u00e1tica"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","url":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","name":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/#primaryimage"},"image":{"@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/www.skatox.com\/blog\/images\/2006\/06\/mini_auditor_screen.png","datePublished":"2006-06-12T15:04:14+00:00","dateModified":"2015-01-31T14:54:33+00:00","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/#primaryimage","url":"https:\/\/www.skatox.com\/blog\/images\/2006\/06\/mini_auditor_screen.png","contentUrl":"https:\/\/www.skatox.com\/blog\/images\/2006\/06\/mini_auditor_screen.png"},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2067,"url":"https:\/\/skatox.com\/blog\/2010\/12\/30\/explicacion-de-la-seguridad-del-playstation-3-y-demas-consolas\/","url_meta":{"origin":70,"position":0},"title":"Explicaci\u00f3n de la seguridad del Playstation 3 y dem\u00e1s consolas","author":"Miguel Useche","date":"30 de diciembre de 2010","format":false,"excerpt":"El equipo de fail0verflow expuso en el pasado Chaos Communication Congress su charla 2010 Console Hacking, donde se explic\u00f3 en detalle como funciona todo el sistema de seguridad del Playstation 3, revelando sus fallas y dejando en r\u00eddiculo a Sony por cometer un error muy estupido en el algoritmo para\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3333,"url":"https:\/\/skatox.com\/blog\/2016\/01\/02\/playstation-4-hackeado-logran-ejecutar-linux-en-el\/","url_meta":{"origin":70,"position":1},"title":"El Playstation 4 ha sido hackeado para correr Linux","author":"Miguel Useche","date":"2 de enero de 2016","format":false,"excerpt":"Para los amantes de la seguridad inform\u00e1tica y las consolas, tenemos una gran noticia para empezar el a\u00f1o. Pues el grupo de hackers denominado fail0verflow han realizado una presentaci\u00f3n en el pasado Chaos Communication Congress, donde muestran el Playstation 4 (PS4) hackeado para correr Linux en \u00e9l, inclusive, ejecutan un\u2026","rel":"","context":"En \u00abGnu\/Linux\u00bb","block_context":{"text":"Gnu\/Linux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/2A7V3GLWF6U\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":1942,"url":"https:\/\/skatox.com\/blog\/2010\/06\/24\/geohot-explica-la-seguridad-del-playstation-3\/","url_meta":{"origin":70,"position":2},"title":"Geohot explica la seguridad del Playstation 3","author":"Miguel Useche","date":"24 de junio de 2010","format":false,"excerpt":"Geohot es un conocido hacker famoso por desbloquear el iPhone y el Playstation 3, hace uno meses logr\u00f3 romper la seguridad de la consola, luego modificar el firmware para arrancar GNU\/Linux a pesar de estar bloqueado. Pues hace uno d\u00edas se present\u00f3 en el famoso evento de seguridad llamado Night\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1736,"url":"https:\/\/skatox.com\/blog\/2010\/01\/24\/al-fin-el-playstation-3-ha-sido-hackeado\/","url_meta":{"origin":70,"position":3},"title":"Al fin el Playstation 3 ha sido hackeado","author":"Miguel Useche","date":"24 de enero de 2010","format":false,"excerpt":"Luego de 3 a\u00f1os y 2 meses de haber sido lanzado el Playstation 3, el famoso hacker George Hotz ha logrado sobrepasar la seguridad de la consola, teniendo acceso a la escritura de la memoria de todo el sistema, acceso al procesador y ejecuci\u00f3n de comandos a nivel de hardware\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":16,"url":"https:\/\/skatox.com\/blog\/2005\/10\/09\/tor-una-herramienta-para-navegar-anonimamente\/","url_meta":{"origin":70,"position":4},"title":"Tor: Una herramienta para navegar an\u00f3nimamente","author":"Miguel Useche","date":"9 de octubre de 2005","format":false,"excerpt":"Bueno navegando por la web \u00a1\u00a1descubr\u00ed\u00ad esta grandiosa herramienta!! Es la mejor manera para navegar con anonimato por Internet, resulta un poco mas lenta que navegar normalmente pero la p\u00e9rdida de velocidad resulta ganada por el anonimato. Esta herramienta la pueden descargar aqui, y la idea es b\u00e1sicamente sencilla. Funciona\u2026","rel":"","context":"En \u00abGnu\/Linux\u00bb","block_context":{"text":"Gnu\/Linux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3822,"url":"https:\/\/skatox.com\/blog\/2018\/10\/31\/protonvpn-en-archlinux-con-openvpn\/","url_meta":{"origin":70,"position":5},"title":"Configurar ProtonVPN en Archlinux con OpenVPN","author":"Miguel Useche","date":"31 de octubre de 2018","format":false,"excerpt":"Hace meses, Ronald Escalona un experto en seguridad inform\u00e1tica me recomend\u00f3 el uso de ProtonVPN. Abr\u00ed una cuenta gratuita en el sitio pero\u00a0debes esperar a que te den respuesta luego de unas semanas debido a que el servicio gratuito es por cupos. Luego de recibir la invitaci\u00f3n decid\u00ed probarlo en\u2026","rel":"","context":"En \u00abArchlinux\u00bb","block_context":{"text":"Archlinux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/archlinux-gnulinux\/"},"img":{"alt_text":"Logo de ProtonVPN","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2018\/10\/protonvpn-logo-green-600x180.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/70","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=70"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/70\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=70"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=70"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=70"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}