
{"id":1908,"date":"2012-09-06T13:06:30","date_gmt":"2012-09-06T16:06:30","guid":{"rendered":"http:\/\/www.talsoft.com.ar\/?p=1908"},"modified":"2012-09-06T13:06:30","modified_gmt":"2012-09-06T16:06:30","slug":"evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/","title":{"rendered":"Evita que te rastreen en las redes sociales con estas herramientas"},"content":{"rendered":"<p>Facebook, Twitter o Google tienen la mayor\u00eda de tus datos y h\u00e1bitos de navegaci\u00f3n. Tambi\u00e9n existen cientos de empresas de cobro por publicidad que ser\u00edan beneficiadas haciendo seguimiento de lo que consumes y compartes en la red.<\/p>\n<p><strong>\u00bfC\u00f3mo evitarlo y asegurar tu privacidad?<\/strong><br \/>\nPuedes bloquear el acceso a tu contenido con estas aplicaciones:<\/p>\n<ol>\n<li><a href=\"http:\/\/www.abine.com\/dntdetail.php?\" rel=\"nofollow\" target=\"_blank\">Do Not Track Plus<\/a>: La herramienta permite bloquear Facebook y otros anunciantes en la red. Asimismo, te informa sobre los espacios que quieren obtener tus datos. Despu\u00e9s de instalarlo bloquear\u00e1 las redes. La extensi\u00f3n est\u00e1 en la p\u00e1gina principal, disponible para Chrome.<\/li>\n<li><a href=\"https:\/\/disconnect.me\/tools\" rel=\"nofollow\" target=\"_blank\">Disconnect<\/a>: Es otra buena opci\u00f3n para bloquear redes de forma espec\u00edfica. El sitio principal tiene extensiones para detener el seguimiento en la web de Facebook, Twitter y Google. Se incluye la app Collusion \u2014para\u00a0<a href=\"https:\/\/chrome.google.com\/webstore\/detail\/ganlifbpkcplnldliibcbegplfmcfigp\">Chrome<\/a>,\u00a0<a href=\"https:\/\/blog.disconnect.me\/collusion-for-safari\">Safari<\/a>\u00a0y\u00a0<a href=\"http:\/\/www.mozilla.org\/en-US\/collusion\/\">Mozilla<\/a>\u2014, que genera mapas con los sitios que intentan obtener informaci\u00f3n de tus movimientos en la red.<\/li>\n<li><a href=\"http:\/\/www.ghostery.com\/download\" rel=\"nofollow\" target=\"_blank\">Ghostery<\/a>: Es una herramienta con m\u00e1s opciones. Aparece en la barra de navegaci\u00f3n y muestra cu\u00e1ntas empresas se han bloqueado cuando est\u00e1s visitando una p\u00e1gina web. Ghostery da a conocer m\u00e1s sobre las empresas. Adem\u00e1s, identifica el tipo de datos que recogen.<\/li>\n<\/ol>\n<p>Fuente:\u00a0<a href=\"http:\/\/www.clasesdeperiodismo.com\/2012\/08\/30\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/\" rel=\"nofollow\" target=\"_blank\">Clases de periodismo<\/a><\/p>\n<p>Visto: <a href=\"http:\/\/blog.segu-info.com.ar\/\">Segu-Info<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Facebook, Twitter o Google tienen la mayor\u00eda de tus datos y h\u00e1bitos de navegaci\u00f3n. Tambi\u00e9n existen cientos de empresas de cobro por publicidad que ser\u00edan beneficiadas haciendo seguimiento de lo que consumes y compartes en la red. \u00bfC\u00f3mo evitarlo y asegurar tu privacidad? Puedes bloquear el acceso a tu contenido con estas aplicaciones: Do Not [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1908","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Evita que te rastreen en las redes sociales con estas herramientas<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Evita que te rastreen en las redes sociales con estas herramientas\",\"datePublished\":\"2012-09-06T16:06:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/\"},\"wordCount\":227,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Evita que te rastreen en las redes sociales con estas herramientas\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"datePublished\":\"2012-09-06T16:06:30+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Evita que te rastreen en las redes sociales con estas herramientas","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Evita que te rastreen en las redes sociales con estas herramientas","datePublished":"2012-09-06T16:06:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/"},"wordCount":227,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/","url":"https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Evita que te rastreen en las redes sociales con estas herramientas","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"datePublished":"2012-09-06T16:06:30+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/evita-que-te-rastreen-en-las-redes-sociales-con-estas-herramientas\/"]}]},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=1908"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1908\/revisions"}],"predecessor-version":[{"id":1910,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/1908\/revisions\/1910"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=1908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=1908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=1908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}