{"id":1020,"date":"2020-04-09T20:49:58","date_gmt":"2020-04-09T20:49:58","guid":{"rendered":"http:\/\/34.227.63.65\/?p=1020"},"modified":"2020-04-09T20:49:58","modified_gmt":"2020-04-09T20:49:58","slug":"habilidades-que-los-hackers-deben-tener","status":"publish","type":"post","link":"http:\/\/34.227.63.65\/en\/informatic-security\/skills-that-hackers-must-have\/","title":{"rendered":"Skills hackers must have + Bonus"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"1020\" class=\"elementor elementor-1020\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-b032159 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b032159\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-af2bcae\" data-id=\"af2bcae\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-65e810f elementor-widget elementor-widget-text-editor\" data-id=\"65e810f\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"4118880087\"><\/ins>\nWe have all known stories where some hacker manages to enter deep into a network, or manages to collapse a web page, with an attack known as DoS Denial-of-service attack (Denial-of-service attack) but to do this, you must have certain prior knowledge in the life of a Hacker that you must learn to master,<strong> don't believe those \"with this book you will be a hacker from 0 to 100\" stories.<\/strong>I have seen many publications like this in social networks and no, it is not true, because it is not only the penetration phase that matters. You always need to have previous knowledge, to be able to become a great Hacker.\n<div align=\"center\"><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"4118880087\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div>\n<img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cdn.pixabay.com\/photo\/2017\/05\/10\/12\/41\/hacker-2300772_960_720.jpg\" alt=\"Hacker, Cybercrime, Internet, Security, Cybercrime\" width=\"550\" height=\"366\" \/>\n<h3><\/h3>\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"4118880087\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n<h3 style=\"text-align: center;\">The knowledge you need to enter this world are:<\/h3>\n<h3 style=\"text-align: center;\"><\/h3>\n<ol>\n \t<li><strong>Basic computer skills:<\/strong> Knowing how to install an operating system, build your own computer, fix your own problems, understand a little bit of computer science is what you need.<\/li>\n \t<li><strong>Programming<\/strong>Programming should be a weapon for any ethical hacker, generally in languages such as Python, Ruby or a database language such as SQL, HTML tag language and CSS.<\/li>\n \t<li><strong>Networks<\/strong>:\n You may not understand programming well, but without knowing about networks, you will never be a good hacker, I inform you that networks are fundamental in these practices, ipv4, ipv6, Backbone, protocols.... \n<div align=\"center\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\n<ins class=\"adsbygoogle\"\n     style=\"display:block; text-align:center;\"\n     data-ad-layout=\"in-article\"\n     data-ad-format=\"fluid\"\n     data-ad-client=\"ca-pub-3431304476422572\"\n     data-ad-slot=\"4118880087\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n<\/div><\/li>\n \t<li><strong>Other language:<\/strong> In general English, if you speak native English, learn another extended language in technology like Russian, Japanese or Mandarin Chinese, did you know that according to statista 52,3% of the internet is in English?  Besides this almost all the Software is in English, that's the point I'm going, the great amount of knowledge that awaits you learning English, for a hacker is indispensable for that reason.<\/li>\n \t<li><strong>Linux:<\/strong> This point is not indispensable, but Linux has almost all the hacking tools that Windows still lacks, so learning to use Linux makes it easier for you to become a hacker because of all the software it has, although not everyone who uses Linux is a hacker... Don't confuse it.<\/li>\n \t<li><strong>Virtualization:<\/strong> This point is important because for example Metasploit Table, a Linux distribution exclusively created to be attacked, has many vulnerabilities, if you learn to virtualize and build your own hacking lab, you will learn new ways to exploit vulnerabilities in a system. \n<div align=\"center\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\n<ins class=\"adsbygoogle\"\n     style=\"display:block; text-align:center;\"\n     data-ad-layout=\"in-article\"\n     data-ad-format=\"fluid\"\n     data-ad-client=\"ca-pub-3431304476422572\"\n     data-ad-slot=\"4118880087\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n<\/div><\/li>\n \t<li><strong>Curiosity:<\/strong> A hacker always wants to learn new things, wants to get into the world more and more and understand it, you must always be hungry for knowledge, to be able to grow, because hackers of 2005, doubtfully can use the same practices from then to today, they must always be updated.<\/li>\n<\/ol>\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"4118880087\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script>\n<h2 style=\"text-align: center;\">BONUS:<\/h2>\n<div align=\"center\"><script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js\"><\/script>\n<ins class=\"adsbygoogle\" style=\"display: block; text-align: center;\" data-ad-layout=\"in-article\" data-ad-format=\"fluid\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"4118880087\"><\/ins>\n<script>\n     (adsbygoogle = window.adsbygoogle || []).push({});\n<\/script><\/div>\n<strong>Social Engineering<\/strong>: A skill of every hacker is to know how to use social engineering, I wanted to leave it as a bonus, because few have this skill, to be able to trick people to do what you want them to do, that is the best hacking skill and that is usually how you hack. understanding neurolinguistic programming.\n\nThank you very much for reading.\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Todos hemos conocido historias donde alg\u00fan hacker logra entrar a lo profundo de una red, o logra colapsar alguna p\u00e1gina web, con un ataque conocido como DoS Denial-of-service attack (Ataque de denegaci\u00f3n de servicio) pero para hacer esto, se debe tener ciertos conocimientos previos en la vida de un Hacker que debes aprender a dominar, [&hellip;]<\/p>","protected":false},"author":2,"featured_media":1024,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-1020","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-informatica"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Habilidades que los hackers deben tener + Bonus - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/34.227.63.65\/en\/informatic-security\/skills-that-hackers-must-have\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Habilidades que los hackers deben tener + Bonus - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"og:description\" content=\"Todos hemos conocido historias donde alg\u00fan hacker logra entrar a lo profundo de una red, o logra colapsar alguna p\u00e1gina web, con un ataque conocido como DoS Denial-of-service attack (Ataque de denegaci\u00f3n