{"id":89,"date":"2019-03-31T20:36:00","date_gmt":"2019-03-31T20:36:00","guid":{"rendered":"http:\/\/54.157.48.44\/2019\/03\/31\/que-es-un-keylogger\/"},"modified":"2019-03-31T20:36:00","modified_gmt":"2019-03-31T20:36:00","slug":"que-es-un-keylogger","status":"publish","type":"post","link":"http:\/\/34.227.63.65\/en\/technology\/what-is-a-keylogger\/","title":{"rendered":"What is a Keylogger?"},"content":{"rendered":"<div style=\"clear: both; text-align: center;\"><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em;\">\n<div style=\"clear: both; text-align: center;\"><a href=\"http:\/\/98.81.225.148\/wp-content\/uploads\/2019\/03\/Captura-1.png\" style=\"margin-left: 1em; margin-right: 1em;\"><img fetchpriority=\"high\" decoding=\"async\" border=\"0\" data-original-height=\"528\" data-original-width=\"305\" height=\"640\" src=\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/03\/Captura-1-173x300.png\" width=\"370\" \/><\/a><\/div>\n<p><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>Keylogger<\/b>:<\/u>&nbsp;Un Keylogger es un tipo de malware o hardware que se usa para que capte las pulsaciones del teclado de la victima, sin el consentimiento del usuario, se usa para robar contrase\u00f1as ya que la contrase\u00f1a se ve en texto plano porque guarda <\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">todas las pulsaciones que se haga, esto es una actividad totalmente ilegal.&nbsp;<\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>TIPOS&nbsp; DE KEYLOGGER:&nbsp;<\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b>Keylogger con hardware<\/b><\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><br \/><\/u><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u>Adaptadores en linea que se adaptan a la configuraci\u00f3n del teclado:<\/u>&nbsp;Estos adaptadores se ponen en linea dentro del teclado y capta las pulsaciones del usuario y los env\u00edan por la red.&nbsp;<\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><br \/><\/u><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u>Dispositivos que se adaptan a los teclados , estan dentro de las teclas:<\/u>&nbsp;cada tecla esta monitoreada por este dispositivo y cuando se pulsa alguna tecla, autom\u00e1ticamente manda se\u00f1ales por la red<\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><br \/><\/u><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b>Keylogger con software&nbsp;<\/b><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b><br \/><\/b><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b><br \/><\/b><\/span><u>Basados en n\u00facleo del sistema operativo<\/u><br \/><u><br \/><\/u><u>M\u00e9todos creativos con programaci\u00f3n de alto nivel&nbsp;<\/u><\/p>\n<p><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>EJEMPLO DE KEYLOGGER:<\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>Keylogger free<\/b><\/u><\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Es capaz de registrar las pulsaciones de teclas, los datos del porta papeles y las direcciones del sitio.<\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>How to defend yourself?<\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">El metodo mas importante para defenderse de los keyloggers es usar tu propia maquina de computadora personal, no usar otras maquinas de Cybers o amigos, pueden contraer keyloggers que no detectes y pueden robar tus credenciales.&nbsp;<\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Instalar antivirus en tu maquina para que no se infecte de estos Keyloggers<\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">No instalar software ilegalmente.<\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: Arial, Helvetica, sans-serif;\">Opinions about this malware:<\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif;\"><br \/><\/span><span style=\"font-family: Arial, Helvetica, sans-serif;\">Es un malware que no da\u00f1a nuestro sistema operativo, ni nuestra maquina, pero esta contra la \u00e9tica y la privacidad del ser humano, ya que nos pueden encontrar nuestras credenciales, nuestras contrase\u00f1as privadas y con eso lograr chantajearnos para dar dinero real y vulnerar nuestra privacidad. Normalmente somos victimas de Keylogger con alguien conocido o cuando vamos a un Cyber y metemos nuestra contrase\u00f1a de nuestras redes sociales en alguna maquina, probablemente hay un Keylogger instalado en la computadora y autom\u00e1ticamente&nbsp;damos nuestra privacidad al victimario.<\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif;\"><br \/><\/span><span style=\"font-family: Arial, Helvetica, sans-serif;\">Lethality level of the virus: <b>Alta&nbsp;<\/b><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif;\"><br \/><\/span><span style=\"font-family: Arial, Helvetica, sans-serif;\">Scope of infected computers: <b>Alta<\/b><\/span><br \/><span style=\"font-family: Arial, Helvetica, sans-serif;\"><b><br \/><\/b><\/span><\/p>\n<div><\/div>\n<p><\/div>","protected":false},"excerpt":{"rendered":"<p>Keylogger:&nbsp;Un Keylogger es un tipo de malware o hardware que se usa para que capte las pulsaciones del teclado de la victima, sin el consentimiento del usuario, se usa para robar contrase\u00f1as ya que la contrase\u00f1a se ve en texto plano porque guarda todas las pulsaciones que se haga, esto es una actividad totalmente ilegal.&nbsp; [&hellip;]<\/p>","protected":false},"author":3,"featured_media":133,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-89","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfQu\u00e9 es un Keylogger? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es un Keylogger? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"og:description\" content=\"Keylogger:&nbsp;Un Keylogger es un tipo de malware o hardware que se usa para que capte las pulsaciones del teclado de la victima, sin el consentimiento del usuario, se usa para robar contrase\u00f1as ya que la contrase\u00f1a se ve en texto plano porque guarda todas las pulsaciones que se haga, esto es una actividad totalmente ilegal.&nbsp; [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/\" \/>\n<meta property=\"og:site_name\" content=\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-31T20:36:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2019\/03\/Captura-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"305\" \/>\n\t<meta property=\"og:image:height\" content=\"528\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Johan Astudillo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Johan Astudillo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/\"},\"author\":{\"name\":\"Johan Astudillo\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44\"},\"headline\":\"\u00bfQu\u00e9 es un Keylogger?