{"id":3979,"date":"2016-06-20T09:58:44","date_gmt":"2016-06-20T09:58:44","guid":{"rendered":"http:\/\/responsive.onlinevalles.es\/?p=3979"},"modified":"2025-03-04T11:57:00","modified_gmt":"2025-03-04T11:57:00","slug":"trojans-a-threat-to-our-computer-system","status":"publish","type":"post","link":"https:\/\/www.apen.es\/en\/blog\/trojans-a-threat-to-our-computer-system\/","title":{"rendered":"Trojans: A threat to our computer system"},"content":{"rendered":"<p>What is a Trojan? When we talk about Trojans, we are not referring to the inhabitants of Troy, the ancient city of Asia Minor, but to a type of&nbsp;<strong>virus<\/strong>&nbsp;which affects your computer&#039;s operating system, the effects of which can be very dangerous.&nbsp;<strong>The Trojans<\/strong>&nbsp;They can delete files, destroy information on the hard drive, remotely control our computer, and even capture all text entered via the keyboard or record user passwords, which is why this type of virus is used by some people to steal banking information. Therefore, from&nbsp;<strong>Apen&nbsp;<\/strong>We encourage you to use a good security system on all your computers and to perform a proper&nbsp;<strong>IT maintenance<\/strong>&nbsp;newspaper, in order to avoid greater and irreparable harm.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>The BackDoor.Apper Trojan&nbsp;<\/strong><\/h2>\n\n\n\n<p>A month ago, news broke of a computer virus called BackDoor.Apper, which threatens the Windows operating system. It is being distributed via spam emails containing an Excel document designed to download the malware using macros. Once the user downloads the file, the virus begins its work. The malware collects information, primarily about the operating system, detailing the computer&#039;s hardware, hard drive usage, storage, and the user&#039;s MAC address, which is used to generate a device ID. This ID then becomes part of a database.&nbsp;<em>botnet.&nbsp;<\/em>Furthermore, this virus downloads files from various servers and executes them, performing a thorough inventory of existing files and sending all the information to a remote server. This Trojan also takes screenshots and logs keystrokes to obtain passwords for accessing bank accounts, for example.&nbsp;<strong>IT maintenance<\/strong>&nbsp;Your team can solve some of these problems and prevent your computer from becoming infected with malware.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>How to deal with a threat<\/strong><\/h2>\n\n\n\n<p>The first step is to never open emails from unknown senders, and even less so to install their content or run any programs you don&#039;t trust. Having a good security system on your computer that detects threats is essential to avoid these kinds of problems. A good&nbsp;<strong>maintenance<\/strong>&nbsp;<strong>computer<\/strong>&nbsp;Performing these updates regularly will save us trouble in the future, since being exposed to a stranger with malicious intent is not something anyone enjoys. With an updated antivirus security system, we can detect and block any malware. Most of our computers are protected, but there are always vulnerabilities that cybercriminals can exploit, so we must be prepared.&nbsp;<strong>Apen<\/strong>&nbsp;We always advocate for the use of a competent security system that guarantees the safety of all our actions at the computer level, especially in those companies that may be susceptible to an attack via the internet.<\/p>","protected":false},"excerpt":{"rendered":"<p>What is a Trojan? When we talk about Trojans, we are not referring to the inhabitants of Troy, the ancient city of\u2026<\/p>","protected":false},"author":4,"featured_media":4304,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[47,66],"tags":[67,48,69,49,50,68],"class_list":["post-3979","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-apen","category-mantenimiento-informatico","tag-antivirus","tag-mantenimiento-informatico","tag-mantenimiento-informatico-barcelona","tag-seguridad-en-ordenadores","tag-servidor-en-la-nube","tag-troyanos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Troyanos: