{"id":970,"date":"2020-03-18T20:23:48","date_gmt":"2020-03-18T20:23:48","guid":{"rendered":"http:\/\/34.227.63.65\/?p=970"},"modified":"2020-03-18T20:23:48","modified_gmt":"2020-03-18T20:23:48","slug":"herramientas-de-hackeo-fisico-que-muchos-hackers-usan","status":"publish","type":"post","link":"http:\/\/34.227.63.65\/en\/informatic-security\/physical-hacking-tools-that-many-hackers-use\/","title":{"rendered":"Physical hacking tools used by many hackers"},"content":{"rendered":"<p><ins style=\"display: block; text-align: center;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-format=\"fluid\" data-ad-layout=\"in-article\" data-ad-slot=\"4118880087\"><\/ins><br \/><strong>Physical hacking tools are superior to logical ones because they allow you to hack locally into<\/strong><strong> a<\/strong> <strong>server<\/strong>The attackers can even allow us to enter a restricted area to which we do not have access, unlike the logical tools we normally use on our own machine, either connected to the network where we are going to carry out the attack or from another network.<\/p>\n<p><!-- Anuncio movil --><br \/><ins style=\"display: inline-block; width: 320px; height: 100px;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"1785372542\"><\/ins><br \/>\u00a0<\/p>\n<p>Before we start I want to say that this post is not for the purpose of malicious acts, or for the purpose of doing harm against the integrity of a company or person, this post is for educational purposes and we simply want to show how hackers can use tools to achieve their goals, even ethical hackers use them for their own testing. <strong>Remember, no malicious purposes.\u00a0<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/34.227.63.65\/en\/5-herramientas-que-todo-hacker-deberia-dominar\/\">You have already seen 5 logical tools that every hacker should be able to master CLICKEA<\/a><\/p>\n<p><a href=\"http:\/\/34.227.63.65\/en\/5-herramientas-que-todo-hacker-deberia-dominar\/\"><img decoding=\"async\" src=\"http:\/\/98.81.225.148\/wp-content\/uploads\/2020\/01\/5-herramientas-hacking-para-dominar-2.jpg\" alt=\"\" width=\"198\" height=\"160\" \/><\/a><\/p>\n<h3 style=\"text-align: center;\"><!-- Encabezado de pagina --><br \/><ins style=\"display: block;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"9524261761\" data-ad-format=\"auto\" data-full-width-responsive=\"true\"><\/ins><br \/><\/h3>\n<h3 style=\"text-align: center;\">Here are the Physical Hacking Tools\u00a0<\/h3>\n<h3 style=\"text-align: center;\">1. Lock Picking<\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/8\/88\/Lockpicking_Tools.jpg\" alt=\"Image result of LOCK PICK\" \/><\/p>\n<p><strong>The art of lock picking<\/strong> The tools to do this practice is practically to open padlocks or doors without the original key. Unlike computer hacking, this hacking you can feel how you break \"the encryption\" of each lock, for that reason hackers are very attracted to this practice. This practice is the worst when the person who use it, use it for malicious purposes, usually use it to commit a crime, but if you learn it for pleasure is a good practice and is even entertaining.<\/p>\n<p><!-- Encabezado de pagina --><br \/><ins style=\"display: block;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"9524261761\" data-ad-format=\"auto\" data-full-width-responsive=\"true\"><\/ins><\/p>\n<h3 style=\"text-align: center;\">2. USB Rubber Ducky\u00a0<\/h3>\n<h3 style=\"text-align: center;\"><img decoding=\"async\" src=\"https:\/\/publicdomainvectors.org\/photos\/USB_Thumb_Drive_4.png\" alt=\"USB thumb drive 4 vector image\" width=\"211\" height=\"161\" \/><\/h3>\n<p>A USB Rubber Ducky in simple view may look like an ordinary flash drive, a Rubber Ducky can be assembled at home, when you connect it to the computer is where the change to a conventional flash drive begins, <strong>A Rubber Ducky comes with a very small CPU when a computer is connected it starts writing to the computer in an automated way,<\/strong> to launch some software, malicious tools so that the victim's computer can be under its control. The PC can recognize it as a keyboard and can do powershell attacks.<\/p>\n<p><!-- Encabezado de pagina --><br \/><ins style=\"display: block;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"9524261761\" data-ad-format=\"auto\" data-full-width-responsive=\"true\"><\/ins><\/p>\n<h3 style=\"text-align: center;\">3. Wi-Fi Pineapple<\/h3>\n<p><img fetchpriority=\"high\" decoding=\"async\" src=\"https:\/\/2.bp.blogspot.com\/-G0kVQZqWPB4\/WvyOXnQuW4I\/AAAAAAAAC-g\/HHxaAq7WKHYXn1hq-EiIKf57i5vHqMZugCLcBGAs\/s640\/img_1073-custom.jpg\" width=\"435\" height=\"290\" \/><\/p>\n<p>The PineApple wi-fi is to use it as a malicious Wi-Fi so to speak, hackers use it in shopping malls and monitor all users, allows DNS Spoofing attacks, review pages that we browse, perform Man In the Middle attacks and many types of attacks more.<\/p>\n<p><!-- Encabezado de pagina --><br \/><ins style=\"display: block;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-slot=\"9524261761\" data-ad-format=\"auto\" data-full-width-responsive=\"true\"><\/ins><\/p>\n<h3 style=\"text-align: center;\">4. Rasberry Pi<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/f\/f1\/Raspberry_Pi_4_Model_B_-_Side.jpg\" alt=\"Resultado de imagen de Raspberry pi\" width=\"353\" height=\"207\" \/><\/p>\n<p><strong>A Rasberry pi is a whole super small computer<\/strong> We can install any operating system on it, but it also has its own operating system Raspbian, which is a Linux distribution, its small size, can go unnoticed by the public and appears as another computer on any network without problems, so hackers now prefer to make instructions on the Rasberry Pi and connect them without anyone understanding that I use a computer. Also in the series Mr.Robot a series of computer security in a chapter appears a Rasberry Pi in the first chapters of the first season and prepare a zero day on it.