{"id":1711,"date":"2013-11-07T13:15:29","date_gmt":"2013-11-07T12:15:29","guid":{"rendered":"http:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?p=1711"},"modified":"2013-11-14T09:46:27","modified_gmt":"2013-11-14T08:46:27","slug":"como-construir-un-password-seguro","status":"publish","type":"post","link":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro","title":{"rendered":"C\u00f3mo construir un password seguro"},"content":{"rendered":"<p>A ra\u00edz de los \u00faltimos esc\u00e1ndalos relacionados con el espionaje, quiz\u00e1 nos debamos <img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-1712 alignleft\" title=\"seguridad-cables-inesem\" src=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-234x219-custom.jpg\" alt=\"\" width=\"234\" height=\"219\" \/>concienciar m\u00e1s en cuanto a la necesidad de incrementar nuestra seguridad en la red.<\/p>\n<p>Uno de los aspectos m\u00e1s importante a cuidar es el tema de las contrase\u00f1as. En un anterior post hac\u00eda referencia a contrase\u00f1as que no debemos usar (<a href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/que-contrase-as-usamos\/\" target=\"_blank\">ver mas<\/a>).<\/p>\n<p>Nos sorprende como hay usuarios que ponen una contrase\u00f1a como 1234, pero es as\u00ed (\u00bfquiz\u00e1 lo hemos hecho nosotros alguna vez?).<\/p>\n<p>Pues bien no solo los conjuntos de caracteres predecibles como 1234, se libran, seg\u00fan un informe de Google (<a href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/que-contrase-as-usamos\/\" target=\"_blank\">ver informe<\/a>) debemos seguir unas pautas a la hora de seleccionar nuestras contrase\u00f1as. Debemos evitar:<\/p>\n<ul>\n<li>Nombres de mascotas.<\/li>\n<li>Fechas de nuestras vidas: cumplea\u00f1os, bodas, etc.<\/li>\n<li>Nombre de familiares<\/li>\n<li>Ciudades con vinculaci\u00f3n personal.<\/li>\n<li>Aficiones<\/li>\n<\/ul>\n<p>As\u00ed pues para generar contrase\u00f1as seguras podr\u00edamos optar por usar generadores de contrase\u00f1as que no son m\u00e1s que aplicaciones que nos generan cadenas de caracteres aleatorios. El problema sin duda es que seguramente esas cadenas sean dif\u00edciles de recordar.<\/p>\n<p>Otra opci\u00f3n ser\u00e1 generar las contrase\u00f1as a partir de datos conocidos insertando determinados criterios que deben cumplir:<\/p>\n<ul>\n<li>Contrase\u00f1as con un tama\u00f1o m\u00ednimo.<\/li>\n<li>Combinar may\u00fasculas y min\u00fasculas, n\u00fameros y caracteres especiales (*,+,?,\u00bf, etc.)<\/li>\n<\/ul>\n<p>De ese modo si por ejemplo yo deseo poner como password mi nombre, podr\u00eda transformarlo del siguiente modo:<\/p>\n<blockquote><p>Partimos de mi nombre juan, debe de llegar a 10 caracteres. Le agrego un n\u00ba consecutivo y un caracter especial de la lista anterior, siempre siguiendo el mismo orden en que yo los he puesto en la lista (*,+,?,\u00bf), con el fin de que sea reproducible y en cuanto a las letras que encuentre pongo las impares en may\u00fasculas y las pares en min\u00fascula:<\/p>\n<p style=\"text-align: center;\"><strong>0*1+2?JuAn<\/strong><\/p>\n<p>El resultado entonces es una cadena como la anterior. Aunque en la pregunta de seguridad pusiese \u00abMi nombre\u00bb, dif\u00edcilmente alguien podr\u00eda llegar a esa cadena si no es conociendo mis normas al crear los password.<\/p>\n<p>Claro lo bueno es que es reproducible, con lo que a la hora de recordar la contrase\u00f1a no me ser\u00eda complicado.<\/p><\/blockquote>\n<p>A lo anterior podemos a\u00f1adirle que debemos cambiar las contrase\u00f1as peri\u00f3dicamente.<\/p>\n<p>Bueno esto es un ejemplo de un sistema que podr\u00edamos usar para crearnos contrase\u00f1as. Entre la t\u00edpica \u00ab<em><strong>1234<\/strong><\/em>\u00bb y \u00ab<strong><em>0*1+2?JuAn<\/em><\/strong>\u00bb hay un cierta diferencia, pong\u00e1moslo en pr\u00e1ctica.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>C\u00f3mo construir un password seguro<\/p>\n","protected":false},"author":70,"featured_media":1712,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"class_list":["post-1711","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-redes-sistemas-y-seguridad"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>C\u00f3mo construir un password seguro | Canal Nuevas Tecnolog\u00edas<\/title>\n<meta name=\"description\" content=\"C\u00f3mo construir un password seguro\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"C\u00f3mo construir un password seguro | Canal Nuevas Tecnolog\u00edas\" \/>\n<meta property=\"og:description\" content=\"C\u00f3mo construir un password seguro\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro\" \/>\n<meta property=\"og:site_name\" content=\"Canal Inform\u00e1tica y TICS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-07T12:15:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-11-14T08:46:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"281\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Juan