{"id":196,"date":"2023-08-10T17:35:20","date_gmt":"2023-08-10T17:35:20","guid":{"rendered":"https:\/\/vulneralert.com\/v1\/?page_id=196"},"modified":"2023-08-10T18:07:01","modified_gmt":"2023-08-10T18:07:01","slug":"analisis-situacional-de-las-tecnologias","status":"publish","type":"page","link":"https:\/\/vulneralert.com\/v1\/analisis-situacional-de-las-tecnologias\/","title":{"rendered":"An\u00e1lisis situacional de las tecnolog\u00edas"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"196\" class=\"elementor elementor-196\">\n\t\t\t\t\t\t\t\t\t<section class=\"has_ma_el_bg_slider elementor-section elementor-top-section elementor-element elementor-element-63ec878b elementor-section-boxed elementor-section-height-default elementor-section-height-default jltma-glass-effect-no\" data-id=\"63ec878b\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_ma_el_bg_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-144b8ee8 jltma-glass-effect-no\" data-id=\"144b8ee8\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-6084cb95 jltma-glass-effect-no elementor-widget elementor-widget-text-editor\" data-id=\"6084cb95\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.17.0 - 08-11-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p><!-- wp:paragraph --><\/p>\n<p class=\"selectable-text copyable-text iq0m558w g0rxnol2\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">Hemos lanzado una nueva herramienta que servir\u00e1 para sugerir algunas etiquetas principales y atributos en el contexto de uso de nuestra herramienta.<\/span><\/p>\n<p class=\"selectable-text copyable-text iq0m558w g0rxnol2\" dir=\"ltr\"><span class=\"selectable-text copyable-text\">B\u00e1sicamente, esta herramienta pretende ser una gu\u00eda b\u00e1sica para identificar la realidad tecnol\u00f3gica del usuario. Con esta informaci\u00f3n, podr\u00e1 configurar correctamente sus tecnolog\u00edas dentro de VulnerAlert y as\u00ed recibir las alertas de vulnerabilidades inherentes a las mismas<\/span><\/p>\n<p><!-- \/wp:paragraph --><\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-341406d jltma-glass-effect-no elementor-widget elementor-widget-button\" data-id=\"341406d\" data-element_type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"\/analisis.php\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t<span class=\"elementor-button-text\">Click here<\/span>\n\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Hemos lanzado una nueva herramienta que servir\u00e1 para sugerir algunas<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_themeisle_gutenberg_block_has_review":false,"footnotes":""},"class_list":["post-196","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/vulneralert.com\/v1\/wp-json\/wp\/v2\/pages\/196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vulneralert.com\/v1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/vulneralert.com\/v1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/vulneralert.com\/v1\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/vulneralert.com\/v1\/wp-json\/wp\/v2\/comments?post=196"}],"version-history":[{"count":9,"href":"https:\/\/vulneralert.com\/v1\/wp-json\/wp\/v2\/pages\/196\/revisions"}],"predecessor-version":[{"id":206,"href":"https:\/\/vulneralert.com\/v1\/wp-json\/wp\/v2\/pages\/196\/revisions\/206"}],"wp:attachment":[{"href":"https:\/\/vulneralert.com\/v1\/wp-json\/wp\/v2\/media?parent=196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}