

{"id":212,"date":"2005-06-24T17:39:33","date_gmt":"2005-06-24T15:39:33","guid":{"rendered":"http:\/\/josemarg.com\/wp\/?p=212"},"modified":"2008-04-10T14:02:01","modified_gmt":"2008-04-10T12:02:01","slug":"detenido-en-galicia-uno-de-los-crackers-mas-peligrosos-de-internet","status":"publish","type":"post","link":"https:\/\/josemarg.com\/wp\/?p=212","title":{"rendered":"Detenido en Galicia, uno de los &#8216;crackers&#8217; m\u00e1s peligrosos de Internet"},"content":{"rendered":"<blockquote><p>La polic\u00eda ha detenido en <a href=\"http:\/\/www.concellodepoio.es\/\">Poio<\/a> (<a href=\"http:\/\/www.concellopontevedra.es\">Pontevedra<\/a>) al ingeniero R.A.G., de 26 a\u00f1os, m\u00e1s conocido en Internet como <em>P.Power<\/em>, uno de los <a href=\"http:\/\/es.wikipedia.org\/wiki\/Cracker\">crackers<\/a> m\u00e1s prol\u00edficos, que desproteg\u00eda los sistemas de seguridad de los programas de ingenier\u00eda m\u00e1s utilizados por los profesionales, que tienen un alt\u00edsimo coste. Un cracker es una persona que viola la seguridad de un sistema inform\u00e1tico con fines de beneficio personal.<br \/>\nSe trata de un ingeniero que desproteg\u00eda dichos sistemas con una simple conexi\u00f3n a Internet a trav\u00e9s de un <strong>m\u00f3dem<\/strong>, un <strong>ordenador obsoleto<\/strong> y un sistema operativo como <strong>Windows 98<\/strong>, informa la <a href=\"http:\/\/www.policia.es\/\">Direcci\u00f3n General de la Polic\u00eda<\/a>. Llevaban m\u00e1s 9 meses tras su pista.<\/p><\/blockquote>\n<p>M\u00e1s informaci\u00f3n en <a href=\"http:\/\/iblnews.com\/story.php?id=287\">IBLNEWS<\/a>.<\/p>\n<p>Lo que est\u00e1 claro es que aunque cojan a este, hay miles m\u00e1s en todo el mundo&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>La polic\u00eda ha detenido en Poio (Pontevedra) al ingeniero R.A.G., de 26 a\u00f1os, m\u00e1s conocido en Internet como P.Power, uno de los crackers m\u00e1s prol\u00edficos, que desproteg\u00eda los sistemas de seguridad de los programas de ingenier\u00eda m\u00e1s utilizados por los &hellip; <a href=\"https:\/\/josemarg.com\/wp\/?p=212\">Sigue leyendo <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[407],"class_list":["post-212","post","type-post","status-publish","format-standard","hentry","category-informatica","tag-informatica"],"_links":{"self":[{"href":"https:\/\/josemarg.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/212","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/josemarg.com\/wp\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/josemarg.com\/wp\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/josemarg.com\/wp\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/josemarg.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=212"}],"version-history":[{"count":0,"href":"https:\/\/josemarg.com\/wp\/index.php?rest_route=\/wp\/v2\/posts\/212\/revisions"}],"wp:attachment":[{"href":"https:\/\/josemarg.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=212"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/josemarg.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=212"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/josemarg.com\/wp\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=212"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}