{"id":1008,"date":"2023-07-19T20:10:43","date_gmt":"2023-07-19T23:10:43","guid":{"rendered":"https:\/\/fysinformatica.com\/new2\/?p=1008"},"modified":"2025-03-01T09:35:01","modified_gmt":"2025-03-01T12:35:01","slug":"caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto","status":"publish","type":"post","link":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/","title":{"rendered":"Causa Judicial &#8211; An\u00e1lisis Forense Remoto"},"content":{"rendered":"<h1><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Alternar tabla de contenidos\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#Titulo_del_caso\" >T\u00edtulo del caso<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#Descripcion_del_caso\" >Descripci\u00f3n del caso:<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#Puntos_de_pericia\" >Puntos de pericia<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#Contenido_del_informe\" >Contenido del informe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#Metodologia_utilizada\" >Metodolog\u00eda utilizada<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#Conclusiones\" >Conclusiones<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-1'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#Sentencia\" >Sentencia<\/a><\/li><\/ul><\/nav><\/div>\n<\/h1>\n<h1><span class=\"ez-toc-section\" id=\"Titulo_del_caso\"><\/span>T\u00edtulo del caso<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<ul style=\"list-style-type: disc;\">\n<li>Expediente: CNT 093392\/2016<\/li>\n<li><label>Jurisdicci\u00f3n: <\/label><span id=\"expediente:j_idt90:detailDependencia\" class=\"form_control\">C\u00c1MARA NACIONAL DE APELACIONES DEL TRABAJO <\/span><span id=\"expediente:j_idt85:detailCamera\"><\/span><\/li>\n<li class=\"row no-margin no-padding\">\n<div class=\"col-xs-12 col-sm-12 col-md-12 col-lg-12\">\n<div class=\"form-group\">\n<div><label for=\"detailDependencia\">Dependencia:\u00a0<\/label><span id=\"expediente:j_idt90:detailDependencia\" class=\"form_control\">C\u00c1MARA NACIONAL DE APELACIONES DEL TRABAJO &#8211; SALA III<\/span><\/div>\n<div><\/div>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<h1><span class=\"ez-toc-section\" id=\"Descripcion_del_caso\"><\/span>Descripci\u00f3n del caso:<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p style=\"text-align: justify;\">En este caso, se realiz\u00f3 la adquisici\u00f3n de correos electr\u00f3nicos desde la estaci\u00f3n de trabajo del actor. Debido a que la ubicaci\u00f3n era en la ciudad de Rosario, Santa Fe, el procedimiento se llev\u00f3 a cabo de forma remota, permitiendo luego analizar la evidencia en el laboratorio. Durante este proceso, se logr\u00f3 recuperar informaci\u00f3n relevante, incluyendo correos electr\u00f3nicos de gran importancia, los cuales resultaron fundamentales para el posterior dictamen judicial.<\/p>\n<h1><span class=\"ez-toc-section\" id=\"Puntos_de_pericia\"><\/span>Puntos de pericia<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>La siguiente imagen muestra los puntos de perica de la causa.<\/p>\n<h1><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1013 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Puntos-de-pericia-CNT-093392-2016-300x125.png\" alt=\"\" width=\"571\" height=\"238\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Puntos-de-pericia-CNT-093392-2016-300x125.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Puntos-de-pericia-CNT-093392-2016.png 516w\" sizes=\"auto, (max-width: 571px) 100vw, 571px\" \/><\/h1>\n<h1><span class=\"ez-toc-section\" id=\"Contenido_del_informe\"><\/span>Contenido del informe<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>La siguiente imagen muestra en detalle el contenido del informe.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1014 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Contenido-1-CNT-093392-2016-300x229.png\" alt=\"\" width=\"586\" height=\"447\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Contenido-1-CNT-093392-2016-300x229.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Contenido-1-CNT-093392-2016.png 617w\" sizes=\"auto, (max-width: 586px) 100vw, 586px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1015 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Contenido-2-CNT-093392-2016-300x110.png\" alt=\"\" width=\"597\" height=\"219\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Contenido-2-CNT-093392-2016-300x110.