{"id":177,"date":"2017-05-25T00:30:28","date_gmt":"2017-05-24T22:30:28","guid":{"rendered":"http:\/\/technologie-sciarretta.ovh\/?p=177"},"modified":"2019-05-03T15:04:36","modified_gmt":"2019-05-03T13:04:36","slug":"les-logiciels-malveillants","status":"publish","type":"post","link":"https:\/\/technologie-sciarretta.ovh\/?p=177","title":{"rendered":"Les logiciels malveillants"},"content":{"rendered":"<div id=\"pl-177\"  class=\"panel-layout\" ><div id=\"pg-177-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-177-0-0\"  class=\"panel-grid-cell\" ><div id=\"panel-177-0-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h2><span style=\"color: #ff0000;\">Les virus<\/span><\/h2>\n<p>En 1986, Brain fut le premier virus \u00e0 attaquer massivement des disquettes, il ne touchait pas les disques durs. Le monde prit alors conscience de la menace informatique, notion qui n'existait pas avant cette date.<\/p>\n<h3><strong><span style=\"color: #000000;\">Comment fonctionne un virus ?<\/span><\/strong><\/h3>\n<p>Un virus informatique, comme le virus biologique, a besoin d'un h\u00f4te pour se propager ; en l\u2019occurrence il s'agit g\u00e9n\u00e9ralement d'un logiciel l\u00e9gal dans lequel il a r\u00e9ussi \u00e0 s'introduire (par du codage en assembleur) et qui se r\u00e9pand \u00e0 d'autres ordinateurs via une cl\u00e9 USB ou le r\u00e9seau informatique. Un utilisateur active ainsi le virus \u00e0 chaque fois qu'il installe ou ex\u00e9cute le logiciel infect\u00e9.<\/p>\n<p>Le virus a pour but de perturber plus ou moins dangereusement le fonctionnement de l'ordinateur.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-177-0-1\"  class=\"panel-grid-cell\" ><div id=\"panel-177-0-1-0\" class=\"so-panel widget widget_sow-image panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-8b5b6f678277-177\"\n\t\t\t\n\t\t>\n\n<div class=\"sow-image-container\">\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/virus-1-e1495663129844.jpg?fit=400%2C300&amp;ssl=1\" width=\"400\" height=\"300\" title=\"virus\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><\/div><\/div><div id=\"pg-177-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-177-1-0\"  class=\"panel-grid-cell\" ><div id=\"panel-177-1-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"2\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h2><span style=\"color: #ff0000;\">Les vers<\/span><\/h2>\n<p>En 1988, Robert Morris, \u00e9tudiant \u00e0 l'universit\u00e9 de Cornell, programme et lance le premier ver de l'histoire (le ver Morris) et attaque les serveurs du MIT. En quelques jours, sont infect\u00e9s 10% des serveurs connect\u00e9s \u00e0 l'internet de l'\u00e9poque. Fils de chercheur, le jeune Morris a cr\u00e9\u00e9 un ver inoffensif, mais son mode de reproduction a alert\u00e9 les autorit\u00e9s qui cr\u00e9\u00e8rent le premier centre de coordination pour la lutte contre les menaces informatiques. Robert Morris \u00e9copa de 10000\u20ac d'amende.\u00a0<\/p>\n<h3><strong><span style=\"color: #000000;\">Comment fonctionne un ver ?<\/span><\/strong><\/h3>\n<p>Contrairement au virus, le ver peut se propager par ses propres moyens, en utilisant un r\u00e9seau informatique ou bien internet.<\/p>\n<p>Le ver peut avoir diff\u00e9rents objectifs, comme espionner, d\u00e9truire un fichier ou encore ouvrir les portes aux pirates.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-177-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-177-1-1-0\" class=\"so-panel widget widget_sow-image panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-8b5b6f678277-177\"\n\t\t\t\n\t\t>\n\n<div class=\"sow-image-container\">\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450&amp;ssl=1\" width=\"750\" height=\"450\" srcset=\"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?w=750&amp;ssl=1 750w, https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?resize=300%2C180&amp;ssl=1 300w, https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?resize=250%2C150&amp;ssl=1 250w, https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?resize=150%2C90&amp;ssl=1 150w\" title=\"ver\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><\/div><\/div><div id=\"pg-177-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-177-2-0\"  class=\"panel-grid-cell\" ><div id=\"panel-177-2-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h2><span style=\"color: #ff0000;\">Les\u00a0chevaux de Troie<\/span><\/h2>\n<p>Depuis 2005, le cheval de Troie est le logiciel malveillant le plus repr\u00e9sent\u00e9 sur la toile.<\/p>\n<h3><strong><span style=\"color: #000000;\">Comment fonctionne un cheval de Troie?<\/span><\/strong><\/h3>\n<p>Le cheval de Troie est un logiciel en apparence l\u00e9gitime mais qui cache en fait un logiciel malveillant. Un utilisateur t\u00e9l\u00e9charge un logiciel de sa propre volont\u00e9\u00a0et ne se rend pas compte qu'il t\u00e9l\u00e9charge et ex\u00e9cute en m\u00eame temps un autre programme, malveillant celui-ci (il peut s'agir d'un virus, d'un logiciel espion etc...). Le cheval de Troie, comme son nom l'indique, n'est donc qu'un simple v\u00e9hicule.