{"id":26574,"date":"2022-04-20T17:29:00","date_gmt":"2022-04-20T15:29:00","guid":{"rendered":"https:\/\/perseus.de\/hackers\/"},"modified":"2026-03-30T10:07:02","modified_gmt":"2026-03-30T08:07:02","slug":"hackers","status":"publish","type":"post","link":"https:\/\/perseus.de\/es\/hackers\/","title":{"rendered":"Hackers"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"26574\" class=\"elementor elementor-26574 elementor-22266\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-cab3f18 e-flex e-con-boxed e-con e-parent\" data-id=\"cab3f18\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-2a02b8b e-con-full e-flex e-con e-child\" data-id=\"2a02b8b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4f80ded elementor-widget__width-initial elementor-widget elementor-widget-heading\" data-id=\"4f80ded\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Hackers<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2d061a7 elementor-widget elementor-widget-image\" data-id=\"2d061a7\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png\" class=\"attachment-medium size-medium wp-image-25825\" alt=\"\" srcset=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png 300w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-150x150.png 150w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-768x768.png 768w, https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5bb1d56b e-flex e-con-boxed e-con e-parent\" data-id=\"5bb1d56b\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-235b0387 e-con-full e-flex e-con e-child\" data-id=\"235b0387\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e839854 elementor-widget elementor-widget-text-editor\" data-id=\"e839854\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<header class=\"Single__header Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size6D\"><div class=\"Share\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><div class=\"Module Text Background Background--lightBlue\"><div class=\"container\"><div class=\"grid grid--size12 grid--size8T\"><p>En el campo de la tecnolog\u00eda de la informaci\u00f3n, un \u00abhacker\u00bb es alguien que penetra en sistemas inform\u00e1ticos sin autorizaci\u00f3n. Los hackers criminales est\u00e1n predominantemente presentes en la conciencia p\u00fablica, utilizando sus habilidades en su beneficio y en detrimento de otros. Sin embargo, tambi\u00e9n existen los \u00abhackers \u00e9ticos\u00bb que descubren lagunas en sistemas y redes para que puedan estar mejor protegidos. Para ello, el Servicio Federal de Inteligencia (BND), por ejemplo, emplea hackers profesionales.   <\/p><h4> <\/h4><h4>\u00bfQu\u00e9 significa en detalle el t\u00e9rmino hacker?<\/h4><div> <\/div><p>El t\u00e9rmino deriva del verbo ingl\u00e9s \u00abto hack\u00bb (to hack), que (similar al t\u00e9rmino alem\u00e1n) significa cortar algo, desmontar algo. El t\u00e9rmino \u00abhacker\u00bb se origin\u00f3 en los a\u00f1os 50 y originalmente se refer\u00eda a manitas que desmontaban dispositivos t\u00e9cnicos e intentaban reensamblarlos de forma diferente, nueva o mejorada. Desde principios de los a\u00f1os 80, el t\u00e9rmino hacker se ha vinculado cada vez m\u00e1s al tema del cibercrimen. Hoy en d\u00eda, existen aproximadamente tres tipos de hackers:   <\/p><ul><li>Los hackers \u00e9ticos o \u00abwhite hats\u00bb detectan brechas y problemas de seguridad para eliminar estas vulnerabilidades. Pueden hacerlo profesionalmente o en su tiempo libre e incluso demostrar su \u00e9tica con certificados reconocidos internacionalmente. <\/li><li>Los hackers criminales o \u00abblack hats\u00bb son aquellos que hoy en d\u00eda se asocian predominantemente con la palabra \u00abhacker\u00bb. Y con raz\u00f3n. Porque es de gran importancia concienciar sobre los peligros que suponen.  <\/li><li>Un tercer grupo se llama \u00absombreros grises\u00bb. Este es un t\u00e9rmino colectivo para todos los hackers que no pueden ser asignados claramente a los otros dos grupos. Por ejemplo, porque utilizan medios ilegales para descubrir vulnerabilidades de seguridad en un programa inform\u00e1tico y publicarlas en Internet, pero sin dar tiempo al fabricante para cerrar las lagunas de antemano.<br>El significado original del t\u00e9rmino hacker est\u00e1 vinculado a los \u00abtrucos de vida\u00bb populares en Internet. Son trucos juguetones que (al menos supuestamente) facilitan la vida. Por ejemplo, c\u00f3mo enfriar una cerveza en 2 minutos o c\u00f3mo limpiar el teclado del ordenador con un post-it.    <\/li><\/ul><h4> <\/h4><h4>\u00bfD\u00f3nde encuentro hackers en mi trabajo diario?<\/h4><div> <\/div><p>Puedes encontrarte con hackers casi en cualquier parte de tu trabajo diario. Virtualmente, por ejemplo, a trav\u00e9s de un correo electr\u00f3nico ingeniosamente dise\u00f1ado que quiere persuadirte para que abras el archivo adjunto (<a href=\"http:\/\/52.57.197.213\/2022\/04\/26\/social-engineering\/\">ingenier\u00eda social<\/a>). En nuestro mundo conectado, el trabajo de los hackers tambi\u00e9n puede influir en aspectos aparentemente no digitales de nuestra vida cotidiana. Por ejemplo, pueden ocurrir cancelaciones de trenes, autobuses o trenes debido a un hackeo en un proveedor de servicios de transporte p\u00fablico. O gracias a un hacker \u00e9tico, la siguiente actualizaci\u00f3n del ordenador de bordo de tu coche de empresa contiene l\u00edneas de programa que dificultan que personas no autorizadas abran el sistema de cierre centralizado.    <\/p><h4> <\/h4><h4>\u00bfQu\u00e9 puedo hacer para protegerme de los hackers?<\/h4><div> <\/div><p>Los hackers utilizan muchos m\u00e9todos diferentes, puntos de partida y brechas de seguridad para penetrar en sistemas inform\u00e1ticos sin autorizaci\u00f3n. Aumenta de forma integral la <a href=\"https:\/\/perseus.de\/2022\/04\/19\/cybersicherheit\/\">ciberseguridad<\/a> de tu organizaci\u00f3n para minimizar los puntos de ataque de los hackers. Las medidas importantes incluyen:  <\/p><ul><li>Actualizaciones <a href=\"https:\/\/perseus.de\/2022\/04\/26\/update\/\">lo m\u00e1s<\/a> actualizadas posible<\/li><li>Estructuras inform\u00e1ticas relevantes como <a href=\"https:\/\/perseus.de\/2022\/04\/20\/firewall\/\">cortafuegos<\/a> y esc\u00e1neres de virus<\/li><li><a href=\"https:\/\/perseus.de\/2022\/04\/22\/mitarbeitenden-sensibilisierung\/\">Sensibilizaci\u00f3n de tus empleados<\/a><\/li><li><a href=\"https:\/\/perseus.de\/2022\/04\/22\/passwortsicherheit\/\">Contrase\u00f1as seguras<\/a><\/li><li>Si es necesario, redes separadas para divisiones o departamentos sensibles de la empresa<\/li><\/ul><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/div><\/header>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-cb1ddf2 e-flex e-con-boxed e-con e-parent\" data-id=\"cb1ddf2\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-fc607f0 elementor-widget-divider--view-line elementor-widget elementor-widget-divider\" data-id=\"fc607f0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"divider.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-divider\">\n\t\t\t<span class=\"elementor-divider-separator\">\n\t\t\t\t\t\t<\/span>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Hackers En el campo de la tecnolog\u00eda de la informaci\u00f3n, un \u00abhacker\u00bb es alguien que penetra en sistemas inform\u00e1ticos sin autorizaci\u00f3n. Los hackers criminales est\u00e1n predominantemente presentes en la conciencia p\u00fablica, utilizando sus habilidades en su beneficio y en detrimento de otros. Sin embargo, tambi\u00e9n existen los \u00abhackers \u00e9ticos\u00bb que descubren lagunas en sistemas y [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"class_list":["post-26574","post","type-post","status-publish","format-standard","hentry","category-ciberlexico"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Hackers - Perseus Technologies<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/perseus.de\/es\/hackers\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Hackers - Perseus Technologies\" \/>\n<meta property=\"og:description\" content=\"Hackers En el campo de la tecnolog\u00eda de la informaci\u00f3n, un \u00abhacker\u00bb es alguien que penetra en sistemas inform\u00e1ticos sin autorizaci\u00f3n. Los hackers criminales est\u00e1n predominantemente presentes en la conciencia p\u00fablica, utilizando sus habilidades en su beneficio y en detrimento de otros. Sin embargo, tambi\u00e9n existen los \u00abhackers \u00e9ticos\u00bb que descubren lagunas en sistemas y [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/perseus.de\/es\/hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Perseus Technologies\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-20T15:29:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-30T08:07:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Xenia Silbe\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Xenia Silbe\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/\"},\"author\":{\"name\":\"Xenia Silbe\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\"},\"headline\":\"Hackers\",\"datePublished\":\"2022-04-20T15:29:00+00:00\",\"dateModified\":\"2026-03-30T08:07:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/\"},\"wordCount\":571,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"articleSection\":[\"Ciberl\u00e9xico\"],\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/\",\"name\":\"Hackers - Perseus Technologies\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"datePublished\":\"2022-04-20T15:29:00+00:00\",\"dateModified\":\"2026-03-30T08:07:02+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Headerbild-Glossary-Page-300x300.