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Contenido-2-CNT-093392-2016.png 617w\" sizes=\"auto, (max-width: 597px) 100vw, 597px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h1><span class=\"ez-toc-section\" id=\"Metodologia_utilizada\"><\/span>Metodolog\u00eda utilizada<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>Para el presente caso, se aplicaron las <a href=\"https:\/\/fysinformatica.com\/new2\/2023\/01\/15\/fases-del-analisis-informatico-forense\/\" target=\"_blank\" rel=\"noopener\">Fases del An\u00e1lisis Inform\u00e1tico Forense<\/a><\/p>\n<p>&nbsp;<\/p>\n<h1><span class=\"ez-toc-section\" id=\"Conclusiones\"><\/span>Conclusiones<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>A continuaci\u00f3n, se muestra la conclusi\u00f3n del informe pericial en la siguiente imagen:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1018 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusion-1-CNT-093392-2016-300x262.png\" alt=\"\" width=\"603\" height=\"526\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusion-1-CNT-093392-2016-300x262.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusion-1-CNT-093392-2016.png 614w\" sizes=\"auto, (max-width: 603px) 100vw, 603px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1019 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusion-2-CNT-093392-2016-300x243.png\" alt=\"\" width=\"637\" height=\"516\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusion-2-CNT-093392-2016-300x243.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusion-2-CNT-093392-2016.png 637w\" sizes=\"auto, (max-width: 637px) 100vw, 637px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1020 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusion-3-CNT-093392-2016-300x163.png\" alt=\"\" width=\"634\" height=\"345\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusion-3-CNT-093392-2016-300x163.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Conclusion-3-CNT-093392-2016.png 615w\" sizes=\"auto, (max-width: 634px) 100vw, 634px\" \/><\/p>\n<p>&nbsp;<\/p>\n<h1><span class=\"ez-toc-section\" id=\"Sentencia\"><\/span>Sentencia<span class=\"ez-toc-section-end\"><\/span><\/h1>\n<p>A continuaci\u00f3n, se presenta una imagen que muestra un fragmento de la sentencia judicial, en el cual se toma en consideraci\u00f3n la tarea llevada a cabo en el proceso.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1023 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentenica-1-CNT-093392-2016-300x66.png\" alt=\"\" width=\"618\" height=\"136\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentenica-1-CNT-093392-2016-300x66.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentenica-1-CNT-093392-2016.png 395w\" sizes=\"auto, (max-width: 618px) 100vw, 618px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-1027 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-2-CNT-093392-2016-231x300.png\" alt=\"\" width=\"625\" height=\"811\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-2-CNT-093392-2016-231x300.png 231w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-2-CNT-093392-2016.png 402w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1026 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-3CNT-093392-2016-231x300.png\" alt=\"\" width=\"625\" height=\"811\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-3CNT-093392-2016-231x300.png 231w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-3CNT-093392-2016.png 400w\" sizes=\"auto, (max-width: 625px) 100vw, 625px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1025 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-4-CNT-093392-2016-232x300.png\" alt=\"\" width=\"634\" height=\"819\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-4-CNT-093392-2016-232x300.png 232w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-4-CNT-093392-2016.png 401w\" sizes=\"auto, (max-width: 634px) 100vw, 634px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-1024 aligncenter\" src=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-5-CNT-093392-2016-300x86.png\" alt=\"\" width=\"631\" height=\"181\" srcset=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-5-CNT-093392-2016-300x86.png 300w, https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Sentencia-5-CNT-093392-2016.png 396w\" sizes=\"auto, (max-width: 631px) 100vw, 631px\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>T\u00edtulo del caso Expediente: CNT 093392\/2016 Jurisdicci\u00f3n: C\u00c1MARA NACIONAL DE APELACIONES DEL TRABAJO Dependencia:\u00a0C\u00c1MARA NACIONAL DE APELACIONES DEL TRABAJO &#8211; SALA III Descripci\u00f3n del caso: En este caso, se realiz\u00f3 la adquisici\u00f3n de correos electr\u00f3nicos desde la estaci\u00f3n