Documentos de Académico
Documentos de Profesional
Documentos de Cultura
Unidad 5
t*OTUBMBS
QSPCBSZBDUVBMJ[BS
BQMJDBDJPOFTFTQFDÓGJDBTQBSBMB
EFUFDDJØOZFMJNJOBDJØOEFTPGUXBSF
NBMJDJPTP
t$MBTJGJDBSZEFUFDUBSMBTQSJODJQBMFT
JODJEFODJBTZBNFOB[BTMØHJDBTEFVO
TVCTJTUFNBMØHJDP
t"QMJDBSUÏDOJDBTEFNPOJUPSJ[BDJØO
EFBDDFTPTZBDUJWJEBEJEFOUJGJDBOEP
TJUVBDJPOFTBOØNBMBT
t7BMPSBSMBTWFOUBKBTRVFTVQPOFMB
VUJMJ[BDJØOEFTJTUFNBTCJPNÏUSJDPT
Y estudiaremos:
t-BTFHVSJEBEFOFMBSSBORVFZFO
QBSUJDJPOFT
t-BTBDUVBMJ[BDJPOFTZQBSDIFTEF
TFHVSJEBEFOFMTJTUFNBZFOMBT
BQMJDBDJPOFT
t-BBVUFOUJDBDJØOEFVTVBSJPT
t-JTUBTEFDPOUSPMEFBDDFTP
t-BNPOJUPSJ[BDJØOEFMTJTUFNB
t&MTPGUXBSFRVFWVMOFSBMBTFHVSJEBE
EFMTJTUFNB
%FCJEP B MPT OVNFSPTPT GBCSJ Definimos la clave de supervisor para proteger el acceso a la BIOS
DBOUFT EF #*04 RVF IBZ FO FM $POFTUBQSÈDUJDBWBNPTBQSPUFHFSFMBDDFTPBMB#*04DPOUSBQFSTPOBTOP
NFSDBEP
SFDPNFOEBNPTDPOTVM
BVUPSJ[BEBTZBTÓEJGJDVMUBSFMBDDFTPBMFRVJQPBEJDIPQFSTPOBM
UBSFMNBOVBMEFMBQMBDBCBTF
QBSBWFSMBTJOTUSVDDJPOFTFTQF 1. "M FOUSBS B MB #*04
DÓGJDBT
BDDFEFNPTBMBQBOUB
MMBQSJODJQBM 'JH
/PTEFTQMB[BNPTQPS
FM NFOÞ IBTUB MB PQ
DJØO Security RVF TF
NVFTUSB FO MB QBSUF
TVQFSJPSEFMBJNBHFO
Importante 'JH
1BSBFOUSBSFOMB#*04EFCFNPT
QVMTBSMBUFDMB SupPF2 BMJOJDJBS
FMPSEFOBEPS
BVORVFFTUPSFBM
NFOUFEFQFOEFEFMB#*04EFM
FRVJQP&OFMMJCSPTFIBIFDIP
VTPEFMB#*04EF7.8BSF Fig. 5.1. Menú principal BIOS. (Continúa)
106
(Continuación)
-B'JHVSBNVFTUSBMBTPQDJPOFTEFTFHVSJEBERVFQP
A EFNPTDPOGJHVSBSZFMFTUBEPEFMBTNJTNBT
A $PNPQPEFNPTWFSFOEJDIBGJHVSB
MBDPOUSBTF×BEF
B
4VQFSWJTPSFTUÈWBDÓB(Clear); DPOFTUBPQDJØOQFSNJUJ
NPTMBNPEJGJDBDJØOEFMB#*04BDVBMRVJFSQFSTPOB
"TÓ
VOJOUSVTPQPESÓBBDDFEFSBMB#*04ZNPEJGJDBSMB
TFDVFODJBEFBSSBORVFEFMFRVJQP 1SJNFSPEFTEF$%
TFHVOEPEFTEF-"/
UFSDFSPEFTEF)%
&MJOUSVTPQPESÓBSFJOJDJBSFMPSEFOBEPSDPOVO$%QSP
WJTUP EF TPGUXBSF NBMJOUFODJPOBEP RVF MF QFSNJUJSÓB
EFTDVCSJSBMPTVTVBSJPTZMBTDPOUSBTF×BTEFMFRVJQP
$POMBJOGPSNBDJØODPOTFHVJEB
UFOESÓBBDDFTPBMPT
EBUPTDPOGJEFODJBMFTEFUPEPTMPTVTVBSJPTEFMTJTUFNB
B $POFMGJOEFFWJUBSMPTQPTJCMFTJOUFOUPTEFNPEJGJDB
Fig. 5.2. Menú Seguridad. DJØOEFMB#*04
EFGJOJNPTVOBOVFWBDPOUSBTF×BQBSB
FM4VQFSWJTPS
2. 1VMTBNPTEnter FOMBPQDJØOSet Supervisor Password
%FGJOJSDMBWFEFM4VQFSWJTPS
3. 4FBCSFVOOVFWPDVBESPEFEJÈMPHP 'JH
FOFM
RVFFTDSJCJNPTMBDPOUSBTF×BQBSBFM4VQFSWJTPSZQPT
UFSJPSNFOUF MB WFSJGJDBNPT FTDSJCJÏOEPMB OVFWBNFOUF
FOFMDBNQPEFDPOGJSNBDJØO
"
DPOUJOVBDJØOOPTBWJTBSÈEFRVFMPTDBNCJPTTFIBO
SFBMJ[BEPDPOÏYJUP
$
PNPWFNPTFOMB'JHVSBMBDPOUSBTF×BEF4VQFS
WJTPSGJHVSBDPNPBTJHOBEB(Set).
" QBSUJS EF FTUF NPNFOUP TJFNQSF RVF RVFSBNPT BD
DFEFS B MB #*04 OPT FYJHJSÈ RVF FTDSJCBNPT MB DPO
USBTF×BEF4VQFSWJTPS
FODBTPDPOUSBSJPEFOFHBSÈFM
BDDFTP
Fig. 5.3. Introducción de contraseña.
