{"id":939,"date":"2009-09-20T10:20:06","date_gmt":"2009-09-20T14:50:06","guid":{"rendered":"https:\/\/skatox.com\/blog\/?p=939"},"modified":"2014-08-29T20:19:29","modified_gmt":"2014-08-30T00:49:29","slug":"la-historia-del-hacking","status":"publish","type":"post","link":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/","title":{"rendered":"La historia del Hacking"},"content":{"rendered":"<p>Este art\u00ed\u00adculo se parece al anterior, es otra cronolog\u00ed\u00ada que encontr\u00e9 gracias a microsiervos acerca\u00a0 de la historia del Hacking, si son fan\u00e1ticos de la seguridad inform\u00e1tica como yo. les gustar\u00e1 ya que muestra alguno de los eventos mas importantes desde el inicio del Hacking hasta nuestros dias. Sin embargo, me pareci\u00f3 que hubo otros eventos famosos que tambi\u00e9n debieron incluirse como:<\/p>\n<ul>\n<li>DVD-John crackea el sistema de los DVDs.<\/li>\n<li>El virus I Love You<\/li>\n<li>El virus Sasser y Blaster<\/li>\n<li>El ataque a Facebook y twitter por hackers rusos.<\/li>\n<\/ul>\n<p>Bueno, el link para verlo es en: https:\/\/www.focus.com\/fyi\/it-security\/history-hacking\/ y est\u00e1 en ingles.\u00a0 Recuerden comentar si les gust\u00f3 o desean hablar del tema.<\/p>\n<p><em><strong>Editado al 29\/08\/14: Ya no existen ambos enlaces \ud83d\ude41<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Este art\u00ed\u00adculo se parece al anterior, es otra cronolog\u00ed\u00ada que encontr\u00e9 gracias a microsiervos acerca\u00a0 de la historia del Hacking, si son fan\u00e1ticos de la&#8230;<\/p>\n<div class=\"more-link-wrapper\"><a class=\"more-link\" href=\"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/\">Seguir leyendo<span class=\"screen-reader-text\">La historia del Hacking<\/span><\/a><\/div>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"jetpack_post_was_ever_published":false},"categories":[193],"tags":[544,947,50,543],"class_list":["post-939","post","type-post","status-publish","format-standard","hentry","category-hacking-seguridad-informatica","tag-cronologia","tag-hacking-seguridad-informatica","tag-historia","tag-seguridad-informatica","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>La historia del Hacking - El blog de Skatox<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"La historia del Hacking - El blog de Skatox\" \/>\n<meta property=\"og:description\" content=\"Este art\u00ed\u00adculo se parece al anterior, es otra cronolog\u00ed\u00ada que encontr\u00e9 gracias a microsiervos acerca\u00a0 de la historia del Hacking, si son fan\u00e1ticos de la&#8230;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"El blog de Skatox\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/\" \/>\n<meta property=\"article:published_time\" content=\"2009-09-20T14:50:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-08-30T00:49:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"603\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Miguel Useche\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@skatox\" \/>\n<meta name=\"twitter:site\" content=\"@skatox\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Miguel Useche\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minuto\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2009\\\/09\\\/20\\\/la-historia-del-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2009\\\/09\\\/20\\\/la-historia-del-hacking\\\/\"},\"author\":{\"name\":\"Miguel Useche\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\"},\"headline\":\"La historia del Hacking\",\"datePublished\":\"2009-09-20T14:50:06+00:00\",\"dateModified\":\"2014-08-30T00:49:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2009\\\/09\\\/20\\\/la-historia-del-hacking\\\/\"},\"wordCount\":132,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"keywords\":[\"cronologia\",\"Hacking \\\/ Seguridad Inform\u00e1tica\",\"historia\",\"seguridad informatica\"],\"articleSection\":[\"Hacking \\\/ Seguridad Inform\u00e1tica\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2009\\\/09\\\/20\\\/la-historia-del-hacking\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2009\\\/09\\\/20\\\/la-historia-del-hacking\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2009\\\/09\\\/20\\\/la-historia-del-hacking\\\/\",\"name\":\"La historia del Hacking - El blog de Skatox\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\"},\"datePublished\":\"2009-09-20T14:50:06+00:00\",\"dateModified\":\"2014-08-30T00:49:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2009\\\/09\\\/20\\\/la-historia-del-hacking\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/skatox.com\\\/blog\\\/2009\\\/09\\\/20\\\/la-historia-del-hacking\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/2009\\\/09\\\/20\\\/la-historia-del-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"La historia del Hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"name\":\"El blog de Skatox\",\"description\":\"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres\",\"publisher\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/skatox.