{"id":26551,"date":"2021-10-06T10:33:41","date_gmt":"2021-10-06T10:33:41","guid":{"rendered":"http:\/\/35.157.126.229\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/"},"modified":"2023-02-27T17:55:37","modified_gmt":"2023-02-27T17:55:37","slug":"carte-virtuelle-19-fiche-sur-le-detournement-de-domaine","status":"publish","type":"post","link":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/","title":{"rendered":"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine"},"content":{"rendered":"<p>[et_pb_section fb_built=\u00a0\u00bb1&Prime; admin_label=\u00a0\u00bbsection\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; custom_padding=\u00a0\u00bb30px|30px|30px|30px|true|true\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_row admin_label=\u00a0\u00bbligne\u00a0\u00bb _builder_version=\u00a0\u00bb4.16&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_column type=\u00a0\u00bb4_4&Prime; _builder_version=\u00a0\u00bb4.16&Prime; custom_padding=\u00a0\u00bb|||\u00a0\u00bb global_colors_info=\u00a0\u00bb{}\u00a0\u00bb custom_padding__hover=\u00a0\u00bb|||\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb][et_pb_text admin_label=\u00a0\u00bbText\u00a0\u00bb _builder_version=\u00a0\u00bb4.19.4&Prime; background_size=\u00a0\u00bbinitial\u00a0\u00bb background_position=\u00a0\u00bbtop_left\u00a0\u00bb background_repeat=\u00a0\u00bbrepeat\u00a0\u00bb custom_padding=\u00a0\u00bb||||true|true\u00a0\u00bb hover_enabled=\u00a0\u00bb0&Prime; global_colors_info=\u00a0\u00bb{}\u00a0\u00bb theme_builder_area=\u00a0\u00bbpost_content\u00a0\u00bb sticky_enabled=\u00a0\u00bb0&Prime;]<\/p>\n<div class=\"wp-block-columns\">\n<div class=\"wp-block-column\" style=\"flex-basis: 100%;\">\n<p>Le pharming, un n\u00e9ologisme bas\u00e9 sur les mots \u00ab farming \u00bb et \u00ab phishing \u00bb, est une technique tr\u00e8s sournoise qui remplace, \u00e0 l\u2019insu de la victime, une adresse d\u2019un site internet l\u00e9gitime et redirige la victime vers un site malveillant. Cela peut se produire sans que l\u2019utilisateur se rende compte qu\u2019il a \u00e9t\u00e9 d\u00e9tourn\u00e9 vers un faux site internet qui semble \u00eatre absolument identique au site l\u00e9gitime.<\/p>\n<p>En fait, un pirate peut, \u00e0 l\u2019aide d\u2019un logiciel malveillant ou d\u2019un cheval de Troie pr\u00e9c\u00e9demment install\u00e9 sur l\u2019appareil, rediriger l\u2019utilisateur vers un site internet malveillant, m\u00eame si l\u2019utilisateur a tap\u00e9 le nom correct dans la barre d\u2019adresse du navigateur. Cette technique est largement utilis\u00e9e par les cybercriminels pour obtenir des informations sensibles, telles que les coordonn\u00e9es bancaires, les identifiants d\u2019acc\u00e8s ou pour diffuser des logiciels malveillants.<\/p>\n<p><em><strong>Dans cette fiche, quelques informations utiles pour le identifier et l\u2019\u00e9viter!<\/strong><\/em><\/p>\n<\/div>\n<\/div>\n<figure class=\"wp-block-image size-large is-resized\"><a href=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19FR-1.png\" target=\"_blank\" rel=\"noreferrer noopener\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19FR-1-724x1024.png\" alt=\"\" class=\"wp-image-25703\" width=\"821\" height=\"1161\" \/><\/a><\/figure>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Le pharming, un n\u00e9ologisme bas\u00e9 sur les mots \u00ab farming \u00bb et \u00ab phishing \u00bb, est une technique tr\u00e8s sournoise qui remplace, \u00e0 l\u2019insu de la victime, une adresse d\u2019un site internet l\u00e9gitime et redirige la victime vers un site malveillant. Cela peut se produire sans que l\u2019utilisateur se rende compte qu\u2019il a \u00e9t\u00e9 d\u00e9tourn\u00e9 [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":25709,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","content-type":"","footnotes":""},"categories":[425],"tags":[609,756,629,626,604,607],"class_list":["post-26551","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-carte","tag-carte-virtuelle","tag-cyber-security-awareness-fr","tag-detournement-de-domaine","tag-fiche","tag-sensibilisation-a-la-cybersecurite-fr-4","tag-sensibilisation-a-la-cybersecurite-fr-5"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine - Cyber Guru<\/title>\n<meta name=\"description\" content=\"Le pharming est une technique tr\u00e8s sournoise qui consiste \u00e0 substituer, \u00e0 l&#039;insu de la victime, l&#039;adresse d&#039;un site web l\u00e9gitime par une adresse malveillante...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine\" \/>\n<meta property=\"og:description\" content=\"Le pharming est une technique tr\u00e8s sournoise qui consiste \u00e0 substituer, \u00e0 l&#039;insu de la victime, l&#039;adresse d&#039;un site web l\u00e9gitime par une adresse malveillante...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Guru\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-06T10:33:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-27T17:55:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19FR.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"810\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"m.baciucco\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"m.baciucco\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/\"},\"author\":{\"name\":\"m.baciucco\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"headline\":\"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine\",\"datePublished\":\"2021-10-06T10:33:41+00:00\",\"dateModified\":\"2023-02-27T17:55:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/\"},\"wordCount\":290,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/19FR.png\",\"keywords\":[\"carte virtuelle\",\"Cyber Security Awareness\",\"d\u00e9tournement de domaine\",\"fiche\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\",\"Sensibilisation \u00e0 la cybers\u00e9curit\u00e9\"],\"articleSection\":[\"Carte\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/\",\"name\":\"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine - Cyber Guru\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/19FR.png\",\"datePublished\":\"2021-10-06T10:33:41+00:00\",\"dateModified\":\"2023-02-27T17:55:37+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\"},\"description\":\"Le pharming est une technique tr\u00e8s sournoise qui consiste \u00e0 substituer, \u00e0 l'insu de la victime, l'adresse d'un site web l\u00e9gitime par une adresse malveillante...