4. 0USB NFEJEB EF TFHVSJEBE BEJDJPOBM RVF QPEFNPT
DPOGJHVSBS FO MB #*04 FWJUBSRVFQFSTPOBMOPBVUPSJ
[BEPBDDFEBBMTJTUFNBJOUSPEVDJFOEPMBDMBWFEF4V
QFSWJTPS FO FM NPNFOUP EF BSSBODBS FM FRVJQP 1BSB
FMMPBDUJWBSFNPTMBPQDJØOEFPassword on boot DPO
USBTF×B FO FM BSSBORVF
&T EFDJS
MB DPOUSBTF×B RVF
EFGJOJNPT FO MB #*04 TFSÈ TPMJDJUBEB BM VTVBSJP UBOUP
FOFMBDDFTPBMB#*04DPNPFOFMBDDFTPBMTJTUFNB
PQFSBUJWPPHFTUPSEFBSSBORVF
&
OSFTVNFO
DPOFTUBTNFEJEBTIFNPTFWJUBEPRVFQFS
TPOBTOPBVUPSJ[BEBTQVFEBONPEJGJDBSMBDPOGJHVSB
DJØOEFMB#*04QFSNJUJFOEP
QPSFKFNQMP
FMBSSBORVF
EFMTJTUFNBNFEJBOUFEJTQPTJUJWPTFYUSBÓCMFT
ZBDDFEFS
BTÓBMPTEBUPTBMNBDFOBEPTFOFMFRVJQPWVMOFSBOEP
MBDPOGJEFODJBMJEBEEFFTUPT
107
Vocabulario
108
109
Caso práctico 4
Caso práctico 5
Establecer contraseña del gestor de arranque mediante la tionados por el GRUB a personal no autorizado utilizando
aplicación startupmanager en LINUX, distribución Ubuntu una aplicación visual
9.04, para evitar el acceso a los sistemas operativos ges-
110
Actividades
3. )B[FM$BTPQSÈDUJDPFKFDVUBOEPFMQSPHSBNBEJSFD 4. $PNQSVFCBTJFMQSPHSBNBTUBSUVQNBOBHFSFTDSJCFMBT
UBNFOUFFOFMUFSNJOBM DPOUSBTF×BTFOFMBSDIJWPmenu.lstEFM(36#DJGSBEBT
3FDVFSEBRVFEFCFSÈTUFOFSQSJWJMFHJPTEFBENJOJTUSB PFOUFYUPDMBSP
EPSQBSBQPEFSSFBMJ[BSMP
111
Caso práctico 6
2. 6OBWF[JOTUBMBEPFKFDVUBNPTMBBQMJDBDJØOEDSZQU
112
(Continuación)
3. -BTFMFDDJPOBNPTZIBDFNPTDMJDTPCSFFMCPUØO&ODSZQU
$PNPIFNPTWJTUPFOMB'JHVSBMBBQMJDBDJØOWJTVBMJ[B DJGSBS
1PTUFSJPSNFOUFEFCFSFNPTTFMFDDJPOBSFOUSFMPT
MBT VOJEBEFT EF EJTDP RVF QVFEFT FODSJQUBS &O OVFTUSP EJTUJOUPTBMHPSJUNPTEFFODSJQUBDJØO "&4
5XPGJTI
4FS
DBTP
MPRVFRVFSFNPTFODSJQUBSFTMB%
VOJEBEEFEJDBEB QFOU
"&45XPGJTI
4FSQFOU"&4
"&45XPGJTI4FSQFOUy
BEBUPT ZIBDFSDMJDFOFMCPUØONext TJHVJFOUF
113
Caso práctico 7
&OMB'JHVSBWFNPTVOBMJTUBEFUPEBTMBTVOJEBEFTEF -BQSJNFSBEFFMMBTFTMBRVFFMQSPHSBNBSFDPNJFOEB
5SVF$SZQU$PNPBDBCBNPTEFJOTUBMBSMP
OPUJFOFOJOHVOB QBSBFMQFSTPOBMJOFYQFSUP&OFTUFDBTPOPFTOFDFTB
EFFMMBTBTJHOBEB SJPGPSNBUFBSMBVOJEBE
TPMPDSFBVOBDBSQFUBEPOEF
TVDPOUFOJEPTFSÈDJGSBEP
3. 1BSBDJGSBSMBVOJEBEEF64#
EFCFNPTIBDFSDMJDFOFM
CPUØOCreate Volume DSFBSVOJEBE
"DPOUJOVBDJØO
TF 4. -BTFHVOEBPQDJØOTFSÈMBRVFTFMFDDJPOBSFNPTQBSB
BCSJSÈVOBWFOUBOB
FOMBRVFTFNVFTUSBOEPTPQDJPOFT BMDBO[BSOVFTUSPPCKFUJWP-BBQMJDBDJØOOPTBEWJFSUF
RVFBMSFBMJ[BSFTUBFMFDDJØOTFGPSNBUFBSÈMBVOJEBEZ
tCreate an encrypted file container DSFBSVOBDBSQFUB
DJGSBSÈMBQBSUJDJØO"DPOUJOVBDJØO
EFCFSFNPTWFSVOB
DJGSBEB
OVFWBQBOUBMMBTJNJMBSBMB'JHVSB
tCreate a volumen within a partition/drive DSFBSVOB
VOJEBEQBSBVOBQBSUJDJØOPEJTQPTJUJWP
114
(Continuación)
7. "QBSFDFVOBQBOUBMMB 'JH
DPOUPEPTMPTEJTQP 8. 1PTUFSJPSNFOUF
DPNPQPEFNPTWFSFOMBJNBHFO 'JH
TJUJWPT EF BMNBDFOBNJFOUP RVF UFOFNPT DPOFDUBEPT
EFCFNPT TFMFDDJPOBS FM BMHPSJUNP EF FODSJQ
BMPSEFOBEPS4FMFDDJPOBNPTFMEJTQPTJUJWP64#SFDP UBDJØO -BT PQDJPOFT TPO OVNFSPTBT
"&4
#MPXGJTI
OPDJEPFOOVFTUSPDBTPDPNPEFWTECEF.# 4FSQFOU
5XPGJTI
"&45XPGJTI4FSQFOUy &O OVFTUSP
%FQFOEJFOEPEFMBEJTUSJCVDJØOEF-JOVYZEFMPTEJT FKFNQMPIFNPTTFMFDDJPOBEPFMBMHPSJUNP"&45XPGJTI
UJOUPTEJTQPTJUJWPTDPOFDUBEPTFOFMFRVJQPQVFEFTFS 4FSQFOUZ3*1&.%QBSBHFOFSBSMBDMBWF"DPOUJ
SFDPOPDJEBDPOPUSPOPNCSF OVBDJØOIBDFNPTDMJDTPCSFFMCPUØONext.
Fig. 5.22. Selección de partición. Fig. 5.23. Elección del algoritmo de cifrado.