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#organization\",\"name\":\"El blog de Skatox\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/images\\\/2022\\\/03\\\/tux.png\",\"width\":218,\"height\":218,\"caption\":\"El blog de Skatox\"},\"image\":{\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ElWeblogdeSkatox\\\/\",\"https:\\\/\\\/x.com\\\/skatox\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/skatox\\\/\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/MiguelAngelUsecheCastro\",\"https:\\\/\\\/x.com\\\/skatox\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/#\\\/schema\\\/person\\\/e081bf33c5b0f1b0514e253cb578e1ba\",\"name\":\"Miguel Useche\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"url\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"contentUrl\":\"https:\\\/\\\/skatox.com\\\/blog\\\/wp-content\\\/litespeed\\\/avatar\\\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822\",\"caption\":\"Miguel Useche\"},\"sameAs\":[\"https:\\\/\\\/skatox.com\",\"https:\\\/\\\/x.com\\\/skatox\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"La historia del Hacking - El blog de Skatox","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/","og_locale":"es_ES","og_type":"article","og_title":"La historia del Hacking - El blog de Skatox","og_description":"Este art\u00ed\u00adculo se parece al anterior, es otra cronolog\u00ed\u00ada que encontr\u00e9 gracias a microsiervos acerca\u00a0 de la historia del Hacking, si son fan\u00e1ticos de la&#8230;","og_url":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/","og_site_name":"El blog de Skatox","article_publisher":"https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","article_published_time":"2009-09-20T14:50:06+00:00","article_modified_time":"2014-08-30T00:49:29+00:00","og_image":[{"width":625,"height":603,"url":"https:\/\/skatox.com\/blog\/images\/2015\/12\/skatux.png","type":"image\/png"}],"author":"Miguel Useche","twitter_card":"summary_large_image","twitter_creator":"@skatox","twitter_site":"@skatox","twitter_misc":{"Escrito por":"Miguel Useche","Tiempo de lectura":"1 minuto"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/#article","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/"},"author":{"name":"Miguel Useche","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba"},"headline":"La historia del Hacking","datePublished":"2009-09-20T14:50:06+00:00","dateModified":"2014-08-30T00:49:29+00:00","mainEntityOfPage":{"@id":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/"},"wordCount":132,"commentCount":1,"publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"keywords":["cronologia","Hacking \/ Seguridad Inform\u00e1tica","historia","seguridad informatica"],"articleSection":["Hacking \/ Seguridad Inform\u00e1tica"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/","url":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/","name":"La historia del Hacking - El blog de Skatox","isPartOf":{"@id":"https:\/\/skatox.com\/blog\/#website"},"datePublished":"2009-09-20T14:50:06+00:00","dateModified":"2014-08-30T00:49:29+00:00","breadcrumb":{"@id":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/skatox.com\/blog\/2009\/09\/20\/la-historia-del-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/skatox.com\/blog\/"},{"@type":"ListItem","position":2,"name":"La historia del Hacking"}]},{"@type":"WebSite","@id":"https:\/\/skatox.com\/blog\/#website","url":"https:\/\/skatox.com\/blog\/","name":"El blog de Skatox","description":"Compartiendo mis opiniones inform\u00e1ticas mas all\u00e1 de los 280 caracteres","publisher":{"@id":"https:\/\/skatox.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/skatox.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/skatox.com\/blog\/#organization","name":"El blog de Skatox","url":"https:\/\/skatox.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","contentUrl":"https:\/\/skatox.com\/blog\/images\/2022\/03\/tux.png","width":218,"height":218,"caption":"El blog de Skatox"},"image":{"@id":"https:\/\/skatox.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ElWeblogdeSkatox\/","https:\/\/x.com\/skatox","https:\/\/www.linkedin.com\/in\/skatox\/","https:\/\/www.youtube.com\/c\/MiguelAngelUsecheCastro","https:\/\/x.com\/skatox\/"]},{"@type":"Person","@id":"https:\/\/skatox.com\/blog\/#\/schema\/person\/e081bf33c5b0f1b0514e253cb578e1ba","name":"Miguel Useche","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","url":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","contentUrl":"https:\/\/skatox.com\/blog\/wp-content\/litespeed\/avatar\/aec95b02408138cb9d08288435373552.jpg?ver=1778809822","caption":"Miguel Useche"},"sameAs":["https:\/\/skatox.com","https:\/\/x.com\/skatox"]}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":2312,"url":"https:\/\/skatox.com\/blog\/2012\/05\/21\/ghost-in-the-wires-las-historias-de-hacking-de-kevin-mitnick\/","url_meta":{"origin":939,"position":0},"title":"Ghost in the Wires: Las historias de hacking de Kevin Mitnick","author":"Miguel Useche","date":"21 de mayo de 2012","format":false,"excerpt":"Si has estado en el mundo de la seguridad inform\u00e1tica seguro conoces a Kevin Mitnick, si no, te recomiendo leer sobre el hacker mas famoso de todos los tiempos por ser el primero en aparecer en la lista de los 10 mas buscados del FBI. Su libro \"Ghost in the\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"Ghost in the wires","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2012\/05\/ghost.