de trabajo del actor. Debido a que la ubicaci\u00f3n era en la ciudad de Rosario, Santa Fe, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1032,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[54],"tags":[],"class_list":["post-1008","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-portfolio"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Causa Judicial - An\u00e1lisis Forense Remoto - Perito Inform\u00e1tico Forense<\/title>\n<meta name=\"description\" content=\"Caso - Forensia de correos electr\u00f3nicos adquiridos con acceso remoto\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/\" \/>\n<meta property=\"og:locale\" content=\"es_ES\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Causa Judicial - An\u00e1lisis Forense Remoto - Perito Inform\u00e1tico Forense\" \/>\n<meta property=\"og:description\" content=\"Caso - Forensia de correos electr\u00f3nicos adquiridos con acceso remoto\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/\" \/>\n<meta property=\"og:site_name\" content=\"Perito Inform\u00e1tico Forense\" \/>\n<meta property=\"article:published_time\" content=\"2023-07-19T23:10:43+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-03-01T12:35:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-6.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Fabi\u00e1n Abel Rocha\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fabi\u00e1n Abel Rocha\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tiempo de lectura\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/\"},\"author\":{\"name\":\"Fabi\u00e1n Abel Rocha\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#\\\/schema\\\/person\\\/5ec1f03e4a0ea7b72643b272b7236c13\"},\"headline\":\"Causa Judicial &#8211; An\u00e1lisis Forense Remoto\",\"datePublished\":\"2023-07-19T23:10:43+00:00\",\"dateModified\":\"2025-03-01T12:35:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/\"},\"wordCount\":209,\"publisher\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#\\\/schema\\\/person\\\/5ec1f03e4a0ea7b72643b272b7236c13\"},\"image\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Diseno-de-imagen-6.png\",\"articleSection\":[\"Portfolio\"],\"inLanguage\":\"es\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/\",\"url\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/\",\"name\":\"Causa Judicial - An\u00e1lisis Forense Remoto - Perito Inform\u00e1tico Forense\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Diseno-de-imagen-6.png\",\"datePublished\":\"2023-07-19T23:10:43+00:00\",\"dateModified\":\"2025-03-01T12:35:01+00:00\",\"description\":\"Caso - Forensia de correos electr\u00f3nicos adquiridos con acceso remoto\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/#breadcrumb\"},\"inLanguage\":\"es\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/#primaryimage\",\"url\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Diseno-de-imagen-6.png\",\"contentUrl\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/wp-content\\\/uploads\\\/2023\\\/07\\\/Diseno-de-imagen-6.png\",\"width\":960,\"height\":540},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Portada\",\"item\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Causa Judicial &#8211; An\u00e1lisis Forense Remoto\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#website\",\"url\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/\",\"name\":\"Perito Inform\u00e1tico Forense\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#\\\/schema\\\/person\\\/5ec1f03e4a0ea7b72643b272b7236c13\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"es\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/#\\\/schema\\\/person\\\/5ec1f03e4a0ea7b72643b272b7236c13\",\"name\":\"Fabi\u00e1n Abel Rocha\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"es\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g\",\"caption\":\"Fabi\u00e1n Abel Rocha\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g\"},\"sameAs\":[\"https:\\\/\\\/fysinformatica.com\\\/new2\"],\"url\":\"https:\\\/\\\/fysinformatica.com\\\/new2\\\/author\\\/frocha\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Causa Judicial - An\u00e1lisis Forense Remoto - Perito Inform\u00e1tico Forense","description":"Caso - Forensia de correos electr\u00f3nicos adquiridos con acceso remoto","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/","og_locale":"es_ES","og_type":"article","og_title":"Causa Judicial - An\u00e1lisis Forense Remoto - Perito Inform\u00e1tico Forense","og_description":"Caso - Forensia de correos electr\u00f3nicos adquiridos con acceso