9. "QBSFDFVOBOVFWBQBOUBMMB 'JH
FOMBRVFJOUSP DPNCJOBDJØOEFMFUSBTNBZÞTDVMBT
NJOÞTDVMBT
OÞNFSPT
EVDJSFNPTMBDPOUSBTF×B&OFTUFQVOUP
MBBQMJDBDJØO Z DBSBDUFSFT FTQFDJBMFT
!
y 3FDPNJFOEB RVF FM
OPTBEWJFSUFEFMBJNQPSUBODJBEFFMFHJSVOBCVFOBDPO UBNB×PEFMBNJTNBTFBEFNÈTEFDBSBDUFSFT
USBTF×BRVFOPTFBOQBMBCSBTRVFQPEBNPTFODPOUSBS
VBOUPNBZPSTFBFMOÞNFSP
NFOPTWVMOFSBCMFTFSÈMB
$
FOEJDDJPOBSJPTPDPNCJOBDJPOFTEFWBSJBT-BDMBWFOP
DPOUSBTF×B
EFCFUFOFSJOGPSNBDJØOQFSTPOBMDPNPOPNCSFPGFDIB
EF OBDJNJFOUP 6OB CVFOB DPOUSBTF×B EFCF TFS VOB 5SVF$SZQUBENJUFDPOUSBTF×BTEFIBTUBDBSBDUFSFT
(Continúa)
115
Caso práctico 7
(Continuación)
116
117
Actividades
118
119
1BSB FKFDVUBS MB BQMJDBDJØO UFOESFNPT RVF BCSJS VO OBWFHBEPS XFC
FO OVFTUSP DBTP
'JSFGPY
F JS B MB TJHVJFOUF EJSFDDJØO IUUQTMPDBMIPTU &T NVZ QSPCBCMF RVF BM
BDDFEFSBEJDIBEJSFDDJØOFMTJTUFNBOPTEFWVFMWBVOFSSPSDPNPFMRVFTFNVFTUSBFO
MB'JHVSB
1BSBTPMVDJPOBSEJDIPFSSPSEFCFNPTDSFBSVOBFYDFQDJØO
"DPOUJOVBDJØOBQBSFDFSÈVOBQÈHJOBDPNPMBRVFTFNVFTUSBFOMB'JHVSB
$PNPQPEFNPTWFS
FTUFQSPHSBNBFTVOBBQMJDBDJØOXFCRVFTFQVFEFVUJMJ[BSQBSB
DPOGJHVSBSNVMUJUVEEFPQDJPOFTEFMTJTUFNB
120
%FUPEPTFMMPTOPTWBNPTBDFOUSBSFOFMEJSFDUPSJPhome,RVFFTUÈNPOUBEPFOVOB
QBSUJDJØOJOEFQFOEJFOUFZFTMBJEØOFBQBSBBDUJWBSMBTDVPUBTEFVTVBSJP
QPSTFSFO
FMMBEPOEFTFHVBSEBSÈOUPEPTMPTBSDIJWPTEFMPTNJTNPT&OFMNBSDPEFMBEFSFDIB
EFMBQÈHJOB
TFMFDDJPOBNPTDPOFMSBUØOMBPQDJØOhome, RVFOPTMMFWBSÈBVOBOVFWB
QBOUBMMB 'JH
&OFTUBOVFWBQBOUBMMBBQBSFDFOMPTTJTUFNBTEFGJDIFSPTQBSBMPTRVFTFIBZBOFTUBCMF
DJEPDVPUBTEFEJTDP
RVFDPNPTFWF
TPMPTFIBSFBMJ[BEPFOMBQBSUJDJØO/home.4J
NBSDBNPTDPOFMSBUØOMBPQDJØO/home,JSFNPTBVOBOVFWBQBOUBMMBRVFDPOUJFOFVOB
MÓOFBQPSDBEBVTVBSJPEFMTJTUFNB 'JH
1PSÞMUJNP
TØMPOPTRVFEBTFMFDDJPOBSMPTVTVBSJPTBMPTRVFRVFSFNPTBTJHOBSMFTDVPUBT
EFEJTDPZFTUBCMFDFSMBTNJTNBT1BSBFMMPTFTFMFDDJPOBSÈFMVTVBSJPFMFHJEP
BQBSF
DJFOEPVOBOVFWBQBOUBMMBDPNPMBRVFTFNVFTUSBFOMB'JHVSB
t /PEFCFNPTFTDSJCJSMBDPOUSBTF×BFOOJOHÞOTJUJP
OJFOQBQFMOJFOEPDVNFOUPT
FMFDUSØOJDPTRVFOPIBZBOTJEPFODSJQUBEPT
t /PEFCFNPTFOWJBSMBFOOJOHÞODPSSFPFMFDUSØOJDPRVFOPTMBTPMJDJUF
t /PEFCFNPTDPNVOJDBSMBBOBEJFQPSUFMÏGPOP
t %FCFNPTMJNJUBSFMOÞNFSPEFJOUFOUPTGBMMJEPT4JFYDFEFFMOÞNFSPNÈYJNPEFJOUFO
UPTQFSNJUJEPT
FMVTVBSJPEFCFRVFEBSCMPRVFBEP
QPSMPRVFUFOESÈRVFQPOFSTFFO
DPOUBDUPDPOFMUÏDOJDPEFTFHVSJEBE&TMPRVFPDVSSFFOMPTDBKFSPTBVUPNÈUJDPT
TJ
UFFRVJWPDBTUSFTWFDFTBMJOUSPEVDJSMBDMBWF
FMDBKFSPTFRVFEBDPOMBUBSKFUB$PO
FMMPFWJUBNPTRVFTFQVFEBOTFHVJSIBDJFOEPJOUFOUPTJOEFGJOJEBNFOUFZBMGJOBMTF
