[{"id":"1347","link":"https:\/\/informaticayredes.incuve.es\/tema-4-acceso-remoto\/","name":"tema-4-acceso-remoto","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/1568667753141.jpg","alt":""},"title":"Tema 4 ACCESO REMOTO","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 18:42:24","modifiedDate":"2025-10-16 20:42:25","modifiedDateGMT":"2025-10-16 18:42:25","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":2,"sec":17},"status":"publish","content":"Tema: Herramientas de Acceso Remoto 1. Concepto de acceso remoto El acceso remoto permite controlar o gestionar un ordenador a distancia, como si se estuviera"},{"id":"1338","link":"https:\/\/informaticayredes.incuve.es\/1338-2\/","name":"1338-2","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/malware.jpg","alt":""},"title":"TEMA 4 MALWARE Y CRIPTOGRAFIA","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 17:47:59","modifiedDate":"2025-10-16 20:29:28","modifiedDateGMT":"2025-10-16 18:29:28","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":16},"status":"publish","content":"Resumen \u2013 Unidad 4: Malware y Criptograf\u00eda 4.1 Introducci\u00f3n El uso masivo de las TIC exige garantizar seguridad y confianza en los sistemas. La criptograf\u00eda"},{"id":"1335","link":"https:\/\/informaticayredes.incuve.es\/tema-3-seg-logica\/","name":"tema-3-seg-logica","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/seglog.jpg","alt":""},"title":"TEMA 3 SEG LOGICA","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 17:44:10","modifiedDate":"2025-10-16 20:33:27","modifiedDateGMT":"2025-10-16 18:33:27","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":3,"sec":4},"status":"publish","content":"UNIDAD 3: SEGURIDAD L\u00d3GICA 3.1 Introducci\u00f3n Amenaza: condici\u00f3n (persona, m\u00e1quina o suceso) que puede violar la seguridad (confidencialidad, integridad o disponibilidad). Ataque = materializaci\u00f3n de"},{"id":"1330","link":"https:\/\/informaticayredes.incuve.es\/tema-3-ftp-src\/","name":"tema-3-ftp-src","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/ftp-herramientas.png","alt":""},"title":"TEMA 3 FTP (SRC)","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 16:22:21","modifiedDate":"2025-10-16 18:22:22","modifiedDateGMT":"2025-10-16 16:22:22","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":8,"sec":23},"status":"publish","content":"Qu\u00e9 es (idea general) Servicio que permite mover o copiar ficheros entre equipos en red. Incluye protocolos (formas de comunicaci\u00f3n), servidores (software que atiende peticiones)"},{"id":"1326","link":"https:\/\/informaticayredes.incuve.es\/tema-2-dns-src\/","name":"tema-2-dns-src","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/Que-es-un-servidor-DNS-scaled.jpg","alt":""},"title":"TEMA 2 DNS (SRC)","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 16, 2025","dateGMT":"2025-10-16 16:03:30","modifiedDate":"2025-10-16 18:05:32","modifiedDateGMT":"2025-10-16 16:05:32","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":6,"sec":45},"status":"publish","content":"\u00bfQu\u00e9 es lo importante de este tema? DNS es el servicio que convierte nombres de m\u00e1quina legibles (ej. www.ejemplo.com) en direcciones IP (ej. 93.184.216.34) y"},{"id":"1321","link":"https:\/\/informaticayredes.incuve.es\/tema-2-principios-seg-y-disp\/","name":"tema-2-principios-seg-y-disp","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/10\/seg.webp","alt":""},"title":"TEMA 1 y 2 PRINCIPIOS SEG Y NORMAS","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 2, 2025","dateGMT":"2025-10-02 17:47:58","modifiedDate":"2025-10-16 20:32:35","modifiedDateGMT":"2025-10-16 18:32:35","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":50},"status":"publish","content":"CAP\u00cdTULO 1 \u00b7 Principios de seguridad y alta disponibilidad Objetivo del cap\u00edtulo: entender la problem\u00e1tica de la seguridad, los principios que la sustentan, el concepto"},{"id":"1308","link":"https:\/\/informaticayredes.incuve.es\/que-es-el-servicio-dhcp\/","name":"que-es-el-servicio-dhcp","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2024\/09\/red-LAN2-e1539806574511.jpg","alt":""},"title":"SERVICIO DHCP","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Sep 22, 2025","dateGMT":"2025-09-22 18:21:45","modifiedDate":"2025-09-30 19:46:39","modifiedDateGMT":"2025-09-30 17:46:39","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":31},"status":"publish","content":" Tema 01: Protocolo DHCP (Configuraci\u00f3n Din\u00e1mica de Host) \u00bfQu\u00e9 es el DHCP? El DHCP (Dynamic Host Configuration Protocol) es un protocolo que asigna autom\u00e1ticamente direcciones IP"},{"id":"1292","link":"https:\/\/informaticayredes.incuve.es\/recursos-compartidos\/","name":"recursos-compartidos","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/04\/js.jpg","alt":""},"title":"RECURSOS