{"id":39511,"date":"2015-03-02T08:00:35","date_gmt":"2015-03-02T12:00:35","guid":{"rendered":"http:\/\/sosuaonline.net\/inicio\/?p=39511"},"modified":"2015-03-01T22:44:17","modified_gmt":"2015-03-02T02:44:17","slug":"cual-es-el-origen-del-termino-virus-informatico","status":"publish","type":"post","link":"https:\/\/sosuaonline.net\/inicio\/cual-es-el-origen-del-termino-virus-informatico\/","title":{"rendered":"\u00bfCu\u00e1l es el origen del t\u00e9rmino virus inform\u00e1tico?"},"content":{"rendered":"<p><a href=\"http:\/\/sosuaonline.net\/inicio\/wp-content\/uploads\/2015\/03\/dtjhrtjurs65y74543.jpg\"><img loading=\"lazy\" decoding=\"async\" data-attachment-id=\"39512\" data-permalink=\"https:\/\/sosuaonline.net\/inicio\/cual-es-el-origen-del-termino-virus-informatico\/dtjhrtjurs65y74543\/\" data-orig-file=\"https:\/\/sosuaonline.net\/inicio\/wp-content\/uploads\/2015\/03\/dtjhrtjurs65y74543.jpg\" data-orig-size=\"600,400\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"dtjhrtjurs65y74543\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/sosuaonline.net\/inicio\/wp-content\/uploads\/2015\/03\/dtjhrtjurs65y74543-300x200.jpg\" data-large-file=\"https:\/\/sosuaonline.net\/inicio\/wp-content\/uploads\/2015\/03\/dtjhrtjurs65y74543.jpg\" class=\"size-medium wp-image-39512 alignleft\" src=\"http:\/\/sosuaonline.net\/inicio\/wp-content\/uploads\/2015\/03\/dtjhrtjurs65y74543-300x200.jpg\" alt=\"dtjhrtjurs65y74543\" width=\"300\" height=\"200\" srcset=\"https:\/\/sosuaonline.net\/inicio\/wp-content\/uploads\/2015\/03\/dtjhrtjurs65y74543-300x200.jpg 300w, https:\/\/sosuaonline.net\/inicio\/wp-content\/uploads\/2015\/03\/dtjhrtjurs65y74543.jpg 600w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a>El t\u00e9rmino \u201cvirus inform\u00e1tico\u201d, cuya comparaci\u00f3n con un <label>virus<\/label> <label>biol\u00f3gico<\/label> es bastante similar, ya que ambos insertan su esencia (el c\u00f3digo <label>fuente<\/label> maligno en el caso del inform\u00e1tico) en sistemas que funcionan normalmente y lo alteran de diversas maneras dependiendo su tipolog\u00eda.<!--more--><\/p>\n<p>Existen virus cifrados, polim\u00f3rficos, residentes, de sobreescritura, troyanos, <label>gusanos<\/label>&#8230; pero todos ellos tienen un antepasado com\u00fan. El primer virus inform\u00e1tico del que se tiene constancia es \u201cCreeper\u201d, un malware que atac\u00f3 a una m\u00e1quina <label>IBM<\/label> Serie 360 en 1972. El virus en cuesti\u00f3n mostraba en la pantalla el mensaje \u201cI&#8217;m a creeper&#8230; catch me if you can!\u201d (\u00a1Soy una enredadera&#8230; ag\u00e1rrame si puedes!) y para eliminarlo se cre\u00f3 el primer antivirus del mundo bautizado como \u201cReaper\u201d (cortadora).<\/p>\n<p>A pesar de que la aparici\u00f3n del primer virus inform\u00e1tico se remonta a primeros de los 70, la adopci\u00f3n del t\u00e9rmino \u201cvirus inform\u00e1tico\u201d no se produjo hasta 1984, a\u00f1o en el que el cient\u00edfico inform\u00e1tico americano Fred Cohen defini\u00f3 el t\u00e9rmino en su art\u00edculo \u201cExperimentos con virus inform\u00e1ticos\u201d. Cohen, es mundialmente conocido por su pionero trabajo sobre los virus y sus t\u00e9cnicas de defensa contra los mismos.<\/p>\n<p><strong>Fuente:<\/strong> <a href=\"http:\/\/www.muyinteresante.es\/tecnologia\/preguntas-respuestas\/cual-es-el-origen-del-termino-virus-informatico-841425047231\" target=\"_blank\">Muyinteresante<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>El t\u00e9rmino \u201cvirus inform\u00e1tico\u201d, cuya comparaci\u00f3n con un virus biol\u00f3gico es bastante similar, ya que ambos insertan su esencia (el c\u00f3digo fuente maligno en el caso del inform\u00e1tico) en sistemas que funcionan normalmente y lo alteran de diversas maneras dependiendo su tipolog\u00eda.<\/p>\n","protected":false},"author":3,"featured_media":39512,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"advanced_seo_description":"","jetpack_seo_html_title":"","jetpack_seo_noindex":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[10],"tags":[],"class_list":["post-39511","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciencia-tecnologia"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/sosuaonline.net\/inicio\/wp-content\/uploads\/2015\/03\/dtjhrtjurs65y74543.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/posts\/39511","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/comments?post=39511"}],"version-history":[{"count":1,"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/posts\/39511\/revisions"}],"predecessor-version":[{"id":39513,"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/posts\/39511\/revisions\/39513"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/media\/39512"}],"wp:attachment":[{"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/media?parent=39511"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/categories?post=39511"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sosuaonline.net\/inicio\/wp-json\/wp\/v2\/tags?post=39511"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}