EFTDVCSBFMOÞNFSPTFDSFUP
t %FCFNPTDBNCJBSMBTDPOUSBTF×BTEFBDDFTP
EBEBTQPSEFGFDUPQPSMPTGBCSJDBOUFT
EFSPVUFSTZPUSPTQFSJGÏSJDPT
RVFOPTQFSNJUFOFMBDDFTPBMBSFE
t /PEFCFNPTVUJMJ[BSMBNJTNBDPOUSBTF×BFOMBTEJTUJOUBTNÈRVJOBTPTJTUFNBT
ZB
RVFTJOPTMBEFTDVCSFO
IBSÓBNPTWVMOFSBCMFTFMSFTUPEFFRVJQPTBMPTRVFUFOFNPT
BDDFTP
t -BTDPOUSBTF×BTEFCFODBEVDBSZFYJHJSRVFTFDBNCJFODBEBDJFSUPUJFNQP
BMNF
OPTVOBWF[BMB×P
t /PEFCFNPTQFSNJUJSRVFMBTBQMJDBDJPOFTSFDVFSEFOMBTDPOUSBTF×BT
1PS MP UBOUP
MBT DPOUSBTF×BT EFCFO TFS DBEFOBT EF DBSBDUFSFT RVF JODMVZBO UBOUP MF
USBTNBZÞTDVMBT
NJOÞTDVMBT
OÞNFSPTZDBSBDUFSFTFTQFDJBMFTTJOOJOHÞOUJQPEFMØHJDB
BQBSFOUF-BMPOHJUVEEFMBNJTNBEFCFTFSTVQFSJPSBPDIPDBSBDUFSFT
BVORVFMPNÈT
SFDPNFOEBCMFFTRVFTVQFSFMPTRVJODF
"MHVOPTDPOTFKPTQBSBQPEFSSFDPSEBSMBDPOUSBTF×B
ZBRVFDPNPIFNPTDPNFOUBEP
BOUFSJPSNFOUFOPQPESFNPTFTDSJCJSMBFOOJOHÞOTJUJP
TFSÓBFMFHJSQBMBCSBTTJOTFOUJEP
QFSPRVFTFBOQSPOVODJBCMFT
PCJFOFMFHJSMBQSJNFSBMFUSBEFVOBGSBTFRVFSFDPSEFNPT
QPSTFSQBSUFEFVOBDBODJØORVFOPTHVTUB
PEFBMHÞOSFDVFSEP
QPSFKFNQMPj/BDÓ
FMEFKVOJPEFMFO.BESJEDFSDBEFMBTEFMBNBESVHBEBx
/FE+EF.DEMEMN
QBSBDPNQMJDBSMB
TFQVFEFQPOFSBMHÞOTÓNCPMPFTQFDJBMFOVOBQPTJDJØORVFQPEBNPT
SFDPSEBS
4J DVNQMJNPT DPO UPEBT MBT SFDPNFOEBDJPOFT FYQVFTUBT BOUFSJPSNFOUF
IBSFNPT RVF
DVBMRVJFSJOUSVTPRVFJOUFOUFEFTDVCSJSMBDMBWFEFBDDFTPNFEJBOUFQSPHSBNBTEFGVFS
[BCSVUB
DPNP+PIOUIF3JQQFSPTJNJMBSFT
UFOHBRVFQFSEFSNVDIPUJFNQPZEFTJTUB
EFMQSPDFTP
3FDPSEBE
VOBDPOUSBTF×BNBMFMFHJEBPNBMQSPUFHJEBQVFEFTVQPOFSVOJNQPSUBOUF
BHVKFSPFOMBTFHVSJEBEEFMTJTUFNB
1BSBBRVFMMPT EFWPTPUSPT RVF OPUFOHÈJTNVDIBJNBHJOBDJØOQBSBDSFBSDMBWFT
IBZ
NVMUJUVEEFQSPHSBNBTRVFPTQFSNJUFOHFOFSBSDPOUSBTF×BTDPOMBTDBSBDUFSÓTUJDBTRVF
WPTPUSPTRVFSÈJT&KFNQMPTEFFTPTQSPHSBNBTTPO.BY1BTTXPSEZ1BTTXPSE(FOFSBUPS
Actividades
8. %FTDBSHBPTMBBQMJDBDJØO+PIOUIF3JQQFS(www.openwall.com)ZDPNQSPCBE
MPTUJFNQPTRVFUBSEBFOEFTDVCSJSDPOUSBTF×BT
t ' PSNBEBTQPSVOBQBMBCSBRVFQPEÏJTFODPOUSBSFOFMEJDDJPOBSJP
QPSFKFN
QMPQBUBUB
t 'PSNBEBTTPMPQPSOÞNFSPT
t 'PSNBEBTQPSQBMBCSBTJOWFSUJEBT
QPSFKFNQMPQBUBUBBMSFWÏT
BUBUBQ
t 'PSNBEBTQPSQBMBCSBTFOPUSPTJEJPNBT
DPNQVUFS
t 'PSNBEBQPSVODPOKVOUPEFDBSBDUFSFTTJOTFOUJEP"I6OC\
124
Lectura Extracción
Rasgos sensores patrón
Módulo de inscripción
BD
Módulo de identificación
125
Caso práctico 8
Claves y consejos
1BSBDPNQSPCBSRVFMBEJTUSJCV
DJØOEF-*/69TPCSFMBRVFWBT
BUSBCBKBSTPQPSUB"$-
EFCFT
VUJMJ[BSFMDPNBOEPgrep,DPNP Fig. 5.43. Edición de fichero fstab.