<\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-177-2-1\"  class=\"panel-grid-cell\" ><div id=\"panel-177-2-1-0\" class=\"so-panel widget widget_sow-image panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-image so-widget-sow-image-default-8b5b6f678277-177\"\n\t\t\t\n\t\t>\n\n<div class=\"sow-image-container\">\n\t\t<img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/horse-e1496061654720.jpg?fit=480%2C466&amp;ssl=1\" width=\"480\" height=\"466\" srcset=\"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/horse-e1496061654720.jpg?w=480&amp;ssl=1 480w, https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/horse-e1496061654720.jpg?resize=300%2C291&amp;ssl=1 300w, https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/horse-e1496061654720.jpg?resize=155%2C150&amp;ssl=1 155w, https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/horse-e1496061654720.jpg?resize=150%2C146&amp;ssl=1 150w\" title=\"horse\" alt=\"\" \t\tclass=\"so-widget-image\"\/>\n\t<\/div>\n\n<\/div><\/div><\/div><\/div><div id=\"pg-177-3\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-177-3-0\"  class=\"panel-grid-cell\" ><div id=\"panel-177-3-0-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"6\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><iframe loading=\"lazy\" title=\"Les virus informatiques: fonctionnement (chap.1)\/\/ Paroles d&#039;experts\" width=\"700\" height=\"394\" src=\"https:\/\/www.youtube.com\/embed\/hv1LAVnZ1hg?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<\/div><\/div><\/div><\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Les virusEn 1986, Brain fut le premier virus \u00e0 attaquer massivement des disquettes, il ne touchait pas les disques durs. Le monde prit alors conscience de la menace informatique, notion qui n&#8217;existait pas avant cette date.Comment fonctionne un virus ?Un virus informatique, comme le virus biologique, a besoin d&#8217;un h\u00f4te pour se propager ; en [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":193,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[11],"tags":[43],"class_list":["post-177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-logiciels","tag-informatique"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Les logiciels malveillants - LA TECHNOLOGIE<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/technologie-sciarretta.ovh\/?p=177\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Les logiciels malveillants - LA TECHNOLOGIE\" \/>\n<meta property=\"og:description\" content=\"Les virusEn 1986, Brain fut le premier virus \u00e0 attaquer massivement des disquettes, il ne touchait pas les disques durs. Le monde prit alors conscience de la menace informatique, notion qui n&#039;existait pas avant cette date.Comment fonctionne un virus ?Un virus informatique, comme le virus biologique, a besoin d&#039;un h\u00f4te pour se propager ; en [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"http:\/\/technologie-sciarretta.ovh\/?p=177\" \/>\n<meta property=\"og:site_name\" content=\"LA TECHNOLOGIE\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-24T22:30:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-03T13:04:36+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450\" \/>\n\t<meta property=\"og:image:width\" content=\"750\" \/>\n\t<meta property=\"og:image:height\" content=\"450\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin9769\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin9769\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/technologie-sciarretta.ovh\/?p=177\",\"url\":\"http:\/\/technologie-sciarretta.ovh\/?p=177\",\"name\":\"Les logiciels malveillants - LA TECHNOLOGIE\",\"isPartOf\":{\"@id\":\"http:\/\/technologie-sciarretta.ovh\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/technologie-sciarretta.ovh\/?p=177#primaryimage\"},\"image\":{\"@id\":\"http:\/\/technologie-sciarretta.ovh\/?p=177#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450&ssl=1\",\"datePublished\":\"2017-05-24T22:30:28+00:00\",\"dateModified\":\"2019-05-03T13:04:36+00:00\",\"author\":{\"@id\":\"http:\/\/technologie-sciarretta.ovh\/#\/schema\/person\/821044ad4d97adf2bfed3e6d383f247c\"},\"breadcrumb\":{\"@id\":\"http:\/\/technologie-sciarretta.ovh\/?p=177#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/technologie-sciarretta.ovh\/?p=177\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/technologie-sciarretta.ovh\/?p=177#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450&ssl=1\",\"width\":750,\"height\":450},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/technologie-sciarretta.ovh\/?p=177#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"http:\/\/technologie-sciarretta.ovh\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Les logiciels malveillants\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/technologie-sciarretta.ovh\/#website\",\"url\":\"http:\/\/technologie-sciarretta.ovh\/\",\"name\":\"LA TECHNOLOGIE\",\"description\":\"par M. Sciarretta Antony\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/technologie-sciarretta.ovh\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/technologie-sciarretta.ovh\/#\/schema\/person\/821044ad4d97adf2bfed3e6d383f247c\",\"name\":\"admin9769\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"http:\/\/technologie-sciarretta.ovh\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c16bed0b0b4e450a74897d69025c1de0?