{"version":"1.0","provider_name":"CAVSI","provider_url":"https:\/\/www.cavsi.com\/espanol","author_name":"admin","author_url":"https:\/\/www.cavsi.com\/espanol\/blog\/author\/admin\/","title":"\u00bfQu\u00e9 m\u00e9todos utilizan los virus inform\u00e1ticos para propagarse? - CAVSI","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"ZV8WpNP3Pz\"><a href=\"https:\/\/www.cavsi.com\/espanol\/blog\/que-metodos-utilizan-los-virus-informaticos-para-propagarse\/\">\u00bfQu\u00e9 m\u00e9todos utilizan los virus inform\u00e1ticos para propagarse?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cavsi.com\/espanol\/blog\/que-metodos-utilizan-los-virus-informaticos-para-propagarse\/embed\/#?secret=ZV8WpNP3Pz\" width=\"600\" height=\"338\" title=\"\u00ab\u00bfQu\u00e9 m\u00e9todos utilizan los virus inform\u00e1ticos para propagarse?\u00bb \u2014 CAVSI\" data-secret=\"ZV8WpNP3Pz\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cavsi.com\/espanol\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"Existen varios m\u00e9todos utilizados por los virus inform\u00e1ticos para propagase, los cuales se explican a continuaci\u00f3n: 1.- A\u00f1adidura o empalme Un virus usa el sistema de infecci\u00f3n por a\u00f1adidura cuando agrega el c\u00f3digo v\u00edrico al final de los archivos ejecutables. Los archivos ejecutables anfitriones son modificados para que, cuando se ejecuten, el control del programa se pase primero al c\u00f3digo v\u00edrico a\u00f1adido."}