\",\"datePublished\":\"2019-03-31T20:36:00+00:00\",\"dateModified\":\"2019-03-31T20:36:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/\"},\"wordCount\":351,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/03\/Captura-1.png\",\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/\",\"url\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/\",\"name\":\"\u00bfQu\u00e9 es un Keylogger? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/03\/Captura-1.png\",\"datePublished\":\"2019-03-31T20:36:00+00:00\",\"dateModified\":\"2019-03-31T20:36:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#primaryimage\",\"url\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/03\/Captura-1.png\",\"contentUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/03\/Captura-1.png\",\"width\":305,\"height\":528},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/34.227.63.65\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es un Keylogger?\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/34.227.63.65\/#website\",\"url\":\"http:\/\/34.227.63.65\/\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"description\":\"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress\",\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/34.227.63.65\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/34.227.63.65\/#organization\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"url\":\"http:\/\/34.227.63.65\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"contentUrl\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"width\":512,\"height\":512,\"caption\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44\",\"name\":\"Johan Astudillo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g\",\"caption\":\"Johan Astudillo\"},\"url\":\"http:\/\/34.227.63.65\/en\/author\/johan-astudillo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es un Keylogger? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/","og_locale":"en_US","og_type":"article","og_title":"\u00bfQu\u00e9 es un Keylogger? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","og_description":"Keylogger:&nbsp;Un Keylogger es un tipo de malware o hardware que se usa para que capte las pulsaciones del teclado de la victima, sin el consentimiento del usuario, se usa para robar contrase\u00f1as ya que la contrase\u00f1a se ve en texto plano porque guarda todas las pulsaciones que se haga, esto es una actividad totalmente ilegal.&nbsp; [&hellip;]","og_url":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/","og_site_name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","article_published_time":"2019-03-31T20:36:00+00:00","og_image":[{"width":305,"height":528,"url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2019\/03\/Captura-1.png","type":"image\/png"}],"author":"Johan Astudillo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Johan Astudillo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#article","isPartOf":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/"},"author":{"name":"Johan Astudillo","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44"},"headline":"\u00bfQu\u00e9 es un Keylogger?","datePublished":"2019-03-31T20:36:00+00:00","dateModified":"2019-03-31T20:36:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/"},"wordCount":351,"commentCount":0,"publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"image":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/03\/Captura-1.png","articleSection":["Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/","url":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/","name":"\u00bfQu\u00e9 es un Keylogger? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","isPartOf":{"@id":"http:\/\/34.227.63.65\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#primaryimage"},"image":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/03\/Captura-1.png","datePublished":"2019-03-31T20:36:00+00:00","dateModified":"2019-03-31T20:36:00+00:00","breadcrumb":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#primaryimage","url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/03\/Captura-1.png","contentUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2019\/03\/Captura-1.png","width":305,"height":528},{"@type":"BreadcrumbList","@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-keylogger\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/34.227.63.65\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es un Keylogger?"}]},{"@type":"WebSite","@id":"http:\/\/34.227.63.65\/#website","url":"http:\/\/34.227.63.65\/","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","description":"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress","publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/34.227.63.65\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/34.227.63.65\/#organization","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","url":"http:\/\/34.227.63.65\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/","url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","contentUrl":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","width":512,"height":512,"caption":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda"},"image":{"@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44","name":"Johan Astudillo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/image\/","url":"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g","contentUrl":"http:\/\/0.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g","caption":"Johan Astudillo"},"url":"http:\/\/34.227.63.65\/en\/author\/johan-astudillo\/"}]}},"_links":{"self":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/89"}],"collection":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/comments?post=89"}],"version-history":[{"count":0,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/89\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media\/133"}],"wp:attachment":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media?parent=89"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/categories?post=89"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/tags?post=89"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}