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/perseus.de\\\/es\\\/hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/perseus.de\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#website\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"name\":\"perseus-web.de\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/perseus.de\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#organization\",\"name\":\"perseus-web.de\",\"url\":\"https:\\\/\\\/perseus.de\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"contentUrl\":\"https:\\\/\\\/perseus.de\\\/wp-content\\\/uploads\\\/2025\\\/03\\\/PerseusTechnologie_Color-2.png\",\"width\":536,\"height\":172,\"caption\":\"perseus-web.de\"},\"image\":{\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/perseus.de\\\/#\\\/schema\\\/person\\\/42cdb0ff9720a4c92a2613f686b32f46\",\"name\":\"Xenia Silbe\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g\",\"caption\":\"Xenia Silbe\"},\"sameAs\":[\"https:\\\/\\\/perseus.de\\\/\"],\"url\":\"https:\\\/\\\/perseus.de\\\/es\\\/author\\\/xenia-silbe\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Hackers - Perseus Technologies","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/perseus.de\/es\/hackers\/","og_locale":"es_ES","og_type":"article","og_title":"Hackers - Perseus Technologies","og_description":"Hackers En el campo de la tecnolog\u00eda de la informaci\u00f3n, un \u00abhacker\u00bb es alguien que penetra en sistemas inform\u00e1ticos sin autorizaci\u00f3n. Los hackers criminales est\u00e1n predominantemente presentes en la conciencia p\u00fablica, utilizando sus habilidades en su beneficio y en detrimento de otros. Sin embargo, tambi\u00e9n existen los \u00abhackers \u00e9ticos\u00bb que descubren lagunas en sistemas y [&hellip;]","og_url":"https:\/\/perseus.de\/es\/hackers\/","og_site_name":"Perseus Technologies","article_published_time":"2022-04-20T15:29:00+00:00","article_modified_time":"2026-03-30T08:07:02+00:00","og_image":[{"width":800,"height":800,"url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page.png","type":"image\/png"}],"author":"Xenia Silbe","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Xenia Silbe","Tiempo de lectura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/perseus.de\/es\/hackers\/#article","isPartOf":{"@id":"https:\/\/perseus.de\/es\/hackers\/"},"author":{"name":"Xenia Silbe","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46"},"headline":"Hackers","datePublished":"2022-04-20T15:29:00+00:00","dateModified":"2026-03-30T08:07:02+00:00","mainEntityOfPage":{"@id":"https:\/\/perseus.de\/es\/hackers\/"},"wordCount":571,"commentCount":0,"publisher":{"@id":"https:\/\/perseus.de\/#organization"},"image":{"@id":"https:\/\/perseus.de\/es\/hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","articleSection":["Ciberl\u00e9xico"],"inLanguage":"es","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/perseus.de\/es\/hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/perseus.de\/es\/hackers\/","url":"https:\/\/perseus.de\/es\/hackers\/","name":"Hackers - Perseus Technologies","isPartOf":{"@id":"https:\/\/perseus.de\/#website"},"primaryImageOfPage":{"@id":"https:\/\/perseus.de\/es\/hackers\/#primaryimage"},"image":{"@id":"https:\/\/perseus.de\/es\/hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","datePublished":"2022-04-20T15:29:00+00:00","dateModified":"2026-03-30T08:07:02+00:00","breadcrumb":{"@id":"https:\/\/perseus.de\/es\/hackers\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/perseus.de\/es\/hackers\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/es\/hackers\/#primaryimage","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/05\/Headerbild-Glossary-Page-300x300.png"},{"@type":"BreadcrumbList","@id":"https:\/\/perseus.de\/es\/hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/perseus.de\/"},{"@type":"ListItem","position":2,"name":"Hackers"}]},{"@type":"WebSite","@id":"https:\/\/perseus.de\/#website","url":"https:\/\/perseus.de\/","name":"perseus-web.de","description":"","publisher":{"@id":"https:\/\/perseus.de\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/perseus.de\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":"Organization","@id":"https:\/\/perseus.de\/#organization","name":"perseus-web.de","url":"https:\/\/perseus.de\/","logo":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/","url":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","contentUrl":"https:\/\/perseus.de\/wp-content\/uploads\/2025\/03\/PerseusTechnologie_Color-2.png","width":536,"height":172,"caption":"perseus-web.de"},"image":{"@id":"https:\/\/perseus.de\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/perseus.de\/#\/schema\/person\/42cdb0ff9720a4c92a2613f686b32f46","name":"Xenia Silbe","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1725c4df9d407f031b1429111650ed671361b6db97d9353d2b0d1aea2f67ed?s=96&d=mm&r=g","caption":"Xenia Silbe"},"sameAs":["https:\/\/perseus.de\/"],"url":"https:\/\/perseus.de\/es\/author\/xenia-silbe\/"}]}},"_links":{"self":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26574","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/comments?post=26574"}],"version-history":[{"count":1,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26574\/revisions"}],"predecessor-version":[{"id":26575,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/posts\/26574\/revisions\/26575"}],"wp:attachment":[{"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/media?parent=26574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/categories?post=26574"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/perseus.de\/es\/wp-json\/wp\/v2\/tags?post=26574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}