remoto","og_url":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/","og_site_name":"Perito Inform\u00e1tico Forense","article_published_time":"2023-07-19T23:10:43+00:00","article_modified_time":"2025-03-01T12:35:01+00:00","og_image":[{"width":960,"height":540,"url":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-6.png","type":"image\/png"}],"author":"Fabi\u00e1n Abel Rocha","twitter_card":"summary_large_image","twitter_misc":{"Escrito por":"Fabi\u00e1n Abel Rocha","Tiempo de lectura":"4 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#article","isPartOf":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/"},"author":{"name":"Fabi\u00e1n Abel Rocha","@id":"https:\/\/fysinformatica.com\/new2\/#\/schema\/person\/5ec1f03e4a0ea7b72643b272b7236c13"},"headline":"Causa Judicial &#8211; An\u00e1lisis Forense Remoto","datePublished":"2023-07-19T23:10:43+00:00","dateModified":"2025-03-01T12:35:01+00:00","mainEntityOfPage":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/"},"wordCount":209,"publisher":{"@id":"https:\/\/fysinformatica.com\/new2\/#\/schema\/person\/5ec1f03e4a0ea7b72643b272b7236c13"},"image":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#primaryimage"},"thumbnailUrl":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-6.png","articleSection":["Portfolio"],"inLanguage":"es"},{"@type":"WebPage","@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/","url":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/","name":"Causa Judicial - An\u00e1lisis Forense Remoto - Perito Inform\u00e1tico Forense","isPartOf":{"@id":"https:\/\/fysinformatica.com\/new2\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#primaryimage"},"image":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#primaryimage"},"thumbnailUrl":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-6.png","datePublished":"2023-07-19T23:10:43+00:00","dateModified":"2025-03-01T12:35:01+00:00","description":"Caso - Forensia de correos electr\u00f3nicos adquiridos con acceso remoto","breadcrumb":{"@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#breadcrumb"},"inLanguage":"es","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/"]}]},{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#primaryimage","url":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-6.png","contentUrl":"https:\/\/fysinformatica.com\/new2\/wp-content\/uploads\/2023\/07\/Diseno-de-imagen-6.png","width":960,"height":540},{"@type":"BreadcrumbList","@id":"https:\/\/fysinformatica.com\/new2\/caso-forensia-de-correos-electronicos-adquiridos-con-acceso-remoto\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Portada","item":"https:\/\/fysinformatica.com\/new2\/"},{"@type":"ListItem","position":2,"name":"Causa Judicial &#8211; An\u00e1lisis Forense Remoto"}]},{"@type":"WebSite","@id":"https:\/\/fysinformatica.com\/new2\/#website","url":"https:\/\/fysinformatica.com\/new2\/","name":"Perito Inform\u00e1tico Forense","description":"","publisher":{"@id":"https:\/\/fysinformatica.com\/new2\/#\/schema\/person\/5ec1f03e4a0ea7b72643b272b7236c13"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fysinformatica.com\/new2\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"es"},{"@type":["Person","Organization"],"@id":"https:\/\/fysinformatica.com\/new2\/#\/schema\/person\/5ec1f03e4a0ea7b72643b272b7236c13","name":"Fabi\u00e1n Abel Rocha","image":{"@type":"ImageObject","inLanguage":"es","@id":"https:\/\/secure.gravatar.com\/avatar\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g","caption":"Fabi\u00e1n Abel Rocha"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/8c8f49babfab8102e90e4cbe9472df2cbb160e9ea66074070642c8e707185647?s=96&d=mm&r=g"},"sameAs":["https:\/\/fysinformatica.com\/new2"],"url":"https:\/\/fysinformatica.com\/new2\/author\/frocha\/"}]}},"_links":{"self":[{"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/posts\/1008","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/comments?post=1008"}],"version-history":[{"count":18,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/posts\/1008\/revisions"}],"predecessor-version":[{"id":1673,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/posts\/1008\/revisions\/1673"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/media\/1032"}],"wp:attachment":[{"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/media?parent=1008"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/categories?post=1008"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fysinformatica.com\/new2\/wp-json\/wp\/v2\/tags?post=1008"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}