{"id":93,"date":"2017-10-31T10:54:13","date_gmt":"2017-10-31T15:54:13","guid":{"rendered":"http:\/\/blog.hostdime.la\/?p=93"},"modified":"2026-05-04T09:51:29","modified_gmt":"2026-05-04T14:51:29","slug":"hackers-todo-lo-que-siempre-quisiste-saber-y-no-preguntaste","status":"publish","type":"post","link":"https:\/\/www.hostdime.la\/blog\/hackers-todo-lo-que-siempre-quisiste-saber-y-no-preguntaste\/","title":{"rendered":"Hackers: todo lo que siempre quisiste saber y no preguntaste"},"content":{"rendered":"<p style=\"text-align: justify;\">Hackers: todo lo que siempre quisiste saber y no preguntaste. Como es costumbre nuestro blog de HostDime Latinoam\u00e9rica y Espa\u00f1a, aglutina los nodos tem\u00e1ticos de todos los blogs de la Compa\u00f1\u00eda, en esta ocasi\u00f3n nuestra atenci\u00f3n se fija en estos personajes tan particulares.<!--more--><\/p>\n<p style=\"text-align: justify;\">Te invitamos a leer las siguientes notas ilustrativas al respecto para profundizar en el tema:<\/p>\n<ol>\n<li>\n<h1><span style=\"color: #ff6600;\"><a href=\"http:\/\/blog.hostdime.com.co\/que-es-un-hacker-definicion-significado-origen-termino-etimologia-evolucion-hace-dedica-sombreros-negros-y-blancos-black-hat-white-hat\/\" target=\"_blank\" rel=\"noopener\">Definici\u00f3n de hacker y origen del t\u00e9rmino<\/a><\/span><\/h1>\n<p><a href=\"http:\/\/blog.hostdime.com.co\/que-es-un-hacker-definicion-significado-origen-termino-etimologia-evolucion-hace-dedica-sombreros-negros-y-blancos-black-hat-white-hat\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-97 size-full\" src=\"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/\u00bfQue-es-un-hacker-Definicio\u0301n-significado-origen-del-te\u0301rmino-etimologi\u0301a-evolucio\u0301n-que-hace-a-que-se-dedica-sombreros-negros-y-blancos-black-hat-white-hat.png\" alt=\"\u00bfQue-es-un-hacker-Definicio\u0301n-significado-origen-del-te\u0301rmino-etimologi\u0301a-evolucio\u0301n-que-hace-a-que-se-dedica-sombreros-negros-y-blancos-black-hat-white-hat\" width=\"950\" height=\"360\" title=\"\"><\/a><\/li>\n<li>\n<h1><span style=\"color: #ff6600;\"><a href=\"http:\/\/blog.hostdime.com.co\/hackers-la-criptonita-de-la-seguridad-virtual\/\" target=\"_blank\" rel=\"noopener\">Hackers la criptonita de la seguridad<\/a><\/span><\/h1>\n<p><a href=\"http:\/\/blog.hostdime.com.co\/hackers-la-criptonita-de-la-seguridad-virtual\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-96 size-full\" src=\"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/Hackers-la-criptonita-de-la-seguridad-virtual.png\" alt=\"Hackers-la-criptonita-de-la-seguridad-virtual\" width=\"950\" height=\"360\" title=\"\"><\/a><\/li>\n<li>\n<h1><span style=\"color: #ff6600;\"><a href=\"http:\/\/blog.hostdime.com.co\/el-hackeo-tomando-partido-en-las-altas-esferas-del-poder-mundial\/\" target=\"_blank\" rel=\"noopener\">El hackeo toma partido de las altas esferas de poder<\/a><\/span><\/h1>\n<p><a href=\"http:\/\/blog.hostdime.com.co\/el-hackeo-tomando-partido-en-las-altas-esferas-del-poder-mundial\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-95 size-full\" src=\"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/El-Hackeo-tomando-partido-en-las-altas-esferas-del-poder-mundial.png\" alt=\"El-Hackeo-tomando-partido-en-las-altas-esferas-del-poder-mundial\" width=\"950\" height=\"360\" title=\"\"><\/a><\/li>\n<li>\n<h1><span style=\"color: #ff6600;\"><a href=\"http:\/\/blog.hostdime.com.pe\/ataques-ciberneticos-mas-grandes-historia\/\" target=\"_blank\" rel=\"noopener\">Los ataques cibern\u00e9ticos m\u00e1s grandes de la historia<\/a><\/span><\/h1>\n<p><a href=\"http:\/\/blog.hostdime.com.pe\/ataques-ciberneticos-mas-grandes-historia\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-99 size-full\" src=\"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/Los-ataques-ciberne\u0301ticos-ma\u0301s-grandes-de-la-historia.png\" alt=\"Los ataques ciberne\u0301ticos ma\u0301s grandes de la historia\" width=\"950\" height=\"350\" title=\"\"><\/a><\/li>\n<li>\n<h1><span style=\"color: #ff6600;\"><a href=\"http:\/\/blog.hostdime.com.pe\/hackers-son-buenos-malos-hay-distintas-clases-cuantos-tipos-podemos-encontrar\/\" target=\"_blank\" rel=\"noopener\">Tipos de hackers<\/a><\/span><\/h1>\n<p><a href=\"http:\/\/blog.hostdime.com.pe\/hackers-son-buenos-malos-hay-distintas-clases-cuantos-tipos-podemos-encontrar\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-104 size-full\" src=\"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/\u00bfLos-hackers-son-buenos-o-malos-\u00bfHay-distintas-clases-\u00bfCua\u0301ntos-tipos-podemos-encontrar.png\" alt=\"\u00bfLos hackers son buenos o malos \u00bfHay distintas clases? \u00bfCua\u0301ntos tipos podemos encontrar?