
{"id":595,"date":"2009-09-16T08:12:13","date_gmt":"2009-09-16T11:12:13","guid":{"rendered":"https:\/\/www.talsoft-security.com\/site\/?p=595"},"modified":"2009-09-16T08:12:13","modified_gmt":"2009-09-16T11:12:13","slug":"green-it","status":"publish","type":"post","link":"https:\/\/www.talsoft-security.com\/site\/green-it\/","title":{"rendered":"Green IT"},"content":{"rendered":"<div style=\"text-align: justify;\">Hace un tiempo escuchaba una charla muy interesante en un evento de tecnolog\u00eda muy importante en Centro Am\u00e9rica, en donde se mostraban ciertos aspectos tecnol\u00f3gicos que, de utilizarlos con un mayor nivel de eficiencia, ayudan a disminuir el impacto que estos provocan sobre el sistema ambiental. Esto se conoce bajo la nomenclatura de <span style=\"font-weight: bold;\">Green IT<\/span>, cuya traducci\u00f3n al espa\u00f1ol es <span style=\"font-weight: bold;\">Tecnolog\u00edas verdes<\/span> o <a style=\"color: #3333ff;\" href=\"http:\/\/es.wikipedia.org\/wiki\/Green_computing\">computaci\u00f3n verde<\/a>.<\/p>\n<p>Se trata b\u00e1sicamente de un concepto que busca definir un nivel de eficacia y eficiencia energ\u00e9tica adecuada buscando un equilibrio que permita minimizar el impacto negativo que hasta el momento provocan los recursos tecnol\u00f3gicos sobre el medio ambiente.<\/p>\n<p>La cuesti\u00f3n es que ciertos <span style=\"font-weight: bold;\">scareware<\/span> (<span style=\"font-weight: bold;\">rogue<\/span>) se han hecho eco de este concepto para lograr la atenci\u00f3n de quienes nos encontramos interesados en la problem\u00e1tica generada por los recursos tecnol\u00f3gicos sobre el medio ambiental, utilizando, como es habitual en este tipo de malware, las cl\u00e1sicas maniobras de enga\u00f1o que las caracterizan y que buscan una &#8220;<span style=\"font-style: italic;\">inversi\u00f3n&#8221;<\/span> por parte de los usuarios desprevenidos.<\/p>\n<p>Se trata de la propagaci\u00f3n de los scareware conocidos  como <span style=\"font-weight: bold;\">Green Antivirus<\/span> y <span style=\"font-weight: bold;\">Ecology Green PC<\/span>.<\/div>\n<div style=\"text-align: justify;\"><a href=\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s1600-h\/mipistus-greenav.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5381088439181469330\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 301px;\" src=\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s400\/mipistus-greenav.png\" border=\"0\" alt=\"\" \/><\/a>En el caso de <span style=\"font-weight: bold;\">Green AV<\/span>, y en raz\u00f3n del concepto que representa la computaci\u00f3n verde, una de las estrategias de enga\u00f1o que utiliza se basa en la promesa de &#8220;<span style=\"font-style: italic;\">donar<\/span>&#8221; USD 2 por cada venta para colaborar en la &#8220;salvaci\u00f3n&#8221; de los \u00e1rboles de la selva Amaz\u00f3nica, la selva tropical m\u00e1s grande del planeta.<\/p>\n<p><span style=\"font-style: italic;\">Pero tambi\u00e9n los propagadores de esta amenaza, poseen un fuerte argumento que relaciona la protecci\u00f3n del medio ambiente con el da\u00f1o provocado por c\u00f3digos maliciosos.<\/span><\/p>\n<p>Bajo la frase &#8220;<span style=\"font-style: italic;\">We thought that our application can guard not only your PC, but whole Earth &#8211; our home planet<\/span>.&#8221;, algo as\u00ed como que el producto ofrecido (GreenAV) no solo protege el equipo de malware sino tambi\u00e9n ayuda a proteger el planeta; la estrategia maliciosa canaliza su argumento en que las consecuencias provocadas por diferentes c\u00f3digos maliciosos (sobrecarga en el consumo de recursos) repercute en un mayor consumo energ\u00e9tico por parte de la PC, aumentando los residuos no reciclables y desprendiendo as\u00ed desechos t\u00f3xicos que perjudican el medio ambiental.<\/div>\n<div style=\"text-align: justify;\">Apoyando tambi\u00e9n este argumento en noticias reales como <a style=\"color: #3333ff;\" href=\"http:\/\/www.ecogeek.org\/content\/view\/788\/74\/\">http:\/\/www.ecogeek.org\/content\/view\/788\/74\/<\/a> y <a style=\"color: #3333ff;\" href=\"http:\/\/news.cnet.com\/8301-11128_3-10007998-54.html\">http:\/\/news.cnet.com\/8301-11128_3-10007998-54.html<\/a>.<\/div>\n<div style=\"text-align: justify;\">M\u00e1s all\u00e1 de lo verdadero del argumento, se trata de una estrategia que fundamenta de forma coherente la relaci\u00f3n entre el malware y el medio ambiente para atraer m\u00e1s usuario e incitarlos a la compra de esa &#8220;buena soluci\u00f3n de seguridad&#8221;.<\/p>\n<p>En la zona de pre-venta del sitio web, la estrategia fraudulenta se apoya a\u00fan m\u00e1s sobre la supuesta contribuci\u00f3n que hasta el momento se ha concretado, mostrando el valor donado. En nuestro ejemplo la suma es de <span style=\"font-style: italic;\">USD 23.965, 5005<\/span> sobre un valor real del <span style=\"text-decoration: line-through;\">malware<\/span> &#8220;soluci\u00f3n de seguridad antivirus ecol\u00f3gica&#8221; de casi <span style=\"font-style: italic;\">USD 100<\/span>, cuando un programa antivirus leg\u00edtimo y con reputaci\u00f3n posee un valor que ronda los <span style=\"font-style: italic;\">USD 50<\/span>.