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/19FR.png\",\"contentUrl\":\"https:\\\/\\\/www.cyberguru.it\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/19FR.png\",\"width\":1440,\"height\":810},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/2021\\\/10\\\/06\\\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/page-daccueil-v2-brouillon\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/\",\"name\":\"Cyber Guru\",\"description\":\"Security Awareness Training That Works!\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/#\\\/schema\\\/person\\\/504cb09d8c1d11292c477e0c92c2a007\",\"name\":\"m.baciucco\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g\",\"caption\":\"m.baciucco\"},\"url\":\"https:\\\/\\\/www.cyberguru.it\\\/fr\\\/author\\\/m-baciucco\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine - Cyber Guru","description":"Le pharming est une technique tr\u00e8s sournoise qui consiste \u00e0 substituer, \u00e0 l'insu de la victime, l'adresse d'un site web l\u00e9gitime par une adresse malveillante...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/","og_locale":"fr_FR","og_type":"article","og_title":"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine","og_description":"Le pharming est une technique tr\u00e8s sournoise qui consiste \u00e0 substituer, \u00e0 l'insu de la victime, l'adresse d'un site web l\u00e9gitime par une adresse malveillante...","og_url":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/","og_site_name":"Cyber Guru","article_publisher":"https:\/\/www.facebook.com\/Cyber.Guru.Enterprise","article_published_time":"2021-10-06T10:33:41+00:00","article_modified_time":"2023-02-27T17:55:37+00:00","og_image":[{"width":1440,"height":810,"url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19FR.png","type":"image\/png"}],"author":"m.baciucco","twitter_card":"summary_large_image","twitter_misc":{"\u00c9crit par":"m.baciucco","Dur\u00e9e de lecture estim\u00e9e":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/#article","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/"},"author":{"name":"m.baciucco","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"headline":"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine","datePublished":"2021-10-06T10:33:41+00:00","dateModified":"2023-02-27T17:55:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/"},"wordCount":290,"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19FR.png","keywords":["carte virtuelle","Cyber Security Awareness","d\u00e9tournement de domaine","fiche","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9","Sensibilisation \u00e0 la cybers\u00e9curit\u00e9"],"articleSection":["Carte"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/","url":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/","name":"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine - Cyber Guru","isPartOf":{"@id":"https:\/\/www.cyberguru.it\/fr\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/#primaryimage"},"thumbnailUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19FR.png","datePublished":"2021-10-06T10:33:41+00:00","dateModified":"2023-02-27T17:55:37+00:00","author":{"@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007"},"description":"Le pharming est une technique tr\u00e8s sournoise qui consiste \u00e0 substituer, \u00e0 l'insu de la victime, l'adresse d'un site web l\u00e9gitime par une adresse malveillante...","breadcrumb":{"@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/#primaryimage","url":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19FR.png","contentUrl":"https:\/\/www.cyberguru.it\/wp-content\/uploads\/2023\/02\/19FR.png","width":1440,"height":810},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberguru.it\/fr\/2021\/10\/06\/carte-virtuelle-19-fiche-sur-le-detournement-de-domaine\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberguru.it\/fr\/page-daccueil-v2-brouillon\/"},{"@type":"ListItem","position":2,"name":"Carte virtuelle #19 \u2013 Fiche sur le d\u00e9tournement de domaine"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberguru.it\/fr\/#website","url":"https:\/\/www.cyberguru.it\/fr\/","name":"Cyber Guru","description":"Security Awareness Training That Works!","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberguru.it\/fr\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/www.cyberguru.it\/fr\/#\/schema\/person\/504cb09d8c1d11292c477e0c92c2a007","name":"m.baciucco","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/974480ff129e94c2bdf9bd529bfc0f207a482cacf8276ea79c0522a275bbb586?s=96&d=mm&r=g","caption":"m.baciucco"},"url":"https:\/\/www.cyberguru.it\/fr\/author\/m-baciucco\/"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26551","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/comments?post=26551"}],"version-history":[{"count":5,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26551\/revisions"}],"predecessor-version":[{"id":27480,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/posts\/26551\/revisions\/27480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media\/25709"}],"wp:attachment":[{"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/media?parent=26551"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/categories?post=26551"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberguru.it\/fr\/wp-json\/wp\/v2\/tags?post=26551"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}