{"id":90,"date":"2016-05-10T18:31:30","date_gmt":"2016-05-10T18:31:30","guid":{"rendered":"http:\/\/www.stealthtelecom.net\/stealth_v2\/?page_id=90"},"modified":"2019-07-25T21:49:58","modified_gmt":"2019-07-25T21:49:58","slug":"seguridad-en-internet","status":"publish","type":"page","link":"http:\/\/www.stealthtelecom.net\/stealth_v2\/normas\/seguridad-en-internet\/","title":{"rendered":"Seguridad en Internet"},"content":{"rendered":"<div style=\"text-align: justify;\" data-canvas-width=\"171.94536665994752\">Stealth Telecom del Ecuador S.A. como parte de su responsabilidad con los usuarios pone a su consideraci\u00f3n recomendaciones para un uso seguro de los servicios de Internet y transmisi\u00f3n de datos.<\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"171.94536665994752\"><\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"171.94536665994752\"><\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"6.991377208896055\"><strong>C\u00f3digo malicioso:<\/strong><\/div>\n<div style=\"text-align: justify;\" data-canvas-width=\"259.55697964120134\">El c\u00f3digo malicioso o malware es software dise\u00f1ado para infiltrarse en una computadora sin el conocimiento de su due\u00f1o, con el fin de robar, da\u00f1ar o eliminar el software y la informaci\u00f3n almacenada, o aprovechar los recursos de la misma para efectuar otras acciones maliciosas.<\/div>\n<div data-canvas-width=\"156.03847208224147\"><\/div>\n<div data-canvas-width=\"156.03847208224147\"><\/div>\n<div data-canvas-width=\"156.03847208224147\">Software esp\u00eda o spyware&#8230;.. <a href=\"http:\/\/www.stealthtelecom.net\/recomendaciones.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">Seguir leyendo<\/a><\/div>\n<div data-canvas-width=\"6.991377208896055\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Stealth Telecom del Ecuador S.A. como parte de su responsabilidad con los usuarios pone a su consideraci\u00f3n recomendaciones para un uso seguro de los servicios de Internet y transmisi\u00f3n de datos. C\u00f3digo malicioso: El c\u00f3digo malicioso o malware es software dise\u00f1ado para infiltrarse en una computadora sin el conocimiento de su due\u00f1o, con el fin<a href=\"http:\/\/www.stealthtelecom.net\/stealth_v2\/normas\/seguridad-en-internet\/\">[&#8230;]<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":73,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"template-fullwidth.php","meta":[],"_links":{"self":[{"href":"http:\/\/www.stealthtelecom.net\/stealth_v2\/wp-json\/wp\/v2\/pages\/90"}],"collection":[{"href":"http:\/\/www.stealthtelecom.net\/stealth_v2\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/www.stealthtelecom.net\/stealth_v2\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/www.stealthtelecom.net\/stealth_v2\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/www.stealthtelecom.net\/stealth_v2\/wp-json\/wp\/v2\/comments?post=90"}],"version-history":[{"count":4,"href":"http:\/\/www.stealthtelecom.net\/stealth_v2\/wp-json\/wp\/v2\/pages\/90\/revisions"}],"predecessor-version":[{"id":171,"href":"http:\/\/www.stealthtelecom.net\/stealth_v2\/wp-json\/wp\/v2\/pages\/90\/revisions\/171"}],"up":[{"embeddable":true,"href":"http:\/\/www.stealthtelecom.net\/stealth_v2\/wp-json\/wp\/v2\/pages\/73"}],"wp:attachment":[{"href":"http:\/\/www.stealthtelecom.net\/stealth_v2\/wp-json\/wp\/v2\/media?parent=90"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}