TFNVFTUSBFOMBJNBHFO
Importante
1BSBDPOGJHVSBSMBTMJTUBTEFDPO
USPM EF BDDFTP "$-
EFCFNPT
SFBMJ[BSMPCBKPFMQFSGJMEFBENJ
OJTUSBEPS
Actividades
126
(Continuación)
1BSBSFBMJ[BSFMFKFNQMP
SPPUIBDSFBEPVOGJDIFSPMMB
NBEPQSVFCB
127
Caso práctico 9
&MSFTVMUBEPFTRVFFM6TVBSJPQVFEFFOUSBSBUPEPTMPTEJSFDUPSJPTZGJDIFSPT
RVFDVFMHVFOEFMEJSFDUPSJP6TVBSJP
PMPRVFFTMPNJTNP
QVFEFWJTVBMJ[BS
DVBMRVJFSEPDVNFOUPEFEJDIPVTVBSJP
$PNPUPEBMBJOGPSNBDJØOEFM6TVBSJPFTUÈBMNBDFOBEBFOEPTDBSQFUBT
$PO
GJEFODJBMZ%BUPT$PNQBSUJEPT
QBSBRVFOPUFOHBBDDFTPFM6TVBSJPBMEJSFD
UPSJP$POGJEFODJBMEFM6TVBSJP
EFCFNPTFKFDVUBSMBPSEFOEFMB'JHVSB
128
"DPOUJOVBDJØO TFBCSFVOBOVFWBWFOUBOBTJNJMBSBMBRVFTFNVFTUSBFOMB'JHVSB
129
&O FTB WFOUBOB QPEFNPT CVTDBS BDUVBMJ[BDJPOFT
DBNCJBS MB DPOGJHVSBDJØO
DPOTVMUBS
FMIJTUPSJBMEFBDUVBMJ[BDJPOFT
SFTUBVSBSBDUVBMJ[BDJPOFTPDVMUBTZWFSMBTQSFHVOUBTGSF
DVFOUFTTPCSFFMQSPDFTPEFBDUVBMJ[BSFMTJTUFNB
$PNP FTUBNPT JOUFOUBOEP DPOGJHVSBS MBT BDUVBMJ[BDJPOFT BVUPNÈUJDBNFOUF
EFCFNPT
IBDFSDMJDFOMBPQDJØOCambiar configuración
RVFTFNVFTUSBFOFMNBSDPJ[RVJFSEP
EFMB'JHVSB
&OMBOVFWBWFOUBOB 'JH
TFMFDDJPOBNPTMBQSJNFSBPQDJØO
Instalar actualizacio-
nes automáticamente (recomendado),EFGJOJFOEPDVÈOEPRVFSFNPTRVFTFJOTUBMFOMBT
OVFWBTBDUVBMJ[BDJPOFT$PNPTBCFNPTRVF8JOEPXTTVFMFQVCMJDBSMBTBDUVBMJ[BDJPOFT
MPTNBSUFT
MPQPEFNPTDPOGJHVSBSQBSBRVFTFJOTUBMFOMPTWJFSOFTBMBTIPSBT
EFFTUBNBOFSB
OPTBTFHVSBNPTRVFOPIBOEBEPQSPCMFNBTMPTQBSDIFTQVCMJDBEPT
0USBPQDJØORVFQPEFNPTTFMFDDJPOBSFOMBNJTNBWFOUBOBFTDescargar actualizacio-
nes, pero permitirme elegir si deseo instalarlas;DPNPTVOPNCSFJOEJDBTFEFTDBSHBOMBT
BDUVBMJ[BDJPOFT
QFSPOPTPOJOTUBMBEBTIBTUBRVFOPEFNPTMBPQPSUVOBPSEFO
0USB TFMFDDJØO QPTJCMF FT Buscar las actualizaciones, pero permitirme elegir si deseo
descargarlas e instalarlas;EFFTUBNBOFSB
OPTFEFTDBSHBOMBTBDUVBMJ[BDJPOFT
PDV
QBOEPFTQBDJPFOFMEJTDPEVSPIBTUBFMNPNFOUPFORVFMBTJOTUBMBNPT
1PS ÞMUJNP
QPEFNPT PQUBS QPS OP CVTDBS MBT BDUVBMJ[BDJPOFT FO FTF DBTP TPNPT MPT
SFTQPOTBCMFTEFBDDFEFSBMBQÈHJOBEF8JOEPXT6QEBUFZEFUFSNJOBSMBTBDUVBMJ[B
DJPOFTRVFOFDFTJUBNPTQBSBNBOUFOFSOVFTUSPFRVJQPTJOWVMOFSBCJMJEBEFT
%F MB NJTNB NBOFSB RVF NBOUFOFNPT BDUVBMJ[BEP FM TJTUFNB PQFSBUJWP
EFCFNPT
NBOUFOFS BDUVBMJ[BEP MPT QSPHSBNBT RVF UFOFNPT JOTUBMBEPT Z
QPS TVQVFTUP
FM GJS
NXBSFEFMPTEJTUJOUPTQFSJGÏSJDPTRVFDPOFDUBNPTBMFRVJQPSPVUFS
TXJUDI
FUD
$PNPQFSEFSÓBNPTNVDIPUJFNQPDPOTVMUBOEPMBQÈHJOBEFDBEBGBCSJDBOUFQBSBWFSTJ
IBOQVCMJDBEPOVFWBTBDUVBMJ[BDJPOFTEFMBTBQMJDBDJPOFTJOTUBMBEBT
QPEFNPTVUJMJ[BS
BMHVOPTEFMPTOVNFSPTPTQSPHSBNBTHSBUVJUPTRVFFYJTUFO&TUPTTFDPOFDUBOB*OUFSOFU
ZOPTJOGPSNBOEFTJIBZOVFWBTBDUVBMJ[BDJPOFTQVCMJDBEBTRVFBÞOOPUFOHBNPTJOT
UBMBEBT
"MHVOPT FKFNQMPT EF EJDIPT QSPHSBNBT TPO "11(&5
46.0
-0(*$*&*."$$0.
"11'3&4)
61%"5&/05*'*&3(http://cleansofts.org),FUD
130
&TUBJOGPSNBDJØOFTHVBSEBEBFOMPTBSDIJWPT"QQ&WFOU&WU
4FD&WFOU&WUZ4ZT&WFOU&WU
VCJDBEPTUPEPTFMMPTFOFMEJSFDUPSJP4ZTUFN3PPU=TZTUFN=DPOGJH
&T NVZ JNQPSUBOUF DPOGJHVSBS DPSSFDUBNFOUF FM UBNB×P Z FM BDDFTP B MPT NJTNPT &M
UBNB×PEFCFTFSMPTVGJDJFOUFNFOUFHSBOEFQBSBBMCFSHBSMPTTVDFTPTQSPEVDJEPTFOFM
TJTUFNBIBTUBRVFMPBVEJUFNPT:DPNPFTMØHJDP
QBSBFWJUBSRVFMPTJOUSVTPTCPSSFO
TVTIVFMMBTTØMPEFCFSÈOUFOFSQFSNJTPTEFDPOUSPMUPUBMFMUÏDOJDPPUÏDOJDPTFODBSHBEPT
EFMBTFHVSJEBEEFMTJTUFNB
131
Vocabulario
Log.&TFMSFHJTUSPEFVOFWFOUP
RVFTFQSPEVDFFOFMTJTUFNB
¿Sabías que…?
#MPHWJFOFEFXF#-0(
Fig. 5.57. Ubicación logs de Linux.
