
{"id":120,"date":"2007-03-28T22:18:30","date_gmt":"2007-03-29T01:18:30","guid":{"rendered":"http:\/\/talsoft.com.ar\/weblog\/?p=120"},"modified":"2007-03-28T22:18:30","modified_gmt":"2007-03-29T01:18:30","slug":"diagnostico-de-analisis-de-cambio-para-windows-xp","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/","title":{"rendered":"Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP"},"content":{"rendered":"<p>Microsoft ha puesto a disposici\u00c3\u00b3n de sus usuarios una herramienta administrativa que a buen seguro agradecer\u00c3\u00a1 m\u00c3\u00a1s de un usuario o administrador de este tipo de plataformas.<\/p>\n<p>La herramienta se llama <a href=\"http:\/\/support.microsoft.com\/?kbid=924732\">Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP<\/a>, y la descripci\u00c3\u00b3n que da el fabricante es la siguiente:<\/p>\n<blockquote><p>Esta herramienta facilita realizar un seguimiento de cambios en ciertas partes del sistema operativo. Se permite la herramienta profesional de soporte t\u00c3\u00a9cnico comprenden mejor las modificaciones en los equipos de usuarios que pueden haber causado problemas. A continuaci\u00c3\u00b3n, profesional de soporte t\u00c3\u00a9cnico pueden sugerir solucionar pasos.<\/p><\/blockquote>\n<blockquote><p>La herramienta Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio examina el equipo y muestra cambios recientes de las \u00c3\u00a1reas siguientes:<br \/>\n\u00e2\u20ac\u00a2 Software programs: Los programas de software enumerados en el elemento Agregar o quitar programas de Panel de control.<br \/>\n\u00e2\u20ac\u00a2 Operating system components : revisi\u00c3\u00b3n y descarga desde Windows Update.<br \/>\n\u00e2\u20ac\u00a2 Browser Helper Objects (BHOs): Componentes COM que carga Internet Explorer cuando se inicia. BHO pueden interceptar eventos de explorador, tener acceso a controles de Internet Explorer, crear ventanas e instalar complementos que supervisan mensajes y acciones.<br \/>\n\u00e2\u20ac\u00a2 Controladores controladores de dispositivo de modo de n\u00c3\u00bacleo y controladores de sistema de archivos.<br \/>\n\u00e2\u20ac\u00a2 Controles ActiveX: Controles COM que ha sido descargado por Internet Explorer o que se utilizan en algunas p\u00c3\u00a1ginas Web.<br \/>\n\u00e2\u20ac\u00a2 Other Auto-Start Extensibility Points (ASEPs): ASEP permiten que se inicien programas sin acci\u00c3\u00b3n del usuario. Un ASEP puede aceptar uno o m\u00c3\u00a1s enlaces ASEP cada el cual asociado con un programa.<br \/>\nTambi\u00c3\u00a9n la herramienta muestra cambios en aplicaciones cargadas y objetos iniciales.<\/p><\/blockquote>\n<p>Como bien se indica en las limitaciones del producto, <strong>Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP no es una herramienta de seguridad<\/strong>, no puede invertir autom\u00c3\u00a1ticamente configuraciones de sistema para desinstalar aplicaciones o quitar cualquier otro software, no determina todos los cambios en equipos ni corrige cambios en todos los equipos, ni tampoco recupera ning\u00c3\u00ban componente de sistema. Es simplemente un control de cambios.<\/p>\n<p><a href=\"http:\/\/www.microsoft.com\/downloads\/details.aspx?FamilyId=097976F8-1124-45B8-9769-B48429A7A6A1\">Descargar Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP<\/a><\/p>\n<p>Fuente: <a href=\"http:\/\/www.sahw.com\/wp\/\">http:\/\/www.sahw.com\/wp\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Microsoft ha puesto a disposici\u00c3\u00b3n de sus usuarios una herramienta administrativa que a buen seguro agradecer\u00c3\u00a1 m\u00c3\u00a1s de un usuario o administrador de este tipo de plataformas. La herramienta se llama Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP, y la descripci\u00c3\u00b3n que da el fabricante es la siguiente: Esta herramienta facilita realizar un seguimiento [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[4,1],"tags":[],"class_list":["post-120","post","type-post","status-publish","format-standard","hentry","category-noticias","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP\",\"datePublished\":\"2007-03-29T01:18:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/\"},\"wordCount\":363,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Noticias\",\"Profesional\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2007-03-29T01:18:30+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP","datePublished":"2007-03-29T01:18:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/"},"wordCount":363,"commentCount":0,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Noticias","Profesional"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/","url":"https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Diagn\u00c3\u00b3stico de An\u00c3\u00a1lisis de Cambio para Windows XP","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2007-03-29T01:18:30+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/diagnostico-de-analisis-de-cambio-para-windows-xp\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/120","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=120"}],"version-history":[{"count":0,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/120\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=120"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=120"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=120"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}