de servicio) pero para hacer esto, se debe tener ciertos conocimientos previos en la vida de un Hacker que debes aprender a dominar, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/34.227.63.65\/en\/informatic-security\/skills-that-hackers-must-have\/\" \/>\n<meta property=\"og:site_name\" content=\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-09T20:49:58+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"filetechn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"filetechn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/\"},\"author\":{\"name\":\"filetechn\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b\"},\"headline\":\"Habilidades que los hackers deben tener + Bonus\",\"datePublished\":\"2020-04-09T20:49:58+00:00\",\"dateModified\":\"2020-04-09T20:49:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/\"},\"wordCount\":512,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg\",\"articleSection\":[\"Seguridad inform\u00e1tica\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/\",\"url\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/\",\"name\":\"Habilidades que los hackers deben tener + Bonus - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg\",\"datePublished\":\"2020-04-09T20:49:58+00:00\",\"dateModified\":\"2020-04-09T20:49:58+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#primaryimage\",\"url\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg\",\"contentUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg\",\"width\":640,\"height\":426},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/34.227.63.65\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Habilidades que los hackers deben tener + Bonus\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/34.227.63.65\/#website\",\"url\":\"http:\/\/34.227.63.65\/\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"description\":\"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress\",\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/34.227.63.65\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/34.227.63.65\/#organization\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"url\":\"http:\/\/34.227.63.65\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"contentUrl\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"width\":512,\"height\":512,\"caption\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b\",\"name\":\"filetechn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g\",\"caption\":\"filetechn\"},\"url\":\"http:\/\/34.227.63.65\/en\/author\/filetechn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Habilidades que los hackers deben tener + Bonus - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/34.227.63.65\/en\/informatic-security\/skills-that-hackers-must-have\/","og_locale":"en_US","og_type":"article","og_title":"Habilidades que los hackers deben tener + Bonus - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","og_description":"Todos hemos conocido historias donde alg\u00fan hacker logra entrar a lo profundo de una red, o logra colapsar alguna p\u00e1gina web, con un ataque conocido como DoS Denial-of-service attack (Ataque de denegaci\u00f3n de servicio) pero para hacer esto, se debe tener ciertos conocimientos previos en la vida de un Hacker que debes aprender a dominar, [&hellip;]","og_url":"http:\/\/34.227.63.65\/en\/informatic-security\/skills-that-hackers-must-have\/","og_site_name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","article_published_time":"2020-04-09T20:49:58+00:00","og_image":[{"width":640,"height":426,"url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg","type":"image\/jpeg"}],"author":"filetechn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"filetechn","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#article","isPartOf":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/"},"author":{"name":"filetechn","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b"},"headline":"Habilidades que los hackers deben tener + Bonus","datePublished":"2020-04-09T20:49:58+00:00","dateModified":"2020-04-09T20:49:58+00:00","mainEntityOfPage":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/"},"wordCount":512,"commentCount":0,"publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"image":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg","articleSection":["Seguridad inform\u00e1tica"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/","url":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/","name":"Habilidades que los hackers deben tener + Bonus - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","isPartOf":{"@id":"http:\/\/34.227.63.65\/#website"},"primaryImageOfPage":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#primaryimage"},"image":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg","datePublished":"2020-04-09T20:49:58+00:00","dateModified":"2020-04-09T20:49:58+00:00","breadcrumb":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#primaryimage","url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg","contentUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/04\/habilidades-hacking-filetech.jpg","width":640,"height":426},{"@type":"BreadcrumbList","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/habilidades-que-los-hackers-deben-tener\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/34.227.63.65\/"},{"@type":"ListItem","position":2,"name":"Habilidades que los hackers deben tener + Bonus"}]},{"@type":"WebSite","@id":"http:\/\/34.227.63.65\/#website","url":"http:\/\/34.227.63.65\/","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","description":"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress","publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/34.227.63.65\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/34.227.63.65\/#organization","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","url":"http:\/\/34.227.63.65\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/","url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","contentUrl":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","width":512,"height":512,"caption":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda"},"image":{"@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b","name":"filetechn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/image\/","url":"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g","contentUrl":"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g","caption":"filetechn"},"url":"http:\/\/34.227.63.65\/en\/author\/filetechn\/"}]}},"_links":{"self":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/1020"}],"collection":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/comments?post=1020"}],"version-history":[{"count":0,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/1020\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media\/1024"}],"wp:attachment":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media?parent=1020"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/categories?post=1020"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/tags?post=1020"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}