{"version":"1.0","provider_name":"Grado de Inge Inform\u00e1tica","provider_url":"https:\/\/blogs.udima.es\/ingenieria-informatica","author_name":"Ana Lacasa","author_url":"https:\/\/blogs.udima.es\/ingenieria-informatica\/author\/ana-lacasa\/","title":"Consejos para elegir una contrase\u00f1a segura - Blog de Inform\u00e1tica","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Jhtpg9NZPB\"><a href=\"https:\/\/blogs.udima.es\/ingenieria-informatica\/consejos-para-elegir-una-contrasena-segura\/\"><strong>Consejos para elegir una contrase\u00f1a segura<\/strong><\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blogs.udima.es\/ingenieria-informatica\/consejos-para-elegir-una-contrasena-segura\/embed\/#?secret=Jhtpg9NZPB\" width=\"600\" height=\"338\" title=\"\u00ab&lt;strong&gt;Consejos para elegir una contrase\u00f1a segura&lt;\/strong&gt;\u00bb \u2014 Grado de Inge Inform\u00e1tica\" data-secret=\"Jhtpg9NZPB\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blogs.udima.es\/ingenieria-informatica\/wp-content\/uploads\/2023\/04\/contrasena-foto.jpg","thumbnail_width":1280,"thumbnail_height":854,"description":"Proteger la informaci\u00f3n personal es m\u00e1s importante que nunca. Hay muchas cuentas de correo, de redes sociales, de aplicaciones m\u00f3viles, todas ellas con una contrase\u00f1a que, en muchas ocasiones, se reutiliza para otra cosa diferente. Dado que los hackers est\u00e1n en todas partes y cualquiera puede ser v\u00edctima de un ciberataque, hay que pon\u00e9rselo lo [&hellip;]"}