<\/div>\n<div style=\"text-align: justify;\"><a href=\"http:\/\/1.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13ouw7MUI\/AAAAAAAABvY\/tzGHqs2XB-M\/s1600-h\/mipistus-greenav-b.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5381088671409320258\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 301px;\" src=\"http:\/\/1.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13ouw7MUI\/AAAAAAAABvY\/tzGHqs2XB-M\/s400\/mipistus-greenav-b.png\" border=\"0\" alt=\"\" \/><\/a>Otro aspecto llamativo es el medio de pago que se emplea. Hace unos a\u00f1os, se utilizaba el mismo m\u00e9todo pero con p\u00e1ginas clonadas de los servicios que permiten realizar pagos en l\u00ednea, donde una de las recomendaciones m\u00e1s fuertes era verificar que la informaci\u00f3n depositada viaje segura (<span style=\"font-weight: bold;\">https<\/span>).<\/div>\n<div style=\"text-align: justify;\">Ahora, esto se realiza directamente empleando recursos v\u00e1lidos y leg\u00edtimos, donde la informaci\u00f3n fluye de forma cifrada (lo podemos observar en la siguiente imagen). En este caso, utilizando el servicio que ofrece la compa\u00f1\u00eda estadounidense <span style=\"font-style: italic;\">Plimus<\/span>, a trav\u00e9s de un formulario que autom\u00e1ticamente realiza la conversi\u00f3n de la moneda en funci\u00f3n del pa\u00eds desde el cual se acceda a la p\u00e1gina.<\/div>\n<div style=\"text-align: justify;\"><a href=\"http:\/\/1.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13vWfsHYI\/AAAAAAAABvg\/ZXgiZ7szw6w\/s1600-h\/mipistus-greenav-plimus.png\" onblur=\"try {parent.deselectBloggerImageGracefully();} catch(e) {}\"><img decoding=\"async\" id=\"BLOGGER_PHOTO_ID_5381088785153662338\" style=\"margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 400px; height: 301px;\" src=\"http:\/\/1.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13vWfsHYI\/AAAAAAAABvg\/ZXgiZ7szw6w\/s400\/mipistus-greenav-plimus.png\" border=\"0\" alt=\"\" \/><\/a>Estas cuestiones a nivel estrat\u00e9gico planteadas para la propagaci\u00f3n, en este caso, de scareware marca el nivel de profesionalismo y esfuerzo que depositan constantemente los desarrolladores maliciosos y dem\u00e1s personajes de este ambiente clandestino, como los spammers y botmasters, que se valen de maniobras similares de propagaci\u00f3n a trav\u00e9s, incluso, de <a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/06\/mirando-de-cerca-la-estructura-de.html\">botnets<\/a>.<\/p>\n<p>Es evidente tambi\u00e9n que cualquier noticia\/novedad\/tecnolog\u00eda olo que sea, es empleada de forma maliciosa enmascarada como benigna tras estrategias de <a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/01\/tecnicas-de-engano-que-no-pasan-de-moda.html\">Ingenier\u00eda Social<\/a>.<\/div>\n<p><a style=\"color: #3333ff;\" href=\"http:\/\/mipistus.blogspot.com\/2009\/05\/campana-de-propagacion-del-scareware.html\"><\/a># Jorge Mieres<\/p>\n<p>Fuente:Pistus Malware Blog<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hace un tiempo escuchaba una charla muy interesante en un evento de tecnolog\u00eda muy importante en Centro Am\u00e9rica, en donde se mostraban ciertos aspectos tecnol\u00f3gicos que, de utilizarlos con un mayor nivel de eficiencia, ayudan a disminuir el impacto que estos provocan sobre el sistema ambiental. Esto se conoce bajo la nomenclatura de Green IT, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-595","post","type-post","status-publish","format-standard","hentry","category-profesional"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>TalSoft - Seguridad Inform\u00e1tica Empresarial - Green IT<\/title>\n<meta name=\"description\" content=\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.talsoft-security.com\/site\/green-it\/\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leandro Ferrari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/green-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/green-it\/\"},\"author\":{\"name\":\"Leandro Ferrari\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\"},\"headline\":\"Green IT\",\"datePublished\":\"2009-09-16T11:12:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/green-it\/\"},\"wordCount\":743,\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/green-it\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s400\/mipistus-greenav.png\",\"articleSection\":[\"Profesional\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/green-it\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/green-it\/\",\"name\":\"TalSoft - Seguridad Inform\u00e1tica Empresarial - Green IT\",\"isPartOf\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/green-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/green-it\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s400\/mipistus-greenav.png\",\"datePublished\":\"2009-09-16T11:12:13+00:00\",\"description\":\"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.