{"id":937,"date":"2010-10-20T23:04:35","date_gmt":"2010-10-21T04:04:35","guid":{"rendered":"http:\/\/eljeffto.com\/?p=937"},"modified":"2014-07-08T18:19:40","modified_gmt":"2014-07-08T23:19:40","slug":"charla-hacking-etico-y-buenas-practicas-de-seguridad-en-desarrollo","status":"publish","type":"post","link":"https:\/\/eljeffto.com\/?p=937","title":{"rendered":"Charla: Hacking \u00e9tico y buenas pr\u00e1cticas de seguridad en desarrollo"},"content":{"rendered":"<p>Esta charla se imparti\u00f3 a los estudiantes de la Universidad Distrital, parte del grupo de desarrollo web de ACM.<\/p>\n<p>Clic en la imagen para ver el mapa.<\/p>\n<p><a href=\"http:\/\/eljeffto.com\/wp-content\/uploads\/2010\/10\/Buenas-pr\u00e1cticas-de-seguridad-a-nivel-de-desarrollo.png\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-938\" title=\"Buenas pr\u00e1cticas de seguridad a nivel de desarrollo\" src=\"http:\/\/eljeffto.com\/wp-content\/uploads\/2010\/10\/Buenas-pr\u00e1cticas-de-seguridad-a-nivel-de-desarrollo-300x173.png\" alt=\"\" width=\"300\" height=\"173\" srcset=\"https:\/\/eljeffto.com\/wp-content\/uploads\/2010\/10\/Buenas-pr\u00e1cticas-de-seguridad-a-nivel-de-desarrollo-300x173.png 300w, https:\/\/eljeffto.com\/wp-content\/uploads\/2010\/10\/Buenas-pr\u00e1cticas-de-seguridad-a-nivel-de-desarrollo-1024x593.png 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Esta charla se imparti\u00f3 a los estudiantes de la Universidad Distrital, parte del grupo de desarrollo web de ACM. Clic en la imagen para ver el mapa.<\/p>\n","protected":false},"author":2,"featured_media":910,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[343,25,362,192],"tags":[442,441,440,589,181,182],"class_list":{"0":"entry","1":"post","2":"publish","3":"author-jeffto","4":"post-937","6":"format-standard","7":"has-post-thumbnail","8":"category-certificacion","9":"category-reporte-seguridad-p","10":"category-seguridad-de-la-informacion","11":"category-sysadmin","12":"post_tag-aplicaciones","13":"post_tag-desarrollo","14":"post_tag-ethical-hacking","15":"post_tag-hacking","16":"post_tag-security","17":"post_tag-seguridad"},"_links":{"self":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/937","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=937"}],"version-history":[{"count":6,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/937\/revisions"}],"predecessor-version":[{"id":1582,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/937\/revisions\/1582"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/media\/910"}],"wp:attachment":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=937"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=937"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=937"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}