{"version":"1.0","provider_name":"FileTech Digital Entrepreneurship, Tutorials &amp; Technology","provider_url":"https:\/\/www.filetechn.com\/en","title":"\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"RhcKVJJW3F\"><a href=\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-dictionary-attack-in-computing\/\">What is a dictionary attack in computer science?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.filetechn.com\/en\/technology\/what-is-a-dictionary-attack-in-computing\/embed\/#?secret=RhcKVJJW3F\" width=\"600\" height=\"338\" title=\"&#8220;\u00bfQu\u00e9 es un ataque de diccionario en la inform\u00e1tica?&#8221; &#8212; FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" data-secret=\"RhcKVJJW3F\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>","thumbnail_url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2019\/04\/6cd45-mtyourmind-10001mb-com.png","thumbnail_width":500,"thumbnail_height":300,"description":"\u00bfQu\u00e9 es? Un ataque de diccionario en la inform\u00e1tica y computaci\u00f3n es aquel que un atacante trata de ingresar a nuestras credenciales, ya sea redes sociales, alguna p\u00e1gina web usando todas las palabras posibles del diccionario, si t\u00fa eres lo que usa como contrase\u00f1a \u00abcasa123\u00bb estas entre las posibles victimas que el victimario pueda acceder. [&hellip;]"}