\",\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.talsoft-security.com\/site\/green-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/green-it\/#primaryimage\",\"url\":\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s400\/mipistus-greenav.png\",\"contentUrl\":\"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s400\/mipistus-greenav.png\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#website\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"name\":\"TalSoft TS - Services IT Security\",\"description\":\"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.\",\"publisher\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#organization\",\"name\":\"Talsoft TS\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"contentUrl\":\"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png\",\"width\":270,\"height\":125,\"caption\":\"Talsoft TS\"},\"image\":{\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"http:\/\/www.facebook.com\/talsoftsrl\",\"https:\/\/x.com\/talsoft\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8\",\"name\":\"Leandro Ferrari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g\",\"caption\":\"Leandro Ferrari\"},\"sameAs\":[\"http:\/\/www.talsoft.com.ar\",\"https:\/\/www.facebook.com\/talsoftsrl\/\",\"https:\/\/x.com\/avatar_leandro\"],\"url\":\"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Green IT","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.talsoft-security.com\/site\/green-it\/","twitter_misc":{"Written by":"Leandro Ferrari","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.talsoft-security.com\/site\/green-it\/#article","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/green-it\/"},"author":{"name":"Leandro Ferrari","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8"},"headline":"Green IT","datePublished":"2009-09-16T11:12:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/green-it\/"},"wordCount":743,"publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/green-it\/#primaryimage"},"thumbnailUrl":"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s400\/mipistus-greenav.png","articleSection":["Profesional"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.talsoft-security.com\/site\/green-it\/","url":"https:\/\/www.talsoft-security.com\/site\/green-it\/","name":"TalSoft - Seguridad Inform\u00e1tica Empresarial - Green IT","isPartOf":{"@id":"https:\/\/www.talsoft-security.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.talsoft-security.com\/site\/green-it\/#primaryimage"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/green-it\/#primaryimage"},"thumbnailUrl":"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s400\/mipistus-greenav.png","datePublished":"2009-09-16T11:12:13+00:00","description":"Talsoft transforma la visi\u00f3n de las empresas para que puedan proteger su informaci\u00f3n cr\u00edtica y confidencial frente ataques inform\u00e1ticos. Cons\u00faltenos sin cargo.","inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.talsoft-security.com\/site\/green-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/green-it\/#primaryimage","url":"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s400\/mipistus-greenav.png","contentUrl":"http:\/\/3.bp.blogspot.com\/_Ppq0fEGkHo4\/Sq13bNpfZpI\/AAAAAAAABvQ\/pqTLiqkx4BA\/s400\/mipistus-greenav.png"},{"@type":"WebSite","@id":"https:\/\/www.talsoft-security.com\/site\/#website","url":"https:\/\/www.talsoft-security.com\/site\/","name":"TalSoft TS - Services IT Security","description":"Talsoft is transforming awareness, control and decision-making power so that companies can protect their critical and confidential information from computer attacks.","publisher":{"@id":"https:\/\/www.talsoft-security.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.talsoft-security.com\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/www.talsoft-security.com\/site\/#organization","name":"Talsoft TS","url":"https:\/\/www.talsoft-security.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","contentUrl":"https:\/\/www.talsoft-security.com\/site\/wp-content\/uploads\/2014\/02\/talsoft_logo_270x125.png","width":270,"height":125,"caption":"Talsoft TS"},"image":{"@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["http:\/\/www.facebook.com\/talsoftsrl","https:\/\/x.com\/talsoft"]},{"@type":"Person","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/83d2ebde035a5a030c14e522351953c8","name":"Leandro Ferrari","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.talsoft-security.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cd259c10675b9fd302b2e6264231febeeeb3de578400cf8c91c6577e50a0d34a?s=96&d=mm&r=g","caption":"Leandro Ferrari"},"sameAs":["http:\/\/www.talsoft.com.ar","https:\/\/www.facebook.com\/talsoftsrl\/","https:\/\/x.com\/avatar_leandro"],"url":"https:\/\/www.talsoft-security.com\/site\/author\/leandro\/"}]}},"_links":{"self":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/comments?post=595"}],"version-history":[{"count":1,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/595\/revisions"}],"predecessor-version":[{"id":596,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/posts\/595\/revisions\/596"}],"wp:attachment":[{"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/media?parent=595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/categories?post=595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.talsoft-security.com\/site\/wp-json\/wp\/v2\/tags?post=595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}