Iruela\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@inesem\" \/>\n<meta name=\"twitter:site\" content=\"@inesem\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Juan Iruela\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro\"},\"author\":{\"name\":\"Juan Iruela\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df\"},\"headline\":\"C\u00f3mo construir un password seguro\",\"datePublished\":\"2013-11-07T12:15:29+00:00\",\"dateModified\":\"2013-11-14T08:46:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro\"},\"wordCount\":415,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg\",\"keywords\":[\"contrase\u00f1as seguras\",\"internet\",\"seguridad\",\"seguridad en Internet\",\"windows\"],\"articleSection\":[\"Redes, Sistemas y Seguridad\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro\",\"name\":\"C\u00f3mo construir un password seguro | Canal Nuevas Tecnolog\u00edas\",\"isPartOf\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg\",\"datePublished\":\"2013-11-07T12:15:29+00:00\",\"dateModified\":\"2013-11-14T08:46:27+00:00\",\"description\":\"C\u00f3mo construir un password seguro\",\"breadcrumb\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#primaryimage\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg\",\"width\":300,\"height\":281},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Redes, Sistemas y Seguridad\",\"item\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/redes-sistemas-y-seguridad\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"C\u00f3mo construir un password seguro\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"description\":\"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM\",\"publisher\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization\",\"name\":\"Canal Inform\u00e1tica y TICS\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"caption\":\"Canal Inform\u00e1tica y TICS\"},\"image\":{\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/InesemBusinessSchool\/\",\"https:\/\/x.com\/inesem\",\"http:\/\/www.linkedin.com\/company\/2370697\",\"https:\/\/www.youtube.com\/user\/inesembusinesschool\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df\",\"name\":\"Juan Iruela\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg\",\"contentUrl\":\"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg\",\"caption\":\"Juan Iruela\"},\"description\":\"Ingeniero T\u00e9cnico en Inform\u00e1tica por la Universidad de Granada. C.A.P. por la Universidad de Granada. Formador de Formadores y Formador de Formadores Especialidad Tele formaci\u00f3n. Microsoft Certified Solution Developer en Visual Studio .NET. Certificado en CISCO, Oracle y Linux. Profesor en el departamento de Nuevas tecnolog\u00edas de INESEM.\",\"url\":\"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-iruela\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"C\u00f3mo construir un password seguro | Canal Nuevas Tecnolog\u00edas","description":"C\u00f3mo construir un password seguro","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro","og_locale":"es_ES","og_type":"article","og_title":"C\u00f3mo construir un password seguro | Canal Nuevas Tecnolog\u00edas","og_description":"C\u00f3mo construir un password seguro","og_url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro","og_site_name":"Canal Inform\u00e1tica y TICS","article_publisher":"https:\/\/www.facebook.com\/InesemBusinessSchool\/","article_published_time":"2013-11-07T12:15:29+00:00","article_modified_time":"2013-11-14T08:46:27+00:00","og_image":[{"width":300,"height":281,"url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg","type":"image\/jpeg"}],"author":"Juan Iruela","twitter_card":"summary_large_image","twitter_creator":"@inesem","twitter_site":"@inesem","twitter_misc":{"Escrito por":"Juan Iruela","Tiempo de lectura":"2 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#article","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro"},"author":{"name":"Juan Iruela","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df"},"headline":"C\u00f3mo construir un password seguro","datePublished":"2013-11-07T12:15:29+00:00","dateModified":"2013-11-14T08:46:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro"},"wordCount":415,"commentCount":0,"publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg","keywords":["contrase\u00f1as seguras","internet","seguridad","seguridad en Internet","windows"],"articleSection":["Redes, Sistemas y Seguridad"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro","name":"C\u00f3mo construir un password seguro | Canal Nuevas Tecnolog\u00edas","isPartOf":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#primaryimage"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#primaryimage"},"thumbnailUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg","datePublished":"2013-11-07T12:15:29+00:00","dateModified":"2013-11-14T08:46:27+00:00","description":"C\u00f3mo construir un password