"DPOUJOVBDJØO WBNPTBWFSVOPTFKFNQMPTEFMPTDPNBOEPTWJTUPTBOUFSJPSNFOUF
132
*OUFSSVQDJØO
Fig. 5.61. Interrupción.
t Intercepción,BUBDBMBDPOGJEFODJBMJEBE6OJOUSVTPBDDFEFBJOGPSNBDJØOBMNBDFOB
EBFOOVFTUSPTJTUFNBPBMRVFIFNPTUSBTNJUJEPQPSMBSFE
FTEFDJS
MBJOGPSNBDJØO
IBDBÓEPFONBOPTEFQFSTPOBMOPBVUPSJ[BEP&KFNQMPT
DBQUVSBEFJOGPSNBDJØOFO
MBSFEPDPQJBEFBSDIJWPTOPBVUPSJ[BEB
t Modificación,BUBDBFMPCKFUJWPEFJOUFHSJEBE-PTEBUPTIBOTJEPNBOJQVMBEPTQPS
QFSTPOBMOPBVUPSJ[BEPFOBMHÞONPNFOUPFOUSFTVDSFBDJØOZTVMMFHBEBBMEFTUJOB
UBSJP-BJOGPSNBDJØORVFTFEJTQPOFEFTQVÏTEFVOBUBRVFEFFTUBTDBSBDUFSÓTUJDBT
OP FT WÈMJEB OJ DPOTJTUFOUF &KFNQMPT
MBT NPEJGJDBDJPOFT EF QSPHSBNBT QBSB RVF
SFBMJDFOBDDJPOFTEJGFSFOUFTBMBTQSPQVFTUBTPSJHJOBMNFOUF
NPEJGJDBSVONFOTBKF
USBOTNJUJEPQPSMBSFE
%/4TQPPGJOH
y
t Fabricación,FTUFUJQPEFBUBRVFWVMOFSBMBBVUFOUJDJEBE4FUSBUBEFNPEJGJDBDJPOFT
EFTUJOBEBTBDPOTFHVJSRVFFMQSPEVDUPGJOBMTFBTJNJMBSBMBUBDBEPEFGPSNBRVF
TFBEJGÓDJMEJTUJOHVJSMPEFMPSJHJOBM1PSFKFNQMP
FMQIJTJOH
'BCSJDBDJØO
134
Ten cuidado
$POFTUBUÏDOJDBEFFOHB×PQPEFNPTIBDFSDSFFSBVO1$BUBDBEPRVFMBEJSFDDJØO
GÓTJDBEFPUSP1$
UBNCJÏOBUBDBEPEFMBSFE
FTMBEFM1$EFMBUBDBOUF
DPOTJHVJFOEP
DPOFMMPRVFUPEPFMUSÈGJDPEFSFEFOUSFMPTEPT1$BUBDBEPTQBTFQPSFM1$EFMBUBDBOUF
'JH
FTMPRVFTFDPOPDFDPNPman in the middle IPNCSFFONFEJP
&O MB 'JHVSB QPEFNPT WFS DPNP MB ."$ EF MB EJSFDDJØO EFM 1$ BUBDBEP
IBTJEPNPEJGJDBEBDPOMBEJSFDDJØOGÓTJDB GFBF
RVFFT
MBEJSFDDJØOGÓTJDBEFMBUBDBOUF
0USBWFSTJØOEFFTUFUJQPEFBUBRVFTFTFM%/4TQPPGJOHPFOHB×PEF%/4
RVFDPOTJT
UFFOGBMTFBSMBSFTQVFTUBEFMTFSWJEPS%/4TPCSFVOBQFUJDJØOZEBSMFVOBEJSFDDJØO*1
EJGFSFOUFBMBSFBM&TEFDJS
RVFDVBOEPVO1$BUBDBEPQJEFQPSFKFNQMPMB*1EFXXX
NJCBODPFTBTVTFSWJEPS%/4
FMFRVJQPBUBDBOUFGBMTFBSÈFMQBRVFUFEFEBUPTEFMPT
%/4DPOMBSFTQVFTUBZMFQVFEFFOHB×BSEÈOEPMFMB*1EFPUSPFRVJQPDVBMRVJFSB"TÓ
FOWF[EFDPOFDUBSTFBTVCBODPTFDPOFDUBSÓBBPUSP1$EJGFSFOUFQVEJFOEPGBMTFBSMB
QBHJOBEFFOUSBEBEFTVCBODBFMFDUSØOJDBZDBQUVSBOEPTVTDMBWFTEFBDDFTPBMBNJTNB
7FBNPTFTUBTEPTUÏDOJDBTNFEJBOUFVOBQSÈDUJDBSFBMJ[BEBDPOFMQSPHSBNB$"*/RVF
UFQVFEFTEFTDBSHBSEFMBQÈHJOBhttp://www.oxld.it/cain.html.
135
Caso práctico 10
%FTQVÏTEFMBUBRVF
FMBUBDBOUFNPEJGJDBMBEJSFDDJØOEFWVFMUBQPSFM%/4QPSVOB
EJSFDDJØORVFFMBUBDBOUFDPOGJHVSBBUSBWÏTEFMBBQMJDBDJØO$"*/1BSBSFBMJ[BS
FTUBQSÈDUJDBEFCFNPTTFHVJSEPTTFODJMMPTQBTPT
1. &MQSJNFSP
DSFBSVOBFOUSBEBEFFOWFOFOBNJFOUP"31 'JH
$POFTUPDPO
TFHVJSFNPTRVFUPEPFMUSÈGJDPFOUSF1$BUBDBEPZFMSPVUFSTFBSFEJSFDDJPOBEP
BM1$EFMBUBDBOUF
136
$PNPTFQVFEFWFSFOMBTJHVJFOUFJNBHFO
DVBOEPIBDFNPTVOQJOHB(PPHMF
EFTEF FM FRVJQP BUBDBEP EFWVFMWF MB EJSFDDJØO RVF IB DPOGJHVSBEP FM BUBDBOUF
$PNP FT MØHJDP QFOTBS
FTUB UÏDOJDB TF QVFEF VUJMJ[BS QBSB DPNFUFS GSBVEFT FO
JOUSBOFUTPSFEFTDPSQPSBUJWBTSFFOWJBOEPBMBUBDBEPBVOBQÈHJOBNVZTJNJMBSB
MBPSJHJOBM
QFSPGBMTB
QPSMPRVFFMJOUSVTPQPESÈWFSTVTDMBWFT
$POUSBFTUFUJQPEFBUBRVFTQPEFNPTMVDIBSDSFBOEPMBTUBCMBT"31EFMPTFRVJQPT
FYQVFTUPTEFGPSNBFTUÈUJDBNFEJBOUFFMDPNBOEP"31
137
Caso práctico 11
138
