{"id":90,"date":"2019-03-31T20:18:00","date_gmt":"2019-03-31T20:18:00","guid":{"rendered":"http:\/\/54.157.48.44\/2019\/03\/31\/que-es-un-spyware\/"},"modified":"2019-03-31T20:18:00","modified_gmt":"2019-03-31T20:18:00","slug":"que-es-un-spyware","status":"publish","type":"post","link":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/","title":{"rendered":"What is Spyware?"},"content":{"rendered":"<div style=\"clear: both; text-align: center;\"><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em;\">\n<div style=\"clear: both; text-align: center;\"><a href=\"https:\/\/3.bp.blogspot.com\/-1v9_EluyoTI\/XKQPyb1LJYI\/AAAAAAAAARU\/BAxgY3OTKxsmcr7qAioxjVwRi68cezlXACEwYBhgL\/s1600\/Captura.PNG\" style=\"margin-left: 1em; margin-right: 1em;\"><img fetchpriority=\"high\" decoding=\"async\" border=\"0\" data-original-height=\"507\" data-original-width=\"337\" height=\"640\" src=\"https:\/\/3.bp.blogspot.com\/-1v9_EluyoTI\/XKQPyb1LJYI\/AAAAAAAAARU\/BAxgY3OTKxsmcr7qAioxjVwRi68cezlXACEwYBhgL\/s640\/Captura.PNG\" width=\"424\" \/><\/a><\/div>\n<div style=\"clear: both; text-align: center;\"><\/div>\n<p><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><!-- Encabezado de pagina --><ins      style=\"display:block\"      data-ad-client=\"ca-pub-3431304476422572\"      data-ad-slot=\"9524261761\"      data-ad-format=\"auto\"      data-full-width-responsive=\"true\"><\/ins><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>Spyware<\/b>:<\/u> Spyware is a type of malware that installs itself on the computer and without the owner's consent sends information to an external entity about everything that is collected on that machine. Spyware usually installs itself on an affected system using hardware components of the computer such as RAM and CPU.&nbsp; &nbsp;<\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>TYPES OF SPYWARE:&nbsp;<\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b><a href=\"http:\/\/34.227.63.65\/que-es-un-keylogger\/\">Keyloggers<\/a>.<\/b><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b><br \/><\/b><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b><a href=\"http:\/\/34.227.63.65\/que-es-un-adware\/\">Adware<\/a>.<\/b><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b><br \/><\/b><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b>Browser hijacking.<\/b><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>EXAMPLE OF SPYWARE:<\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b>CoolWebSearch: <\/b>controls the browser and therefore what the victimizer wants.<\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b><br \/><\/b><\/u><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><u><b>How to defend yourself?<\/b><\/u><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">To install Antivirus and Firewall is fundamental to defend this type of attack, or spyware the Spyware comes more related to ethical attack since it gives information of what we do to an internal damage of our machine.&nbsp;<\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Do not install pirated software, understanding that licensed applications are purchased and not cracked is an important part of avoiding the risk of Spyware.<\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Do not visit websites that we do not consent to that are not malicious, avoiding adult pages is fundamental in this method.&nbsp;<\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Keep our applications completely updated, having an old version means that there may be vulnerabilities and possible Spyware may be installed.&nbsp;<\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b><br \/><\/b><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b>Opinions about this malware:<\/b><\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">It is a malware that does not damage our machine, or our software, but it is against the human, it can be harmful to our privacy, as the Spyware makes a collection of our data, or what we do on our device and sends it to a remote location where we have no idea who is behind the computer, that is why we must be careful, when downloading files on the internet, usually the spyware is hidden in a trojan because the trojan is downloaded along with a file that is not supposed to be malicious, in itself the Spyware can be in the category of trojans.&nbsp;<\/span><\/p>\n<p><!-- Encabezado de pagina --><ins      style=\"display:block\"      data-ad-client=\"ca-pub-3431304476422572\"      data-ad-slot=\"9524261761\"      data-ad-format=\"auto\"      data-full-width-responsive=\"true\"><\/ins> <span style=\"font-family: &quot;arial&quot; , &#038;quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Lethality level of the virus:&nbsp;<b>Medium High<\/b><\/span><br \/><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\">Scope of infected computers:&nbsp;<b>Media<\/b><\/span><\/p>\n<div><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><b><br \/><\/b><\/span><\/div>\n<p><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><\/span><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<div style=\"margin-left: 1em; margin-right: 1em; text-align: justify;\"><span style=\"font-family: &quot;arial&quot; , &quot;helvetica&quot; , sans-serif;\"><br \/><\/span><\/div>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Spyware: es un tipo de malware que se instala en la computadora y sin consentimiento de su propietario env\u00eda informaci\u00f3n a una entidad externa de todo lo que se recopile en dicha maquina. Lo usual es que el Spyware se auto instale en un sistema afectado utilizando componentes de hardware del equipo como lo son [&hellip;]<\/p>","protected":false},"author":3,"featured_media":135,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[7],"tags":[],"class_list":["post-90","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tecnologia"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>\u00bfQu\u00e9 es un Spyware? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"\u00bfQu\u00e9 es un Spyware? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"og:description\" content=\"Spyware: es un tipo de malware que se instala en la computadora y sin consentimiento de su propietario env\u00eda informaci\u00f3n a una entidad externa de todo lo que se recopile en dicha maquina. Lo usual es que el Spyware se auto instale en un sistema afectado utilizando componentes de hardware del equipo como lo son [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/\" \/>\n<meta property=\"og:site_name\" content=\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-31T20:18:00+00:00\" \/>\n<meta name=\"author\" content=\"Johan Astudillo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Johan Astudillo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/\"},\"author\":{\"name\":\"Johan Astudillo\",\"@id\":\"https:\/\/www.filetechn.com\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44\"},\"headline\":\"\u00bfQu\u00e9 es un Spyware?