{"id":197,"date":"2015-01-16T13:39:42","date_gmt":"2015-01-16T12:39:42","guid":{"rendered":"http:\/\/www.micro-ozon.fr\/blog\/?p=197"},"modified":"2015-01-16T13:39:42","modified_gmt":"2015-01-16T12:39:42","slug":"je-suis-charlie","status":"publish","type":"post","link":"https:\/\/www.micro-ozon.fr\/blog\/2015\/01\/16\/je-suis-charlie\/","title":{"rendered":"Je suis Charlie"},"content":{"rendered":"<p>Bien souvent, les pirates tentent d\u2019exploiter les actualit\u00e9s afin de pousser les internautes \u00e0 ex\u00e9cuter des programmes malveillants. Le dernier cas recens\u00e9 fait \u00e9tat d\u2019un logiciel malveillant redoutable sur le th\u00e8me \u00ab\u00a0Je suis Charlie\u00a0\u00bb, un slogan qui s\u2019est propag\u00e9 de mani\u00e8re virale suite \u00e0 l\u2019attaque des bureaux de Charlie Hebdo.<\/p>\n<p>Le code malicieux en question est un outil de prise de contr\u00f4le \u00e0 distance des ordinateurs qui peut \u00e9galement se doubler d\u2019un cheval de Troie qui cr\u00e9e une porte d\u2019acc\u00e8s \u00e0 l\u2019ordinateur pour le pirate.<img loading=\"lazy\" decoding=\"async\" class=\"alignright\" src=\"http:\/\/fr.canoe.ca\/archives\/techno\/materiel\/ordinateurs\/media\/2011\/02\/20110204-111748-g.jpg\" alt=\"Je suis Charlie\" width=\"248\" height=\"187\" \/><\/p>\n<p>La variante du virus utilis\u00e9e dans cette attaque est camoufl\u00e9e pour la rendre plus difficilement d\u00e9tectable par les antivirus. Attention donc si vous \u00eates Charlie, que votre ordinateur ne le devienne pas \u00e0 votre insu.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Bien souvent, les pirates tentent d\u2019exploiter les actualit\u00e9s afin de pousser les internautes \u00e0 ex\u00e9cuter des programmes malveillants. Le dernier cas recens\u00e9 fait \u00e9tat d\u2019un logiciel malveillant redoutable sur le th\u00e8me \u00ab\u00a0Je suis Charlie\u00a0\u00bb, un slogan qui s\u2019est propag\u00e9 de mani\u00e8re virale suite \u00e0 l\u2019attaque des bureaux de Charlie Hebdo. Le code malicieux en question&hellip; <a href=\"https:\/\/www.micro-ozon.fr\/blog\/2015\/01\/16\/je-suis-charlie\/\" class=\"more-link\">Lire la suite <span class=\"screen-reader-text\">Je suis Charlie<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[5,12],"tags":[45,39,25,76,46,24,40,41,42,43,44],"class_list":["post-197","post","type-post","status-publish","format-standard","hentry","category-info","category-securite","tag-chaponnay","tag-communay","tag-depannage-informatique","tag-je-suis-charlie","tag-marennes","tag-micro-ozon","tag-saint-symphorien","tag-serezin","tag-simandres","tag-solaize","tag-ternay"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/posts\/197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/comments?post=197"}],"version-history":[{"count":1,"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/posts\/197\/revisions"}],"predecessor-version":[{"id":198,"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/posts\/197\/revisions\/198"}],"wp:attachment":[{"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/media?parent=197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/categories?post=197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.micro-ozon.fr\/blog\/wp-json\/wp\/v2\/tags?post=197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}