1BSBFWJUBSFMBUBRVFEFFTUFUJQPEFQSPHSBNBTTFIBODPNFSDJBMJ[BEPBQMJDBDJPOFTEF "MHVOPTWJSVTGBNPTPT
OPNJOBEBTBOUJWJSVTRVFNBOUJFOFOBDUVBMJ[BEBTTVTGJDIFSPTEFGJSNBTQBSBEFUFDUBSZ t&MWJSVT'03.IBDFTPOBSMPT
FMJNJOBSMPTQSPHSBNBTDPODØEJHPNBMJDJPTP&KFNQMPTEFBOUJWJSVTTPO1BOEB
/PSUPO
EÓBTEFDBEBNFTVOQJUJEP
"7(
FUD5PEPTFMMPTUJFOFOBOUJWJSVT on-line FOMÓOFB
RVFFOMBNBZPSÓBEFMPTDBTPT QPSDBEBUFDMBQVMTBEB&TUP
TØMPQFSNJUFOEFUFDUBSTJOVFTUSBNÈRVJOBFTUÈJOGFDUBEB TJNQMFNFOUF TF QVFEF DPOTJ
EFSBSVOBCSPNBNÈTPNFOPT
&TBDPOTFKBCMFUFOFSJOTUBMBEPVOBOUJWJSVT
UFOJFOEPFODVFOUBRVFUPEPTFMMPTSBMFOUJ[BO
JODØNPEB
UBOUPFMBSSBORVFDPNPFMOPSNBMGVODJPOBNJFOUPEFMFRVJQPQPSDPOTVNJSSFDVSTPTEFM
FRVJQP t&MWJSVT7*&3/&4CPSSBMPT
QSPHSBNBTVUJMJ[BEPTFOEJDIP
EÓBBGFDUBOEPFYDMVTJWBNFOUF
BMPTBSDIJWPTFKFDVUBCMFT
t( FOFSJD #BDLEPPS
QFSNJ
UF B MPT JOUSVTPT BDDFEFS EF
NBOFSBSFNPUBBMPSEFOBEPS
BGFDUBEP
QPSMPRVFDPNQSP
NFUFMBDPOGJEFODJBMJEBEEFMB
JOGPSNBDJØOBMNBDFOBEBFOFM
FRVJQP
t4 BTTFS
FT VO HVTBOP RVF
BQSPWFDIBOEPVOBWVMOFSBCJ
MJEBEEF8JOEPXT
BQBHBCB
FMFRVJQP
t&ML $MPOFS
QSPHSBNBEP QPS
3JDI 4LSFOUB B MPT RVJODF
B×PTEFFEBE
FTDPOTJEFSB
EPFMQSJNFSWJSVTEFTBSSPMMB
EP Z FYQBOEJEP QPS MB SFE
"GFDUBCB B MPT FRVJQPT DPO
Fig. 5.74. Antivirus online de Panda. TJTUFNBT."$JOTUBMBEP
139
Caso práctico 12
Fig. 5.77. Configurar análisis. Fig. 5.78. Configuración de la periodicidad del análisis.
140
t Denegación del servicio: FTUF UJQP EF BUBRVF UBNCJÏO FT DPOPDJEP QPS TVT TJHMBT
Vocabulario
%P4 %FOJBM0G4FSWJDF
4FFKFDVUBDPOUSBTFSWJEPSFTPSFEFTEFPSEFOBEPSFTDPO
FMQSPQØTJUPEFJOUFSSVNQJSFMTFSWJDJPRVFFTUÈOPGSFDJFOEP&TDPOPDJEPFMBUBRVF Zombie. 0SEFOBEPS FO FM RVF
%P4RVFSFBMJ[BSPOQJSBUBTJOGPSNÈUJDPTEFMBBOUJHVB6OJØO4PWJÏUJDBZRVFQBSBMJ[Ø VO IBDLFS EF TPNCSFSP OFHSP
FMBDDFTPB*OUFSOFUEFMPTFTUPOJPT
USBTMBEFDJTJØOEFMHPCJFSOPEFMQBÓTCÈMUJDPEF IBDPOTFHVJEPJOTUBMBSTPGUXBSF
SFUJSBSVOBFTUBUVBRVFDPONFNPSBCBBMPTNVFSUPTTPWJÏUJDPTEVSBOUFMB4FHVOEB NBMJDJPTP QBSB IBDFSTF DPO FM
(VFSSB.VOEJBM5BNCJÏOTPODPOPDJEPTMPTBUBRVFTEFFTUFUJQPMBO[BEPTDPOUSB DPOUSPMEFMNJTNP
MPT TFSWJEPSFT SBÓ[ EFM TJTUFNB EF OPNCSFT EJTUSJCVJEP %/4
DPO FM GJO EF EFKBS Spam.5BNCJÏODPOPDJEPDPNP
*OUFSOFUQBSBMJ[BEBBMOPQPEFSEJTQPOFSMPTVTVBSJPTEFMTFSWJDJPEFSFTPMVDJØOEF DPSSFPCBTVSB$PSSFPIBCJUVBM
OPNCSFT&OUSFMPTNÞMUJQMFTUJQPTEFBUBRVF%P4TFQVFEFOEFTUBDBSMPTTJHVJFOUFT NFOUFEFQVCMJDJEBERVFOPIB
TJEPTPMJDJUBEP
o-BNBZPSÓBEFMPTBUBRVFTEFEFOFHBDJØOEFTFSWJDJPTTPOSFBMJ[BEPTBMVOÓTPOP
EFTEFNÞMUJQMFTNÈRVJOBTRVFIBOTJEPDPOWFSUJEBTFO[PNCJFTQPSDSBDLFSTEF
MBSFE
MMBNÈOEPTFFOFTUFDBTP%%P4
BUBRVFEF%FOFHBDJØOEF4FSWJDJP%JTUSJ
CVJEP
o1JOH EF MB NVFSUF
DPOTJTUF FO FOWJBS NVMUJUVE EF QJOHT B VO PSEFOBEPS DPO VO
UBNB×PEFCZUFTNVZHSBOEF
MPRVFCMPRVFBCBMBTDPOFYJPOFTFOMPTBOUJHVPT
TJTUFNBTPQFSBUJWPTFOMPTBDUVBMFTFTUFUJQPEFBUBRVFFTUÈTVCTBOBEPZQPSUBOUP
TFQVFEFDPOTJEFSBSDPNPIJTUPSJB
4POQSPHSBNBTEFDPOFYJØOB*OUFSOFUNFEJBOUFNØEFN
RVFSFBMJ[BOVOBMMBNBEB
B VO UFMÏGPOP DPO UBSJGJDBDJØO FTQFDJBM
DPNP BRVFMMPT RVF FNQF[BCBO QPS
