{"id":53469,"date":"2025-05-02T11:41:43","date_gmt":"2025-05-02T14:41:43","guid":{"rendered":"https:\/\/www.itba.edu.ar\/intranet\/ti\/?p=53469"},"modified":"2025-05-02T11:43:56","modified_gmt":"2025-05-02T14:43:56","slug":"existen-riesgos-al-instalar-software-pirata-o-modificado","status":"publish","type":"post","link":"https:\/\/www.itba.edu.ar\/intranet\/ti\/existen-riesgos-al-instalar-software-pirata-o-modificado\/","title":{"rendered":"\u00bfExisten riesgos al instalar software pirata o modificado?"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbHeader\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_direction_radial=\u00bbtop right\u00bb background_color_gradient_stops=\u00bb#00ffd8 0%|#0029e2 100%\u00bb background_color_gradient_start=\u00bb#00ffd8&#8243; background_color_gradient_end=\u00bb#0029e2&#8243; background_image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-18.png\u00bb parallax=\u00bbon\u00bb custom_padding=\u00bb7vw|||||\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row column_structure=\u00bb1_2,1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb1&#8243; global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat|700|||||||\u00bb text_font_size=\u00bb30px\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb73px\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb|-98px||||\u00bb header_font_size_tablet=\u00bb54px\u00bb header_font_size_phone=\u00bb32px\u00bb header_font_size_last_edited=\u00bbon|desktop\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<h1>\u00bfExisten riesgos al instalar software pirata o modificado?<\/h1>\n<p>Estos programas ponen en riesgo los dispositivos y la red<\/p>\n<p>[\/et_pb_text][\/et_pb_column][et_pb_column type=\u00bb1_2&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image src=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-10.png\u00bb title_text=\u00bbcyber-security-10&#8243; align=\u00bbright\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb width=\u00bb100%\u00bb max_width_tablet=\u00bb400px\u00bb max_width_phone=\u00bb\u00bb max_width_last_edited=\u00bbon|desktop\u00bb module_alignment=\u00bbcenter\u00bb custom_margin=\u00bb-10vw|0vw||\u00bb custom_margin_tablet=\u00bb-2vw|0vw||\u00bb custom_margin_phone=\u00bb\u00bb custom_margin_last_edited=\u00bbon|desktop\u00bb animation_style=\u00bbzoom\u00bb animation_intensity_zoom=\u00bb5%\u00bb border_width_all=\u00bb48px\u00bb border_color_all=\u00bbrgba(0,0,0,0)\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb z_index=\u00bb0&#8243; width=\u00bb100%\u00bb max_width=\u00bbnone\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_image show_bottom_space=\u00bboff\u00bb force_fullwidth=\u00bbon\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_margin=\u00bb0vw||-2px\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_image][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; admin_label=\u00bbContact Form\u00bb _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#f1fafe\u00bb z_index=\u00bb10&#8243; custom_padding=\u00bb||1px|||\u00bb bottom_divider_height=\u00bb26vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row make_equal=\u00bbon\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb min_height=\u00bb233.8px\u00bb custom_margin=\u00bb-146px|auto|-2px|auto||\u00bb custom_padding=\u00bb0px|8px|0px||true|\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb40px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_spread=\u00bb-8px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.48)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb60px|40px|60px|40px|true|true\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb custom_padding=\u00bb||0px|||\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>La instalaci\u00f3n y uso de software pirata o crackeado es una pr\u00e1ctica com\u00fan en dispositivos autoadministrados, los cu\u00e1les no requieren de un administrador para poder instalarlos. Hay que tener en cuenta que el uso de este tipo de software adem\u00e1s de comprometer los dispositivos tambi\u00e9n es ilegal porque atenta contra los derechos de autor del desarrollador del producto.\u00a0<\/p>\n<p>Generalmente el uso puede deberse a diferentes motivos, por ejemplo un usuario desea utilizar un software sin tener que pagar licencia o el software instalado tiene modificaciones que permiten utilizar complementos gratuitos. Existen muchas empresas de software que sufren p\u00e9rdidas y existen usuarios que poseen equipos infectados con malware sin tener conocimiento de que adem\u00e1s de que un atacante pueda estar obteniendo informaci\u00f3n personal y confidencial, tambi\u00e9n puede ser parte de una botnet para generar ciberataques a otras organizaciones o infectar la red de una organizaci\u00f3n.