seguro","breadcrumb":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#primaryimage","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem.jpg","width":300,"height":281},{"@type":"BreadcrumbList","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/como-construir-un-password-seguro#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/"},{"@type":"ListItem","position":2,"name":"Redes, Sistemas y Seguridad","item":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/categorias\/redes-sistemas-y-seguridad"},{"@type":"ListItem","position":3,"name":"C\u00f3mo construir un password seguro"}]},{"@type":"WebSite","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#website","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","name":"Canal Inform\u00e1tica y TICS","description":"Canal de Noticias gestionado por el Departamento Docente de Inform\u00e1tica y TICS de INESEM","publisher":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#organization","name":"Canal Inform\u00e1tica y TICS","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/","url":"","contentUrl":"","caption":"Canal Inform\u00e1tica y TICS"},"image":{"@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/InesemBusinessSchool\/","https:\/\/x.com\/inesem","http:\/\/www.linkedin.com\/company\/2370697","https:\/\/www.youtube.com\/user\/inesembusinesschool\/"]},{"@type":"Person","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/3e3c2ff598dcbfd18aef8da3a40b71df","name":"Juan Iruela","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/#\/schema\/person\/image\/","url":"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg","contentUrl":"https:\/\/www.inesem.es\/revistadigital\/comercio-hosteleria-turismo\/wp-content\/blogs.dir\/6\/files\/2013\/09\/Juan-Iruela_avatar.jpg","caption":"Juan Iruela"},"description":"Ingeniero T\u00e9cnico en Inform\u00e1tica por la Universidad de Granada. C.A.P. por la Universidad de Granada. Formador de Formadores y Formador de Formadores Especialidad Tele formaci\u00f3n. Microsoft Certified Solution Developer en Visual Studio .NET. Certificado en CISCO, Oracle y Linux. Profesor en el departamento de Nuevas tecnolog\u00edas de INESEM.","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/autores\/juan-iruela"}]}},"autor_name":{"name":"Juan Iruela"},"featured_image":{"attachment_meta":{"width":300,"height":281,"file":"2013\/11\/cables-inesem.jpg","sizes":{"thumbnail":{"file":"cables-inesem-345x180.jpg","width":345,"height":180,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-345x180.jpg"},"medium":{"file":"cables-inesem-175x164.jpg","width":175,"height":164,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-175x164.jpg"},"thumb-small":{"file":"cables-inesem-59x42.jpg","width":59,"height":42,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-59x42.jpg"},"thumb-standard":{"file":"cables-inesem-110x110.jpg","width":110,"height":110,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-110x110.jpg"},"thumb-medium":{"file":"cables-inesem-196x166.jpg","width":196,"height":166,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-196x166.jpg"},"thumb-large":{"file":"cables-inesem-283x190.jpg","width":283,"height":190,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-283x190.jpg"},"thumb-anteriores":{"file":"cables-inesem-230x163.jpg","width":230,"height":163,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-230x163.jpg"},"thumb-inverso":{"file":"cables-inesem-369x261.jpg","width":369,"height":261,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-369x261.jpg"},"thumb-cercano":{"file":"cables-inesem-650x200.jpg","width":650,"height":200,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-650x200.jpg"},"thumb-slider":{"file":"cables-inesem-574x430.jpg","width":574,"height":430,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-574x430.jpg"},"thumb-busqueda":{"file":"cables-inesem-580x375.jpg","width":580,"height":375,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-580x375.jpg"},"advps-thumb-one":{"file":"cables-inesem-600x220.jpg","width":600,"height":220,"mime_type":"image\/jpeg","url":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/files\/2013\/11\/cables-inesem-600x220.jpg"}},"image_meta":{"aperture":0,"credit":"","camera":"","caption":"","created_timestamp":0,"copyright":"","focal_length":0,"iso":0,"shutter_speed":0,"title":"","orientation":0,"keywords":[]}}},"_links":{"self":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/1711"}],"collection":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/users\/70"}],"replies":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/comments?post=1711"}],"version-history":[{"count":0,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/posts\/1711\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media\/1712"}],"wp:attachment":[{"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/media?parent=1711"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.inesem.es\/revistadigital\/informatica-y-tics\/wp-json\/wp\/v2\/categories?post=1711"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}