{"id":986,"date":"2011-01-30T07:09:36","date_gmt":"2011-01-30T12:09:36","guid":{"rendered":"http:\/\/eljeffto.com\/?p=986"},"modified":"2014-07-08T18:19:43","modified_gmt":"2014-07-08T23:19:43","slug":"un-articulo-semanal-de-seguridad","status":"publish","type":"post","link":"https:\/\/eljeffto.com\/?p=986","title":{"rendered":"Un art\u00edculo semanal de seguridad"},"content":{"rendered":"<p style=\"text-align: justify;\">Una de las normas personasles que rigen este blog es el evitar publicar contenidos 100% t\u00e9cnicos a pesar que en ocasiones publico uno que otro script o sugerencia t\u00e9cnica. Se abri\u00f3 una oportunidad para redactar de forma semanal un art\u00edculo relacionado con seguridad de la informaci\u00f3n, hacking y gobierno de it y seguridad con el blog mexicano dedicado a estos temas <a title=\"Hacking MX\" href=\"http:\/\/hacking.mx\" target=\"_blank\">Hacking MX<\/a>.<\/p>\n<p style=\"text-align: justify;\">Ya est\u00e1 publicado el primer art\u00edculo dedicado a la certificaci\u00f3n CISSP para la cual llevo estudiando un mes y cuyo examen presentar\u00e9 a finales de Mayo, o bueno, eso espero. As\u00ed que semanalmente encontrar\u00e1n un art\u00edculo sobre los temas que mencion\u00e9 anteriormente, espero sean de agrado de todos.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Una de las normas personasles que rigen este blog es el evitar publicar contenidos 100% t\u00e9cnicos a pesar que en ocasiones publico uno que otro script o sugerencia t\u00e9cnica. Se abri\u00f3 una oportunidad para redactar de forma semanal un art\u00edculo relacionado con seguridad de la informaci\u00f3n, hacking y gobierno de it y seguridad con el &#8230; <span class=\"more\"><a class=\"more-link\" href=\"https:\/\/eljeffto.com\/?p=986\">[Read more&#8230;]<\/a><\/span><\/p>\n","protected":false},"author":2,"featured_media":915,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[343,439,25,362,31],"tags":[62,467,468,181,182,469],"class_list":{"0":"entry","1":"post","2":"publish","3":"author-jeffto","4":"post-986","6":"format-standard","7":"has-post-thumbnail","8":"category-certificacion","9":"category-hacking","10":"category-reporte-seguridad-p","11":"category-seguridad-de-la-informacion","12":"category-web","13":"post_tag-blog","14":"post_tag-hacking-mx","15":"post_tag-information-security","16":"post_tag-security","17":"post_tag-seguridad","18":"post_tag-seguridad-de-la-informacion-2"},"_links":{"self":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/986","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=986"}],"version-history":[{"count":3,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/986\/revisions"}],"predecessor-version":[{"id":1589,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/posts\/986\/revisions\/1589"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=\/wp\/v2\/media\/915"}],"wp:attachment":[{"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=986"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=986"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/eljeffto.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=986"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}