<\/p>\n<p><strong>A continuaci\u00f3n te detallamos porque no deber\u00edas instalar software pirata en tus dispositivos:<\/strong><\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb min_height=\u00bb95.8px\u00bb custom_margin=\u00bb|auto|-82px|auto||\u00bb custom_padding=\u00bb69px||49px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_text _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_text][\/et_pb_column][\/et_pb_row][et_pb_row column_structure=\u00bb1_3,1_3,1_3&#8243; custom_padding_last_edited=\u00bbon|phone\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb background_color=\u00bb#ffffff\u00bb z_index=\u00bb1&#8243; custom_margin=\u00bb0vw|auto|-16vw|auto||\u00bb custom_padding=\u00bb60px|60px|60px|60px|true|true\u00bb custom_padding_tablet=\u00bb|40px||40px||true\u00bb custom_padding_phone=\u00bb|20px||20px||true\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_vertical=\u00bb10px\u00bb box_shadow_blur=\u00bb60px\u00bb box_shadow_color=\u00bbrgba(10,45,97,0.1)\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbMalware oculto\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-icon-36.png\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb custom_padding=\u00bb|||13px||\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb title_text=\u00bbcyber-security-icon-36&#8243; sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>El software crackeado podr\u00eda contener malware oculto que podr\u00eda tomar control de tu dispositivo, estar espiandote o utilizar tu equipo para realizar ciberataques.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbincumplimiento legal\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-14.png\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Poseer este tipo de sofware instalado en los dispositivos puede causar multas porque se viola los derechos de propiedad intelectual de la empresa desarrolladora.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbRobo de datos\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-icon-18.png\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Un programa crackeado puede contener stealers que es un malware creado para robar informaci\u00f3n personal, credenciales, datos financieros entre otros.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbincumplimiento de pol\u00edticas ITBA\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-icon-12.png\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb title_text=\u00bbcyber-security-icon-12&#8243; sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Al tener instalado este software en dispositivos ITBA se incumple la normativa de seguridad de la informaci\u00f3n ITBA.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][et_pb_column type=\u00bb1_3&#8243; _builder_version=\u00bb4.16&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_blurb title=\u00bbfalta de actualizaciones\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2022\/05\/cyber-security-icon-13.png\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Al instalar este este tipo de software carece de actualizaciones por lo que puede contener vulnerabilidades que pueden ser explotadas por terceros.<\/p>\n<p>[\/et_pb_blurb][et_pb_blurb title=\u00bbvulnerabilidades\u00bb image=\u00bbhttps:\/\/intranet-nv.s3.amazonaws.com\/wp-content\/uploads\/sites\/2\/2023\/08\/cyber-security-icon-4.png\u00bb _builder_version=\u00bb4.27.4&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbMontserrat|900||on|||||\u00bb header_line_height=\u00bb1.4em\u00bb body_font=\u00bbOverpass|300|||||||\u00bb body_line_height=\u00bb1.8em\u00bb text_orientation=\u00bbcenter\u00bb hover_enabled=\u00bb0&#8243; locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb title_text=\u00bbcyber-security-icon-4&#8243; sticky_enabled=\u00bb0&#8243;]<\/p>\n<p>Al tener falta de actualizaciones y tambi\u00e9n posiblemente contenga malware oculto esto genera vulnerabilidades de seguridad para toda la organizaci\u00f3n.<\/p>\n<p>[\/et_pb_blurb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=\u00bb1&#8243; _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb use_background_color_gradient=\u00bbon\u00bb background_color_gradient_type=\u00bbcircular\u00bb background_color_gradient_stops=\u00bb#004183 0%|#001f4c 100%\u00bb background_color_gradient_start=\u00bb#004183&#8243; background_color_gradient_end=\u00bb#001f4c\u00bb custom_margin=\u00bb||-47vw|||\u00bb custom_padding=\u00bb0vw||6vw||false|\u00bb top_divider_height=\u00bb27vw\u00bb top_divider_flip=\u00bbhorizontal\u00bb bottom_divider_height=\u00bb27vw\u00bb bottom_divider_flip=\u00bbhorizontal\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||0px|||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb0px||170px|||\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.25.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_cta title=\u00bb\u00bfDonde PUEDO DENUNCIAR UN INCIDENTE DE SEGURIDAD?