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c16bed0b0b4e450a74897d69025c1de0?s=96&d=mm&r=g\",\"caption\":\"admin9769\"},\"url\":\"https:\/\/technologie-sciarretta.ovh\/?author=1\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Les logiciels malveillants - LA TECHNOLOGIE","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/technologie-sciarretta.ovh\/?p=177","og_locale":"fr_FR","og_type":"article","og_title":"Les logiciels malveillants - LA TECHNOLOGIE","og_description":"Les virusEn 1986, Brain fut le premier virus \u00e0 attaquer massivement des disquettes, il ne touchait pas les disques durs. Le monde prit alors conscience de la menace informatique, notion qui n'existait pas avant cette date.Comment fonctionne un virus ?Un virus informatique, comme le virus biologique, a besoin d'un h\u00f4te pour se propager ; en [&hellip;]","og_url":"http:\/\/technologie-sciarretta.ovh\/?p=177","og_site_name":"LA TECHNOLOGIE","article_published_time":"2017-05-24T22:30:28+00:00","article_modified_time":"2019-05-03T13:04:36+00:00","og_image":[{"width":750,"height":450,"url":"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450","type":"image\/jpeg"}],"author":"admin9769","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"admin9769","Dur\u00e9e de lecture estim\u00e9e":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/technologie-sciarretta.ovh\/?p=177","url":"http:\/\/technologie-sciarretta.ovh\/?p=177","name":"Les logiciels malveillants - LA TECHNOLOGIE","isPartOf":{"@id":"http:\/\/technologie-sciarretta.ovh\/#website"},"primaryImageOfPage":{"@id":"http:\/\/technologie-sciarretta.ovh\/?p=177#primaryimage"},"image":{"@id":"http:\/\/technologie-sciarretta.ovh\/?p=177#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450&ssl=1","datePublished":"2017-05-24T22:30:28+00:00","dateModified":"2019-05-03T13:04:36+00:00","author":{"@id":"http:\/\/technologie-sciarretta.ovh\/#\/schema\/person\/821044ad4d97adf2bfed3e6d383f247c"},"breadcrumb":{"@id":"http:\/\/technologie-sciarretta.ovh\/?p=177#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["http:\/\/technologie-sciarretta.ovh\/?p=177"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/technologie-sciarretta.ovh\/?p=177#primaryimage","url":"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450&ssl=1","contentUrl":"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450&ssl=1","width":750,"height":450},{"@type":"BreadcrumbList","@id":"http:\/\/technologie-sciarretta.ovh\/?p=177#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"http:\/\/technologie-sciarretta.ovh\/"},{"@type":"ListItem","position":2,"name":"Les logiciels malveillants"}]},{"@type":"WebSite","@id":"http:\/\/technologie-sciarretta.ovh\/#website","url":"http:\/\/technologie-sciarretta.ovh\/","name":"LA TECHNOLOGIE","description":"par M. Sciarretta Antony","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/technologie-sciarretta.ovh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"http:\/\/technologie-sciarretta.ovh\/#\/schema\/person\/821044ad4d97adf2bfed3e6d383f247c","name":"admin9769","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"http:\/\/technologie-sciarretta.ovh\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c16bed0b0b4e450a74897d69025c1de0?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c16bed0b0b4e450a74897d69025c1de0?s=96&d=mm&r=g","caption":"admin9769"},"url":"https:\/\/technologie-sciarretta.ovh\/?author=1"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/technologie-sciarretta.ovh\/wp-content\/uploads\/2017\/05\/ver-e1496060606949.jpg?fit=750%2C450&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8LETd-2R","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=\/wp\/v2\/posts\/177","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=177"}],"version-history":[{"count":36,"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=\/wp\/v2\/posts\/177\/revisions"}],"predecessor-version":[{"id":460,"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=\/wp\/v2\/posts\/177\/revisions\/460"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=\/wp\/v2\/media\/193"}],"wp:attachment":[{"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/technologie-sciarretta.ovh\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}