Una amenaza para nuestro sistema inform\u00e1tico - Apen Inform\u00e1tica<\/title>\n<meta name=\"description\" content=\"\u00bfQu\u00e9 es un troyano? Cuando hablamos de troyanos no nos referimos a los habitantes de Troya, la antigua ciudad de Asia menor, sino a un tipo\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.apen.es\/en\/blog\/trojans-a-threat-to-our-computer-system\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Troyanos: Una amenaza para nuestro sistema inform\u00e1tico - Apen Inform\u00e1tica\" \/>\n<meta property=\"og:description\" content=\"\u00bfQu\u00e9 es un troyano? Cuando hablamos de troyanos no nos referimos a los habitantes de Troya, la antigua ciudad de Asia menor, sino a un tipo\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.apen.es\/en\/blog\/trojans-a-threat-to-our-computer-system\/\" \/>\n<meta property=\"og:site_name\" content=\"Apen Inform\u00e1tica\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/apensolucions\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-20T09:58:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-04T11:57:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/INTERIOR-SOFTWARE-A3ERP.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"850\" \/>\n\t<meta property=\"og:image:height\" content=\"401\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"marqueting\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"marqueting\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/\"},\"author\":{\"name\":\"marqueting\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\"},\"headline\":\"Troyanos: Una amenaza para nuestro sistema inform\u00e1tico\",\"datePublished\":\"2016-06-20T09:58:44+00:00\",\"dateModified\":\"2025-03-04T11:57:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/\"},\"wordCount\":535,\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/INTERIOR-SOFTWARE-A3ERP.jpg\",\"keywords\":[\"Antivirus\",\"Mantenimiento inform\u00e1tico\",\"Mantenimiento Inform\u00e1tico Barcelona\",\"Seguridad en ordenadores\",\"Servidor en la nube\",\"Troyanos\"],\"articleSection\":[\"Apen\",\"Mantenimiento inform\u00e1tico\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/\",\"name\":\"Troyanos: Una amenaza para nuestro sistema inform\u00e1tico - Apen Inform\u00e1tica\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/INTERIOR-SOFTWARE-A3ERP.jpg\",\"datePublished\":\"2016-06-20T09:58:44+00:00\",\"dateModified\":\"2025-03-04T11:57:00+00:00\",\"description\":\"\u00bfQu\u00e9 es un troyano? Cuando hablamos de troyanos no nos referimos a los habitantes de Troya, la antigua ciudad de Asia menor, sino a un tipo\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/INTERIOR-SOFTWARE-A3ERP.jpg\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2016\\\/06\\\/INTERIOR-SOFTWARE-A3ERP.jpg\",\"width\":850,\"height\":401},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/blog\\\/troyanos-una-amenaza-para-nuestro-sistema-informatico\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/www.apen.es\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Troyanos: Una amenaza para nuestro sistema inform\u00e1tico\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#website\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"name\":\"Apen Inform\u00e1tica\",\"description\":\"Mantenimiento Inform\u00e1tico , Software de Gesti\u00f3n, Soluciones de impresi\u00f3n\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.apen.es\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#organization\",\"name\":\"Apen: Soluciones inform\u00e1ticas\",\"url\":\"https:\\\/\\\/www.apen.es\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"contentUrl\":\"https:\\\/\\\/www.apen.es\\\/wp-content\\\/uploads\\\/2022\\\/08\\\/logo-apenok-231x82-1.png\",\"width\":231,\"height\":82,\"caption\":\"Apen: Soluciones inform\u00e1ticas\"},\"image\":{\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/apensolucions\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/ApenCentreInformatic\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.apen.es\\\/#\\\/schema\\\/person\\\/627cea3460442d338764155dd31958c2\",\"name\":\"marqueting\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g\",\"caption\":\"marqueting\"},\"url\":\"https:\\\/\\\/www.apen.es\\\/en\\\/blog\\\/author\\\/marqueting\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Trojans: A Threat to Our Computer System - Apen Inform\u00e1tica","description":"What is a Trojan? When we talk about Trojans, we are not referring to the inhabitants of Troy, the ancient city of Asia Minor, but to a type","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.apen.es\/en\/blog\/trojans-a-threat-to-our-computer-system\/","og_locale":"en_US","og_type":"article","og_title":"Troyanos: Una amenaza para nuestro sistema inform\u00e1tico - Apen Inform\u00e1tica","og_description":"\u00bfQu\u00e9 es un troyano? Cuando hablamos de troyanos no nos referimos a los habitantes de Troya, la antigua ciudad de Asia menor, sino a un tipo","og_url":"https:\/\/www.apen.es\/en\/blog\/trojans-a-threat-to-our-computer-system\/","og_site_name":"Apen Inform\u00e1tica","article_publisher":"https:\/\/www.facebook.com\/apensolucions","article_published_time":"2016-06-20T09:58:44+00:00","article_modified_time":"2025-03-04T11:57:00+00:00","og_image":[{"width":850,"height":401,"url":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/INTERIOR-SOFTWARE-A3ERP.jpg","type":"image\/jpeg"}],"author":"marqueting","twitter_card":"summary_large_image","twitter_misc":{"Written by":"marqueting","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/#article","isPartOf":{"@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/"},"author":{"name":"marqueting","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2"},"headline":"Troyanos: Una amenaza para nuestro sistema inform\u00e1tico","datePublished":"2016-06-20T09:58:44+00:00","dateModified":"2025-03-04T11:57:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/"},"wordCount":535,"publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"image":{"@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/INTERIOR-SOFTWARE-A3ERP.jpg","keywords":["Antivirus","Mantenimiento inform\u00e1tico","Mantenimiento Inform\u00e1tico Barcelona","Seguridad en ordenadores","Servidor en la nube","Troyanos"],"articleSection":["Apen","Mantenimiento inform\u00e1tico"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/","url":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/","name":"Trojans: A Threat to Our Computer System - Apen Inform\u00e1tica","isPartOf":{"@id":"https:\/\/www.apen.es\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/#primaryimage"},"image":{"@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/#primaryimage"},"thumbnailUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/INTERIOR-SOFTWARE-A3ERP.jpg","datePublished":"2016-06-20T09:58:44+00:00","dateModified":"2025-03-04T11:57:00+00:00","description":"What is a Trojan? When we talk about Trojans, we are not referring to the inhabitants of Troy, the ancient city of Asia Minor, but to a type","breadcrumb":{"@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/#primaryimage","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/INTERIOR-SOFTWARE-A3ERP.jpg","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/INTERIOR-SOFTWARE-A3ERP.jpg","width":850,"height":401},{"@type":"BreadcrumbList","@id":"https:\/\/www.apen.es\/blog\/troyanos-una-amenaza-para-nuestro-sistema-informatico\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/www.apen.es\/"},{"@type":"ListItem","position":2,"name":"Troyanos: Una amenaza para nuestro sistema inform\u00e1tico"}]},{"@type":"WebSite","@id":"https:\/\/www.apen.es\/#website","url":"https:\/\/www.apen.es\/","name":"Apen Inform\u00e1tica","description":"IT Maintenance, Management Software, Printing Solutions","publisher":{"@id":"https:\/\/www.apen.es\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.apen.es\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.apen.es\/#organization","name":"Apen: IT Solutions","url":"https:\/\/www.apen.es\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/","url":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","contentUrl":"https:\/\/www.apen.es\/wp-content\/uploads\/2022\/08\/logo-apenok-231x82-1.png","width":231,"height":82,"caption":"Apen: Soluciones inform\u00e1ticas"},"image":{"@id":"https:\/\/www.apen.es\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/apensolucions","https:\/\/www.youtube.com\/user\/ApenCentreInformatic","https:\/\/www.linkedin.com\/company\/1021771?trk=tyah&trkInfo=clickedVerticalcompanyclickedEntityId1021771idx2-1-2tarId1464195271196tasapenin"]},{"@type":"Person","@id":"https:\/\/www.apen.es\/#\/schema\/person\/627cea3460442d338764155dd31958c2","name":"marketing","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fa80be4db3ad9b3dd851d8272d342d92bf26d7d7e31e15c99432aaeefb8b1735?s=96&d=mm&r=g","caption":"marqueting"},"url":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"}]}},"taxonomy_info":{"category":[{"value":47,"label":"Apen"},{"value":66,"label":"Mantenimiento inform\u00e1tico"}],"post_tag":[{"value":67,"label":"Antivirus"},{"value":48,"label":"Mantenimiento inform\u00e1tico"},{"value":69,"label":"Mantenimiento Inform\u00e1tico Barcelona"},{"value":49,"label":"Seguridad en ordenadores"},{"value":50,"label":"Servidor en la nube"},{"value":68,"label":"Troyanos"}]},"featured_image_src_large":["https:\/\/www.apen.es\/wp-content\/uploads\/2016\/06\/INTERIOR-SOFTWARE-A3ERP.jpg",850,401,false],"author_info":{"display_name":"marqueting","author_link":"https:\/\/www.apen.es\/en\/blog\/author\/marqueting\/"},"comment_info":0,"category_info":[{"term_id":47,"name":"Apen","slug":"apen","term_group":0,"term_taxonomy_id":47,"taxonomy":"category","description":"","parent":0,"count":256,"filter":"raw","term_order":"0","cat_ID":47,"category_count":256,"category_description":"","cat_name":"Apen","category_nicename":"apen","category_parent":0},{"term_id":66,"name":"Mantenimiento inform\u00e1tico","slug":"mantenimiento-informatico","term_group":0,"term_taxonomy_id":66,"taxonomy":"category","description":"","parent":0,"count":78,"filter":"raw","term_order":"0","cat_ID":66,"category_count":78,"category_description":"","cat_name":"Mantenimiento inform\u00e1tico","category_nicename":"mantenimiento-informatico","category_parent":0}],"tag_info":[{"term_id":67,"name":"Antivirus","slug":"antivirus","term_group":0,"term_taxonomy_id":67,"taxonomy":"post_tag","description":"","parent":0,"count":14,"filter":"raw","term_order":"0"},{"term_id":48,"name":"Mantenimiento inform\u00e1tico","slug":"mantenimiento-informatico","term_group":0,"term_taxonomy_id":48,"taxonomy":"post_tag","description":"","parent":0,"count":50,"filter":"raw","term_order":"0"},{"term_id":69,"name":"Mantenimiento Inform\u00e1tico Barcelona","slug":"mantenimiento-informatico-barcelona","term_group":0,"term_taxonomy_id":69,"taxonomy":"post_tag","description":"","parent":0,"count":20,"filter":"raw","term_order":"0"},{"term_id":49,"name":"Seguridad en ordenadores","slug":"seguridad-en-ordenadores","term_group":0,"term_taxonomy_id":49,"taxonomy":"post_tag","description":"","parent":0,"count":35,"filter":"raw","term_order":"0"},{"term_id":50,"name":"Servidor en la nube","slug":"servidor-en-la-nube","term_group":0,"term_taxonomy_id":50,"taxonomy":"post_tag","description":"","parent":0,"count":18,"filter":"raw","term_order":"0"},{"term_id":68,"name":"Troyanos","slug":"troyanos","term_group":0,"term_taxonomy_id":68,"taxonomy":"post_tag","description":"","parent":0,"count":7,"filter":"raw","term_order":"0"}],"_links":{"self":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/3979","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/comments?post=3979"}],"version-history":[{"count":1,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/3979\/revisions"}],"predecessor-version":[{"id":54193,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/posts\/3979\/revisions\/54193"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media\/4304"}],"wp:attachment":[{"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/media?parent=3979"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/categories?post=3979"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.apen.es\/en\/wp-json\/wp\/v2\/tags?post=3979"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}