{"id":68,"date":"2015-09-14T14:25:48","date_gmt":"2015-09-14T12:25:48","guid":{"rendered":"http:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/?p=68"},"modified":"2015-09-16T13:19:09","modified_gmt":"2015-09-16T11:19:09","slug":"moochackingmu-en-graffiti-radio-euskadi-2","status":"publish","type":"post","link":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/2015\/09\/14\/moochackingmu-en-graffiti-radio-euskadi-2\/","title":{"rendered":"#moocHackingMU en Graffiti (Radio Euskadi)"},"content":{"rendered":"<p>A finales de agosto el director de #moocHackingMU, <a href=\"https:\/\/twitter.com\/dezarri\" target=\"_blank\">Miguel Fern\u00e1ndez<\/a>, fue entrevistado en el programa <a href=\"http:\/\/www.eitb.eus\/es\/radio\/radio-euskadi\/programas\/graffiti\/\" target=\"_blank\">Graffiti de Radio Euskadi<\/a>, en el que no s\u00f3lo explic\u00f3\u00a0qu\u00e9 es el Hacking \u00c9tico y en qu\u00e9 consiste el curso de Mondrag\u00f3n Unibertsitatea, sino que adem\u00e1s contest\u00f3\u00a0varias\u00a0preguntas sobre seguridad e Internet.<\/p>\n<p>Si te lo perdiste ahora puedes escucharlo:<\/p>\n<p><iframe loading=\"lazy\" width=\"100%\" height=\"200\" frameborder=\"0\" allowfullscreen=\"\" scrolling=\"no\" src=\"http:\/\/www.ivoox.com\/player_ej_7763550_2_1.html?data=mJyjlZqZdI6ZmKiak5WJd6KolZKSmaiRdo6ZmKiakpKJe6ShkZKSmaiRic%2Fo08rjy9jYpYzZz5C01MbKqsroypCSlJ22pcXd0JCy19jPpcXdhpemj4qbh47B0NTQqsbHr8riyLLCj4qbh46o&#038;\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A finales de agosto el director de #moocHackingMU, Miguel Fern\u00e1ndez, fue entrevistado en el programa Graffiti de Radio Euskadi, en el que no s\u00f3lo explic\u00f3\u00a0qu\u00e9 es el Hacking \u00c9tico y en qu\u00e9 consiste el curso de Mondrag\u00f3n Unibertsitatea, sino que adem\u00e1s contest\u00f3\u00a0varias\u00a0preguntas sobre seguridad e Internet. Si te lo perdiste ahora puedes escucharlo:<\/p>\n","protected":false},"author":256,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[11],"tags":[13,12,14,7],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/posts\/68"}],"collection":[{"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/users\/256"}],"replies":[{"embeddable":true,"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/comments?post=68"}],"version-history":[{"count":12,"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/posts\/68\/revisions"}],"predecessor-version":[{"id":84,"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/posts\/68\/revisions\/84"}],"wp:attachment":[{"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/media?parent=68"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/categories?post=68"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mukom.mondragon.edu\/mooc-hacking-etico\/wp-json\/wp\/v2\/tags?post=68"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}