{"id":6367,"date":"2014-01-25T22:40:01","date_gmt":"2014-01-25T21:40:01","guid":{"rendered":"http:\/\/www.montejo.biz\/blog\/?p=6367"},"modified":"2014-01-25T22:43:35","modified_gmt":"2014-01-25T21:43:35","slug":"instalacion-segura-de-programas-i-de-ii","status":"publish","type":"post","link":"https:\/\/www.montejo.biz\/blog\/2014\/01\/25\/instalacion-segura-de-programas-i-de-ii\/","title":{"rendered":"Instalaci\u00f3n segura de programas (I de II)"},"content":{"rendered":"<div id=\"post-entry-excerpt-6367\" class=\"entry-part\"><p>En el anterior art\u00edculo y en este hablo de descarga e instalaci\u00f3n segura de programas; lo de \u2018segura\u2019 es en aras de simplificar ya que no hay nada <a href=\"http:\/\/www.meneame.net\/c\/8178723\" target=\"_blank\">seguro<\/a> aparte de la muerte, los impuestos y la p\u00e9rdida de datos; lo correcto ser\u00eda decir \u2018razonablemente segura\u2019.<\/p>\n<p><a href=\"http:\/\/www.montejo.biz\/blog\/wp-content\/uploads\/2014\/01\/20-01-2014-20-07-08.gif\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-6368\" alt=\"20-01-2014 20-07-08\" src=\"http:\/\/www.montejo.biz\/blog\/wp-content\/uploads\/2014\/01\/20-01-2014-20-07-08.gif\" width=\"298\" height=\"407\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Fuente: <a href=\"http:\/\/www.corazonblanco.com\/media\/galeria\/44\/9\/7\/7\/6\/n_real_madrid_humor-5086779.jpgwww.corazonblanco.com\" target=\"_blank\">www.corazonblanco.com<\/a><\/p>\n<p>Una vez que hemos descargado el \u2018presunto\u2019 programa, debemos realizar unas comprobaciones de seguridad; s\u00ed, ya s\u00e9, todo lo relacionado con la seguridad es molesto pero la falta de seguridad produce muchos m\u00e1s problemas.<\/p>\n<p><a title=\"Leer m\u00e1s...\" href=\"http:\/\/www.rioja2.com\/opinion-684-Instalacion_segura_programas_I_II\" target=\"_blank\">Leer m\u00e1s&#8230;<\/a><\/p>\n<p><span style=\"font-size: 11.0pt; line-height: 115%; font-family: 'Calibri','sans-serif'; mso-fareast-font-family: Calibri; mso-bidi-font-family: 'Times New Roman'; mso-ansi-language: ES; mso-fareast-language: EN-US; mso-bidi-language: AR-SA;\"><!--[if gte vml 1]><v:shapetype id=\"_x0000_t75\" coordsize=\"21600,21600\"\no:spt=\"75\" o:preferrelative=\"t\" path=\"m@4@5l@4@11@9@11@9@5xe\" filled=\"f\"\nstroked=\"f\">\n<v:stroke joinstyle=\"miter\"><\/v:stroke>\n<v:formulas>\n<v:f eqn=\"if lineDrawn pixelLineWidth 0\"><\/v:f>\n<v:f eqn=\"sum @0 1 0\"><\/v:f>\n<v:f eqn=\"sum 0 0 @1\"><\/v:f>\n<v:f eqn=\"prod @2 1 2\"><\/v:f>\n<v:f eqn=\"prod @3 21600 pixelWidth\"><\/v:f>\n<v:f eqn=\"prod @3 21600 pixelHeight\"><\/v:f>\n<v:f eqn=\"sum @0 0 1\"><\/v:f>\n<v:f eqn=\"prod @6 1 2\"><\/v:f>\n<v:f eqn=\"prod @7 21600 pixelWidth\"><\/v:f>\n<v:f eqn=\"sum @8 21600 0\"><\/v:f>\n<v:f eqn=\"prod @7 21600 pixelHeight\"><\/v:f>\n<v:f eqn=\"sum @10 21600 0\"><\/v:f>\n<\/v:formulas>\n<v:path o:extrusionok=\"f\" gradientshapeok=\"t\" o:connecttype=\"rect\"><\/v:path>\n<o:lock v:ext=\"edit\" aspectratio=\"t\"><\/o:lock>\n<\/v:shapetype><v:shape id=\"_x0000_i1025\" type=\"#_x0000_t75\" style='width:223.5pt;\nheight:305.25pt'>\n<v:imagedata src=\"file:\/\/\/C:\\Users\\Usuario\\AppData\\Local\\Temp\\msohtmlclip1\\01\\clip_image001.png\"\no:title=\"20-01-2014 20-07-08\"><\/v:imagedata>\n<\/v:shape><![endif]--><!--[if !vml]--><!--[endif]--><\/span><\/p>\n\n\t\t\t\t\t\t\t<p style=\" color: #999999;\">If you found an error, highlight it and press <strong>Shift + E<\/strong> or <a href=\"#\" class=\"enp-report\"><strong>pulsa aqu\u00ed<\/strong><\/a> to inform us.<\/p>\n\t\t\t\t\t\t<\/div><div id=\"post-footer-6367\" class=\"post-footer clear\"><\/div>","protected":false},"excerpt":{"rendered":"<div class=\"mh-excerpt\"><p>En el anterior art\u00edculo y en este hablo de descarga e instalaci\u00f3n segura de programas; lo de \u2018segura\u2019 es en aras de simplificar ya que <a class=\"mh-excerpt-more\" href=\"https:\/\/www.montejo.biz\/blog\/2014\/01\/25\/instalacion-segura-de-programas-i-de-ii\/\" title=\"Instalaci\u00f3n segura de programas (I de II)\">[&#8230;]<\/a><\/p>\n<\/div>","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[7,52,55],"tags":[79,159,162],"class_list":["post-6367","post","type-post","status-publish","format-standard","hentry","category-articulo","category-programas","category-seguridad","tag-instalacion","tag-programas","tag-seguridad"],"_links":{"self":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/6367","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/comments?post=6367"}],"version-history":[{"count":2,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/6367\/revisions"}],"predecessor-version":[{"id":6370,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/posts\/6367\/revisions\/6370"}],"wp:attachment":[{"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/media?parent=6367"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/categories?post=6367"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.montejo.biz\/blog\/wp-json\/wp\/v2\/tags?post=6367"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}