\" width=\"950\" height=\"350\" title=\"\"><\/a><\/li>\n<li>\n<h1><span style=\"color: #ff6600;\"><a href=\"http:\/\/blog.hostdime.com.pe\/hackers-dispositivos-inteligentes\/\" target=\"_blank\" rel=\"noopener\">Hackers y dispositivos inteligentes<\/a><\/span><\/h1>\n<p><a href=\"http:\/\/blog.hostdime.com.pe\/hackers-dispositivos-inteligentes\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-103 size-full\" src=\"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/Hackers-y-los-dispositivos-inteligentes.png\" alt=\"Hackers y los dispositivos inteligentes\" width=\"950\" height=\"350\" title=\"\"><\/a><\/li>\n<li>\n<h1><span style=\"color: #ff6600;\"><a href=\"http:\/\/blog.hostdime.com.pe\/siete-formas-evitar-ser-hackeado\/\" target=\"_blank\" rel=\"noopener\">Siete formas de evitar ser hackeados<\/a><\/span><\/h1>\n<p><a href=\"http:\/\/blog.hostdime.com.pe\/siete-formas-evitar-ser-hackeado\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-102 size-full\" src=\"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/Siete-formas-de-evitar-ser-Hackeado.png\" alt=\"Siete formas de evitar ser Hackeado\" width=\"950\" height=\"350\" title=\"\"><\/a><\/li>\n<li>\n<h1><span style=\"color: #ff6600;\"><a href=\"http:\/\/blog.hostdime.com.pe\/y-si-hackean-mi-correo-electronico\/\" target=\"_blank\" rel=\"noopener\">\u00bfY si hackean mi correo electr\u00f3nico?<\/a><\/span><\/h1>\n<p><a href=\"http:\/\/blog.hostdime.com.pe\/y-si-hackean-mi-correo-electronico\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-101 size-full\" src=\"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/\u00bfY-si-hackean-mi-correo-electro\u0301nico.png\" alt=\"\u00bfY si hackean mi correo electro\u0301nico\" width=\"950\" height=\"350\" title=\"\"><\/a><\/li>\n<li>\n<h1><span style=\"color: #ff6600;\"><a href=\"http:\/\/blog.hostdime.com.pe\/wpa2-vulnerado-si-conoce-todos-detalles\/\" target=\"_blank\" rel=\"noopener\">\u00bfWPA2 vulnerado? S\u00ed, conoce los detalles<\/a><\/span><\/h1>\n<p><a href=\"http:\/\/blog.hostdime.com.pe\/wpa2-vulnerado-si-conoce-todos-detalles\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"aligncenter wp-image-100 size-full\" src=\"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/\u00bfWPA2-vulnerado-Si\u0301-conoce-todos-los-detalles.png\" alt=\"\" width=\"950\" height=\"350\" title=\"\"><\/a><\/li>\n<\/ol>\n<p style=\"text-align: justify;\">Viene muchas m\u00e1s semanas tem\u00e1ticas, de las cuales puedes ser part\u00edcipe, solo d\u00e9janos un comentario con que tipo de temas deseas que profundicemos y pr\u00f3ximamente la estaremos desarrollando.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers: todo lo que siempre quisiste saber y no preguntaste. Como es costumbre nuestro blog de HostDime Latinoam\u00e9rica y Espa\u00f1a, aglutina los nodos tem\u00e1ticos de todos los blogs de la Compa\u00f1\u00eda, en esta ocasi\u00f3n nuestra atenci\u00f3n se fija en estos [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":106,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[4],"class_list":["post-93","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia","tag-hackers"],"jetpack_featured_media_url":"https:\/\/www.hostdime.la\/blog\/wp-content\/uploads\/2017\/10\/Hackers-todo-lo-que-siempre-quisiste-saber-y-no-preguntaste.png","_links":{"self":[{"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/posts\/93","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/comments?post=93"}],"version-history":[{"count":1,"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/posts\/93\/revisions"}],"predecessor-version":[{"id":1323,"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/posts\/93\/revisions\/1323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/media\/106"}],"wp:attachment":[{"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/media?parent=93"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/categories?post=93"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostdime.la\/blog\/wp-json\/wp\/v2\/tags?post=93"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}