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":124,"url":"https:\/\/skatox.com\/blog\/2007\/02\/19\/convertir-a-firefox-en-una-herramienta-de-hacking-etico\/","url_meta":{"origin":939,"position":1},"title":"Convertir a Firefox en una herramienta de Hacking (\u00e9tico)","author":"Miguel Useche","date":"19 de febrero de 2007","format":false,"excerpt":"Encontr\u00e9 en Security Database (excelente p\u00e1gina de seguridad inform\u00e1tica) un art\u00ed\u00adculo que explica como convertir el Firefox en una herramienta para hacking \u00e9tico y as\u00ed\u00ad deshacerse de tantos programas por separado. Para convertir al Firefox s\u00f3lo se necesitan instalar varias extensiones (Plugins) para agregarle funcionalidades como: Mostrar la Ip de\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"Firefox Hacking Tool","src":"https:\/\/i0.wp.com\/skatox.com\/blog\/images\/2007\/02\/firefox_hacker.miniatura.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":2746,"url":"https:\/\/skatox.com\/blog\/2013\/10\/10\/documental-sobre-defcon-la-famosa-conferencia-de-seguridad-informatica\/","url_meta":{"origin":939,"position":2},"title":"Documental sobre DEF CON: la famosa conferencia de Seguridad Inform\u00e1tica","author":"Miguel Useche","date":"10 de octubre de 2013","format":false,"excerpt":"DEF CON es la conferencia mas grande de Hacking que se realiza en todo el mundo desde 1992. Contiene muchas conferencias sobre seguridad en diversas tecnolog\u00edas, no solo en\u00a0 inform\u00e1tica sino tambi\u00e9n en cerraduras, fotocopiadoras, chips de tarjetas de cr\u00e9dito, acceso a centros de datos, entre otros. Una reconocida pol\u00edtica\u2026","rel":"","context":"En \u00abDocumentales o Videos\u00bb","block_context":{"text":"Documentales o Videos","link":"https:\/\/skatox.com\/blog\/category\/videos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/SUhyeY0Fsvw\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":4561,"url":"https:\/\/skatox.com\/blog\/2023\/04\/03\/documentales-de-google-sobre-hacking\/","url_meta":{"origin":939,"position":3},"title":"Documentales de Google sobre Hacking","author":"Miguel Useche","date":"3 de abril de 2023","format":false,"excerpt":"Hace un par de meses Google liber\u00f3 una serie de seis videos sobre Hacking. Los cuales abarcan temas como introducci\u00f3n al hacking y cuenta casos reales donde Google ha sido v\u00edctima o han tenido que intervenir. Enumerados desde el 0 tal como se numera en la inform\u00e1tica, cada episodio ofrece\u2026","rel":"","context":"En \u00abDocumentales o Videos\u00bb","block_context":{"text":"Documentales o Videos","link":"https:\/\/skatox.com\/blog\/category\/videos\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/PL590L5WQmH8dsxxz7ooJAgmijwOz0lh2H\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3734,"url":"https:\/\/skatox.com\/blog\/2018\/05\/02\/el-pasado-presente-y-futuro-de-la-seguridad-informatica\/","url_meta":{"origin":939,"position":4},"title":"El pasado, presente y futuro de la Seguridad Inform\u00e1tica","author":"Miguel Useche","date":"2 de mayo de 2018","format":false,"excerpt":"En Mozilla suelen invitar a sus oficinas grandes profesionales para compartir su experticia en un \u00e1rea. Las ponencias son compartidas en tiempo real al personal y algunos voluntarios. De esta forma todos podemos aumentar nuestros conocimientos en diversas \u00e1reas de la web abierta. Hace unas semanas estuvo Mikko Hypponen, un\u2026","rel":"","context":"En \u00abHacking \/ Seguridad Inform\u00e1tica\u00bb","block_context":{"text":"Hacking \/ Seguridad Inform\u00e1tica","link":"https:\/\/skatox.com\/blog\/category\/hacking-seguridad-informatica\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/img.youtube.com\/vi\/s1y3VjZTDRk\/0.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":70,"url":"https:\/\/skatox.com\/blog\/2006\/06\/12\/securedvd-livedvd-para-el-hacking-desde-gnu-linux\/","url_meta":{"origin":939,"position":5},"title":"SecureDVD: LiveDVD para el hacking desde Gnu \/ Linux","author":"Miguel Useche","date":"12 de junio de 2006","format":false,"excerpt":"Este LiveDVD es una gran herramienta\/sue\u00f1o para Hackers, Auditores de Seguridad, Inform\u00e1ticos, etc. Pues consiste en nada mas que 10 Distribuciones de Gnu\/Linux basadas en Seguridad, las cuales corren sin tener que instalarse (sin embargo pueden instalarse si quieres) entre las cuales se incluyen: BackTrack, Operator, PHLAK, Auditor, L.A.S, Knoppix-STD,\u2026","rel":"","context":"En \u00abGnu\/Linux\u00bb","block_context":{"text":"Gnu\/Linux","link":"https:\/\/skatox.com\/blog\/category\/gnulinux\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/939","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/comments?post=939"}],"version-history":[{"count":0,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/posts\/939\/revisions"}],"wp:attachment":[{"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/media?parent=939"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/categories?post=939"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/skatox.com\/blog\/wp-json\/wp\/v2\/tags?post=939"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}