&TUPTQSPHSBNBTBDUVBCBOTJOMBJOUFSWFODJØOZTJOFMDPOTFOUJNJFOUPEFMVTVBSJPQSP
WPDBOEPVOBGBDUVSBUFMFGØOJDBEFTPSCJUBEB)PZFOEÓBDPOMBTDPOFYJPOFT"%4-
MPTEJBMFSTDBTJIBOEFTBQBSFDJEPFOMBNBZPSÓBEFMPTIPHBSFT
t Ingeniería social: FT VO BUBRVF RVF BGFDUB BM PCKFUJWP EF DPOGJEFODJBMJEBE EF MB
TFHVSJEBEJOGPSNÈUJDB&TUBUÏDOJDBDPOTJTUFFOPCUFOFSJOGPSNBDJØOTFDSFUBEFVOB
QFSTPOBVPSHBOJTNPQBSBVUJMJ[BSMBQPTUFSJPSNFOUFDPOGJOFTNBMJDJPTPT)BCJUVBM
NFOUF MPT JOHFOJFSPT TPDJBMFT VUJMJ[BO FM DPSSFP FMFDUSØOJDP
QÈHJOBT 8FCT GBMTBT
FMDPSSFPPSEJOBSJPPFMUFMÏGPOPQBSBMMFWBSBDBCPTVTQMBOFT-PTFKFNQMPTNÈT
MMBNBUJWPTEFFTUPTBUBRVFTTPOFMQIJTJOHZFMVTPEFVOBNÈRVJOBBUBDBEBQBSB
MBFOWÓPEFTQBN
141
t Phishing: FT VOB UÏDOJDB EF FOHB×P BM VTVBSJP
RVF JOUFOUB BERVJSJS JOGPSNBDJØO
DPOGJEFODJBMEFMNJTNPTVQMBOUBOEPMBJEFOUJEBEEFPUSBTQFSTPOBT
PSHBOJTNPTP
QÈHJOBT8&#EF*OUFSOFU6OPEFMPTNÏUPEPTEF1IJTIJOHNÈTVUJMJ[BEPTIPZFO
EÓBDPOTJTUFFODPMHBSFO*OUFSOFUVOBQÈHJOBRVFFTDPQJBJEÏOUJDBEFBMHVOBPUSB
DPNPQVFEFTFSMBEFBMHVOBFOUJEBEGJOBODJFSBPCBODP
Actividades &MFOHB×PDPOTJTUFFORVFTJBMHVJFODPOGVOEFFTUBQÈHJOBGBMTBDPOMBPSJHJOBM
FJOUSPEVDFFOFMMBTVTEBUPTQFSTPOBMFTDPNPQVFEBOTFSFMOÞNFSPEFUBSKFUB
10. &MOBWFHBEPS*OUFSOFU&Y PFM1*/EFMBNJTNB
FTUPTOÞNFSPTTFMFTNBOEBEJSFDUBNFOUFBMPTDSFBEPSFT
QMPSFSBQBSUJSEFMBWFS EFMBFTUBGB
RVFDPOTJHVFOBTÓUFOFSFOTVQPEFSJOGPSNBDJØORVFQVFEFDPN
TJØO JODMVZF MB GVODJP QSPNFUFSOPT
OBMJEBEfiltro de suplanta-
ción de identidad. -BNBOFSBEFOPDBFSFOFTUBTFTUBGBTFTUFOFSFODVFOUBRVFOVODBMPTCBODPTOJ
1BSB DPOGJHVSBSMP EFCF PSHBOJTNPTPGJDJBMFTQJEFOBUSBWÏTEFDPSSFPTFMFDUSØOJDPTEBUPTDPOGJEFODJBMFT
NPTBDDFEFSBMBTOpcio- 5BNCJÏOEFCFNPTNJSBSDPODBVUFMBMBTEJSFDDJPOFT63-EFMBTQÈHJOBTWJTJUBEBT
nes avanzadasEFMNFOÞ QVFTTVDFEFBNFOVEPRVFTJMBEJSFDDJØOSFBMFTQPSFKFNQMPXXXNJCBODBFT
EFHerramientas (Opcio- MBEJSFDDJØORVFVUJMJ[BOFTUFUJQPEFEFMJODVFOUFTQBSBEJTFDDJPOBSMBQÈHJOBTFSÈ
nes de Internet). BMHPBTÓDPNPXXXNJCBODPFTPXXXNJTCBODBFT&TEFDJS
MB63-UJFOFVOB
&OMBGJDIBEF Opciones QFRVF×BEJGFSFODJBRVFBQSJNFSBWJTUBOPTFOPUBSÈQFSPRVFPCMJHBUPSJBNFOUF
avanzadas QPESFNPTBDUJ IBEFUFOFS
WBSMBDPNQSPCBDJØOBVUP )BTUBIBDFQPDPUJFNQP
FTUFUJQPEFBUBRVFTTPMPBGFDUBCBBFOUJEBEFTGJOBODJFSBT
NÈUJDBEFTJUJPTXFCFOFM QFSPBDUVBMNFOUFFTUPTBUBRVFTIBOBGFDUBEPBPUSPTPSHBOJTNPT
DPNPFM*/&.
BQBSUBEP EF TFHVSJEBE $ÈNBSBTEF$PNFSDJPTEFEJGFSFOUFTDJVEBEFTZÞMUJNBNFOUFBMB"HFODJB5SJCVUBSJB
%F FTUB NBOFSB TJFNQSF 'JH
RVF BDDFEBNPT B VOB
QÈHJOB DPNQSPCBSÈ TV &OFTUFÞMUJNPDBTP
FMBUBRVFDPOTJTUFFOMBSFNJTJØOEFVODPSSFPFMFDUSØOJDPRVF
BVUFOUJDJEBE JONFEJBUB JOGPSNB RVF FM SFDFQUPS EFM NFOTBKF UJFOF EFSFDIP B VO SFFNCPMTP EF JNQVFTUPT
NFOUF JOFYJTUFOUFT1FSPQBSBQPEFSEJTQPOFSEFMEJOFSP
FMSFDFQUPSEFCFFOWJBSMPTOÞNF
SPTEFDVFOUBTCBODBSJBTZUBSKFUBTEFDSÏEJUP
142
143
Sínt esis
&WJUBSBDDFTPB#*04
4FHVSJEBEFOFMBDDFTP
BMPSEFOBEPS 1SPUFHFSFMHFTUPS
EFBSSBORVF(36#
$JGSBEPEFMBTQBSUJDJPOFT
$VPUBTEFEJTDP
-JTUBTEFDPOUSPMEFBDDFTP
.POJUPSJ[BDJØOEFMTJTUFNB
5JQPTEFBUBDBOUFT
4PGUXBSFQBSBFWJUBSBUBRVFT
144