\",\"datePublished\":\"2019-03-31T20:18:00+00:00\",\"dateModified\":\"2019-03-31T20:18:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/\"},\"wordCount\":346,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.filetechn.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#primaryimage\"},\"thumbnailUrl\":\"\",\"articleSection\":[\"Tecnolog\u00eda\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/\",\"url\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/\",\"name\":\"\u00bfQu\u00e9 es un Spyware? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"isPartOf\":{\"@id\":\"https:\/\/www.filetechn.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#primaryimage\"},\"thumbnailUrl\":\"\",\"datePublished\":\"2019-03-31T20:18:00+00:00\",\"dateModified\":\"2019-03-31T20:18:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.filetechn.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u00bfQu\u00e9 es un Spyware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.filetechn.com\/#website\",\"url\":\"https:\/\/www.filetechn.com\/\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"description\":\"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress\",\"publisher\":{\"@id\":\"https:\/\/www.filetechn.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.filetechn.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.filetechn.com\/#organization\",\"name\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\",\"url\":\"https:\/\/www.filetechn.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filetechn.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"contentUrl\":\"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png\",\"width\":512,\"height\":512,\"caption\":\"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda\"},\"image\":{\"@id\":\"https:\/\/www.filetechn.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.filetechn.com\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44\",\"name\":\"Johan Astudillo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.filetechn.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g\",\"caption\":\"Johan Astudillo\"},\"url\":\"https:\/\/www.filetechn.com\/en\/author\/johan-astudillo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"\u00bfQu\u00e9 es un Spyware? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/","og_locale":"en_US","og_type":"article","og_title":"\u00bfQu\u00e9 es un Spyware? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","og_description":"Spyware: es un tipo de malware que se instala en la computadora y sin consentimiento de su propietario env\u00eda informaci\u00f3n a una entidad externa de todo lo que se recopile en dicha maquina. Lo usual es que el Spyware se auto instale en un sistema afectado utilizando componentes de hardware del equipo como lo son [&hellip;]","og_url":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/","og_site_name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","article_published_time":"2019-03-31T20:18:00+00:00","author":"Johan Astudillo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Johan Astudillo","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#article","isPartOf":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/"},"author":{"name":"Johan Astudillo","@id":"https:\/\/www.filetechn.com\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44"},"headline":"\u00bfQu\u00e9 es un Spyware?","datePublished":"2019-03-31T20:18:00+00:00","dateModified":"2019-03-31T20:18:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/"},"wordCount":346,"commentCount":0,"publisher":{"@id":"https:\/\/www.filetechn.com\/#organization"},"image":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#primaryimage"},"thumbnailUrl":"","articleSection":["Tecnolog\u00eda"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/","url":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/","name":"\u00bfQu\u00e9 es un Spyware? - FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","isPartOf":{"@id":"https:\/\/www.filetechn.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#primaryimage"},"image":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#primaryimage"},"thumbnailUrl":"","datePublished":"2019-03-31T20:18:00+00:00","dateModified":"2019-03-31T20:18:00+00:00","breadcrumb":{"@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.filetechn.com\/en\/technology\/what-is-spyware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.filetechn.com\/"},{"@type":"ListItem","position":2,"name":"\u00bfQu\u00e9 es un Spyware?"}]},{"@type":"WebSite","@id":"https:\/\/www.filetechn.com\/#website","url":"https:\/\/www.filetechn.com\/","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","description":"Emprendimiento Digital, Tutoriales, Tecnolog\u00eda, Hosting, Wordpress","publisher":{"@id":"https:\/\/www.filetechn.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.filetechn.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.filetechn.com\/#organization","name":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda","url":"https:\/\/www.filetechn.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filetechn.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","contentUrl":"https:\/\/www.filetechn.com\/wp-content\/uploads\/2024\/09\/cropped-cropped-logo-circle.png","width":512,"height":512,"caption":"FileTech Emprendimiento digital, Tutoriales y Tecnolog\u00eda"},"image":{"@id":"https:\/\/www.filetechn.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.filetechn.com\/#\/schema\/person\/778e7d54714e3a2274367dc89c357e44","name":"Johan Astudillo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.filetechn.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/00ce0118bec8f5d029debf9dbafc9fba?s=96&d=mm&r=g","caption":"Johan Astudillo"},"url":"https:\/\/www.filetechn.com\/en\/author\/johan-astudillo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.filetechn.com\/en\/wp-json\/wp\/v2\/posts\/90"}],"collection":[{"href":"https:\/\/www.filetechn.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.filetechn.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.filetechn.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.filetechn.com\/en\/wp-json\/wp\/v2\/comments?post=90"}],"version-history":[{"count":0,"href":"https:\/\/www.filetechn.com\/en\/wp-json\/wp\/v2\/posts\/90\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.filetechn.com\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.filetechn.com\/en\/wp-json\/wp\/v2\/media?parent=90"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.filetechn.com\/en\/wp-json\/wp\/v2\/categories?post=90"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.filetechn.com\/en\/wp-json\/wp\/v2\/tags?post=90"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}