\u00a0<\/p>\n<h2 style=\"text-align: center;\">BONUS<br \/><ins style=\"display: block; text-align: center;\" data-ad-client=\"ca-pub-3431304476422572\" data-ad-format=\"fluid\" data-ad-layout=\"in-article\" data-ad-slot=\"4118880087\"><\/ins><\/h2>\n<h3 style=\"text-align: center;\">Hardware keylogger\u00a0<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/upload.wikimedia.org\/wikipedia\/commons\/1\/1e\/USB_Hardware_Keylogger.jpg\" alt=\"Image result of hardware keylogger\" width=\"344\" height=\"308\" \/><\/p>\n<p>The current problem with Keyloggers is that the antivirus detects it easily, even recently I programmed a Keylogger in Python and my own operating system does not let me run it, but these Hardware keyloggers are very difficult to detect, because they are connected between the computer and the USB of the keyboard.<\/p>\n<p>A keylogger can save all keystrokes, it can save our passwords and the most sophisticated keyloggers can even record the screen, take screenshots and send them via email.\u00a0<\/p>","protected":false},"excerpt":{"rendered":"<p>Las herramientas de hackeo f\u00edsico van por encima de las l\u00f3gicas porque te permiten introducirte localmente a un servidor, a una m\u00e1quina de una v\u00edctima, o a una red incluso nos permiten ingresar a una zona restringida a la que no tenemos acceso, a diferencia de las herramientas l\u00f3gicas que normalmente usamos en nuestra propia [&hellip;]<\/p>","protected":false},"author":2,"featured_media":974,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-970","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-informatica"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Herramientas de hackeo f\u00edsico que muchos hackers usan - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/34.227.63.65\/en\/informatic-security\/physical-hacking-tools-that-many-hackers-use\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Herramientas de hackeo f\u00edsico que muchos hackers usan - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"og:description\" content=\"Las herramientas de hackeo f\u00edsico van por encima de las l\u00f3gicas porque te permiten introducirte localmente a un servidor, a una m\u00e1quina de una v\u00edctima, o a una red incluso nos permiten ingresar a una zona restringida a la que no tenemos acceso, a diferencia de las herramientas l\u00f3gicas que normalmente usamos en nuestra propia [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/34.227.63.65\/en\/informatic-security\/physical-hacking-tools-that-many-hackers-use\/\" \/>\n<meta property=\"og:site_name\" content=\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-18T20:23:48+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"760\" \/>\n\t<meta property=\"og:image:height\" content=\"531\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"filetechn\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"filetechn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#article\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/\"},\"author\":{\"name\":\"filetechn\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b\"},\"headline\":\"Herramientas de hackeo f\u00edsico que muchos hackers usan\",\"datePublished\":\"2020-03-18T20:23:48+00:00\",\"dateModified\":\"2020-03-18T20:23:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/\"},\"wordCount\":638,\"commentCount\":0,\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg\",\"articleSection\":[\"Seguridad inform\u00e1tica\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/\",\"url\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/\",\"name\":\"Herramientas de hackeo f\u00edsico que muchos hackers usan - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"isPartOf\":{\"@id\":\"http:\/\/34.227.63.65\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg\",\"datePublished\":\"2020-03-18T20:23:48+00:00\",\"dateModified\":\"2020-03-18T20:23:48+00:00\",\"breadcrumb\":{\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#primaryimage\",\"url\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg\",\"contentUrl\":\"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg\",\"width\":760,\"height\":531},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/34.227.63.65\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Herramientas de hackeo f\u00edsico que muchos hackers usan\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/34.227.63.65\/#website\",\"url\":\"http:\/\/34.227.63.65\/\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"description\":\"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress\",\"publisher\":{\"@id\":\"http:\/\/34.227.63.65\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/34.227.63.65\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"http:\/\/34.227.63.65\/#organization\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"url\":\"http:\/\/34.227.63.65\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"contentUrl\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"width\":512,\"height\":512,\"caption\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\"},\"image\":{\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b\",\"name\":\"filetechn\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/34.227.63.65\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g\",\"caption\":\"filetechn\"},\"url\":\"http:\/\/34.227.63.65\/en\/author\/filetechn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Herramientas