\u00bb button_url=\u00bbhttps:\/\/www.itba.edu.ar\/intranet\/ti\/reporta-un-incidente-informatico\/\u00bb button_text=\u00bbReport\u00e1 un incidente inform\u00e1tico\u00bb _builder_version=\u00bb4.25.1&#8243; _module_preset=\u00bbdefault\u00bb header_font=\u00bbOverpass|900|||||||\u00bb header_font_size=\u00bb38px\u00bb body_font=\u00bbOverpass||||||||\u00bb body_font_size=\u00bb18px\u00bb background_color=\u00bb#FFFFFF\u00bb custom_button=\u00bbon\u00bb button_text_color=\u00bb#FFFFFF\u00bb button_bg_color=\u00bbgcid-44e89228-3a3c-46af-8196-5047e9ac16fe\u00bb button_border_width=\u00bb12px\u00bb button_border_radius=\u00bb50px\u00bb button_font=\u00bbMontserrat|700|||||||\u00bb background_layout=\u00bblight\u00bb border_radii=\u00bbon|8px|8px|8px|8px\u00bb box_shadow_style=\u00bbpreset1&#8243; global_colors_info=\u00bb{%22gcid-44e89228-3a3c-46af-8196-5047e9ac16fe%22:%91%22button_bg_color%22%93}\u00bb button_border_radius__hover_enabled=\u00bbon|desktop\u00bb button_border_radius__hover=\u00bb50px\u00bb]<\/p>\n<p><span style=\"font-weight: 400;\">Complet\u00e1 el formulario indicando el tipo de incidente de seguridad con toda la informaci\u00f3n posible sobre el caso, acompa\u00f1a con archivos complementarios como capturas o videos para dar una soluci\u00f3n m\u00e1s r\u00e1pida.<\/span><\/p>\n<p>[\/et_pb_cta][\/et_pb_column][\/et_pb_row][et_pb_row _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb custom_padding=\u00bb12px|||||\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_column type=\u00bb4_4&#8243; _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][et_pb_divider show_divider=\u00bboff\u00bb _builder_version=\u00bb4.17.4&#8243; _module_preset=\u00bbdefault\u00bb global_colors_info=\u00bb{}\u00bb][\/et_pb_divider][et_pb_text _builder_version=\u00bb4.24.2&#8243; _module_preset=\u00bbdefault\u00bb text_font=\u00bbMontserrat||||||||\u00bb text_text_color=\u00bb#2d2d2d\u00bb text_font_size=\u00bb17px\u00bb text_line_height=\u00bb1.8em\u00bb header_font=\u00bb||||||||\u00bb header_font_size=\u00bb21px\u00bb header_2_font=\u00bbOverpass|900|||||||\u00bb header_2_font_size=\u00bb56px\u00bb header_2_line_height=\u00bb1.1em\u00bb header_3_font=\u00bbOverpass|600|||||||\u00bb header_3_text_color=\u00bb#00b4ff\u00bb header_3_font_size=\u00bb30px\u00bb header_3_line_height=\u00bb1.2em\u00bb background_color=\u00bb#f7f7f7&#8243; text_orientation=\u00bbcenter\u00bb background_layout=\u00bbdark\u00bb custom_margin=\u00bb0px|0px|0px||false|false\u00bb custom_padding=\u00bb22px|0px|0px||false|false\u00bb text_font_size_tablet=\u00bb\u00bb text_font_size_phone=\u00bb14px\u00bb text_font_size_last_edited=\u00bbon|desktop\u00bb header_2_font_size_tablet=\u00bb38px\u00bb header_2_font_size_phone=\u00bb26px\u00bb header_2_font_size_last_edited=\u00bbon|desktop\u00bb header_3_font_tablet=\u00bb\u00bb header_3_font_phone=\u00bbOverpass|700|||||||\u00bb header_3_font_last_edited=\u00bbon|phone\u00bb header_3_font_size_tablet=\u00bb24px\u00bb header_3_font_size_phone=\u00bb18px\u00bb header_3_font_size_last_edited=\u00bbon|desktop\u00bb border_radii=\u00bbon|10px|10px|10px|10px\u00bb box_shadow_style=\u00bbpreset1&#8243; box_shadow_horizontal=\u00bb4px\u00bb box_shadow_blur=\u00bb20px\u00bb locked=\u00bboff\u00bb global_colors_info=\u00bb{}\u00bb]<\/p>\n<p>Si tenes dudas o consultas comunicate con la Mesa de ayuda de TI<\/p>\n<p>\u00a0<a href=\"mailto:ayuda@itba.edu.ar\">ayudati@itba.edu.ar<\/a><\/p>\n<h3><\/h3>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u00bfExisten riesgos al instalar software pirata o modificado? Estos programas ponen en riesgo los dispositivos y la redLa instalaci\u00f3n y uso de software pirata o crackeado es una pr\u00e1ctica com\u00fan en dispositivos autoadministrados, los cu\u00e1les no requieren de un administrador para poder instalarlos. Hay que tener en cuenta que el uso de este tipo de [&hellip;]<\/p>\n","protected":false},"author":5198,"featured_media":53471,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","yasr_overall_rating":0,"yasr_post_is_review":"","yasr_auto_insert_disabled":"","yasr_review_type":"","footnotes":""},"categories":[31],"tags":[],"class_list":["post-53469","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-seguridad-de-la-info"],"yasr_visitor_votes":{"stars_attributes":{"read_only":false,"span_bottom":false},"number_of_votes":0,"sum_votes":0},"_links":{"self":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53469","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/users\/5198"}],"replies":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/comments?post=53469"}],"version-history":[{"count":3,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53469\/revisions"}],"predecessor-version":[{"id":53475,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/posts\/53469\/revisions\/53475"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media\/53471"}],"wp:attachment":[{"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/media?parent=53469"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/categories?post=53469"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.itba.edu.ar\/intranet\/ti\/wp-json\/wp\/v2\/tags?post=53469"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}