COMPARTIDOS","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Abr 23, 2025","dateGMT":"2025-04-23 09:44:11","modifiedDate":"2025-05-05 12:11:03","modifiedDateGMT":"2025-05-05 10:11:03","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/sistemas-operativos-en-red-snn\/\" rel=\"category tag\">Sistemas Operativos en Red (SNN)<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/sistemas-operativos-en-red-snn\/\" rel=\"category tag\">Sistemas Operativos en Red (SNN)<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":1,"sec":18},"status":"publish","content":"Recursos compartidos en red: Son carpetas, archivos e impresoras accesibles desde otros dispositivos conectados en red. Windows Server permite dos m\u00e9todos: compartici\u00f3n est\u00e1ndar y compartici\u00f3n"},{"id":"1281","link":"https:\/\/informaticayredes.incuve.es\/tema-03-usuarios-grupos-y-equipos\/","name":"tema-03-usuarios-grupos-y-equipos","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/03\/accdd.png","alt":""},"title":"TEMA 03 USUARIOS GRUPOS Y EQUIPOS","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Mar 28, 2025","dateGMT":"2025-03-28 12:01:23","modifiedDate":"2025-04-10 12:34:51","modifiedDateGMT":"2025-04-10 10:34:51","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":50},"status":"publish","content":"01- CREAR UNA ESTRUCTURA DE UNIDADES ORGANIZATIVAS Una vez tengamos nuestra MV funcionando con WinSRV22 y Active Directroy instalado. (Recuerda cambiar el nombre y a\u00f1adir"},{"id":"1264","link":"https:\/\/informaticayredes.incuve.es\/gestion-de-dominios-active-directory\/","name":"gestion-de-dominios-active-directory","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2025\/03\/accdd.png","alt":""},"title":"GESTION DE DOMINIOS ACTIVE DIRECTORY","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Mar 24, 2025","dateGMT":"2025-03-24 18:12:57","modifiedDate":"2025-03-26 11:08:32","modifiedDateGMT":"2025-03-26 10:08:32","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/sistemas-operativos-en-red-snn\/\" rel=\"category tag\">Sistemas Operativos en Red (SNN)<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/sistemas-operativos-en-red-snn\/\" rel=\"category tag\">Sistemas Operativos en Red (SNN)<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":10,"sec":26},"status":"publish","content":"1.-CREACI\u00d3N DE DOMINIO E INSTALACI\u00d3N DE ACTIVE DIRECTORY (WINSRV2022) Como vamos a hacerlo en una M\u00e1quina Virtual (VirtualBox) nos aseguramos en configurar la red como"},{"id":"1240","link":"https:\/\/informaticayredes.incuve.es\/buenas-practicas\/","name":"buenas-practicas","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2024\/09\/fibra-optica-e.jpg","alt":""},"title":"Buenas Practicas","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Ene 29, 2025","dateGMT":"2025-01-29 09:47:37","modifiedDate":"2025-01-29 10:50:14","modifiedDateGMT":"2025-01-29 09:50:14","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/rde\/\" rel=\"category tag\">RDE<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/rde\/\" rel=\"category tag\">RDE<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/temario\/\" rel=\"category tag\">Temario<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":0,"sec":25},"status":"publish","content":"Antes de Crimpar es recomendable lo siguiente: https:\/\/www.youtube.com\/shorts\/M35CbhnUxkA Aclaraci\u00f3n sobre nomenclaturas A y B sobre conectores hembra RJ45: https:\/\/www.youtube.com\/watch?v=lenpAZCgWKs Como hacer un latiguillo: https:\/\/www.youtube.com\/watch?v=cav37wjl-T8 Pasos"},{"id":"1167","link":"https:\/\/informaticayredes.incuve.es\/comandos-consola\/","name":"comandos-consola","thumbnail":{"url":"https:\/\/informaticayredes.incuve.es\/wp-content\/uploads\/2024\/04\/Comandos-CMD.webp","alt":""},"title":"COMANDOS CONSOLA","author":{"name":"admin","link":"https:\/\/informaticayredes.incuve.es\/author\/admin\/"},"date":"Oct 28, 2024","dateGMT":"2024-10-28 13:26:34","modifiedDate":"2025-02-27 16:46:08","modifiedDateGMT":"2025-02-27 15:46:08","commentCount":"0","commentStatus":"open","categories":{"coma":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/rde\/\" rel=\"category tag\">RDE<\/a>, <a href=\"https:\/\/informaticayredes.incuve.es\/category\/repaso\/\" rel=\"category tag\">repaso<\/a>","space":"<a href=\"https:\/\/informaticayredes.incuve.es\/category\/blog\/\" rel=\"category tag\">Blog<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/rde\/\" rel=\"category tag\">RDE<\/a> <a href=\"https:\/\/informaticayredes.incuve.es\/category\/repaso\/\" rel=\"category tag\">repaso<\/a>"},"taxonomies":{"post_tag":""},"readTime":{"min":7,"sec":22},"status":"publish","content":"1.-Configurar un Router con DHCP IP de red: 192.168.1.0 (las IPs son de ejemplo) Definimos la ip del puerto GigabitEthernet0\/0 router>enable (activa modo admin) router#configure"}]