de hackeo f\u00edsico que muchos hackers usan - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/34.227.63.65\/en\/informatic-security\/physical-hacking-tools-that-many-hackers-use\/","og_locale":"en_US","og_type":"article","og_title":"Herramientas de hackeo f\u00edsico que muchos hackers usan - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","og_description":"Las herramientas de hackeo f\u00edsico van por encima de las l\u00f3gicas porque te permiten introducirte localmente a un servidor, a una m\u00e1quina de una v\u00edctima, o a una red incluso nos permiten ingresar a una zona restringida a la que no tenemos acceso, a diferencia de las herramientas l\u00f3gicas que normalmente usamos en nuestra propia [&hellip;]","og_url":"http:\/\/34.227.63.65\/en\/informatic-security\/physical-hacking-tools-that-many-hackers-use\/","og_site_name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","article_published_time":"2020-03-18T20:23:48+00:00","og_image":[{"width":760,"height":531,"url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg","type":"image\/jpeg"}],"author":"filetechn","twitter_card":"summary_large_image","twitter_misc":{"Written by":"filetechn","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#article","isPartOf":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/"},"author":{"name":"filetechn","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b"},"headline":"Herramientas de hackeo f\u00edsico que muchos hackers usan","datePublished":"2020-03-18T20:23:48+00:00","dateModified":"2020-03-18T20:23:48+00:00","mainEntityOfPage":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/"},"wordCount":638,"commentCount":0,"publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"image":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg","articleSection":["Seguridad inform\u00e1tica"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#respond"]}]},{"@type":"WebPage","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/","url":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/","name":"Herramientas de hackeo f\u00edsico que muchos hackers usan - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","isPartOf":{"@id":"http:\/\/34.227.63.65\/#website"},"primaryImageOfPage":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#primaryimage"},"image":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#primaryimage"},"thumbnailUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg","datePublished":"2020-03-18T20:23:48+00:00","dateModified":"2020-03-18T20:23:48+00:00","breadcrumb":{"@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#primaryimage","url":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg","contentUrl":"http:\/\/34.227.63.65\/wp-content\/uploads\/2020\/03\/Herramientas-de-hackeo-fisico.jpg","width":760,"height":531},{"@type":"BreadcrumbList","@id":"http:\/\/34.227.63.65\/seguridad-informatica\/herramientas-de-hackeo-fisico-que-muchos-hackers-usan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/34.227.63.65\/"},{"@type":"ListItem","position":2,"name":"Herramientas de hackeo f\u00edsico que muchos hackers usan"}]},{"@type":"WebSite","@id":"http:\/\/34.227.63.65\/#website","url":"http:\/\/34.227.63.65\/","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","description":"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress","publisher":{"@id":"http:\/\/34.227.63.65\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/34.227.63.65\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"http:\/\/34.227.63.65\/#organization","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","url":"http:\/\/34.227.63.65\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/","url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","contentUrl":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","width":512,"height":512,"caption":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda"},"image":{"@id":"http:\/\/34.227.63.65\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/0bd69a1cc53562d2a69b03fac859a55b","name":"filetechn","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/34.227.63.65\/#\/schema\/person\/image\/","url":"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g","contentUrl":"http:\/\/2.gravatar.com\/avatar\/ba7172296fdc6c99a739fb82b6c8fd88?s=96&d=mm&r=g","caption":"filetechn"},"url":"http:\/\/34.227.63.65\/en\/author\/filetechn\/"}]}},"_links":{"self":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/970"}],"collection":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/comments?post=970"}],"version-history":[{"count":0,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/posts\/970\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media\/974"}],"wp:attachment":[{"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/media?parent=970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/categories?post=970"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/34.227.63.65\/en\/wp-json\/wp\/v2\/tags?post=970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}