{"id":2931,"date":"2020-01-16T14:00:19","date_gmt":"2020-01-16T13:00:19","guid":{"rendered":"https:\/\/curtispc.fr\/blog\/?p=2931"},"modified":"2020-03-23T00:51:41","modified_gmt":"2020-03-22T23:51:41","slug":"definition-dun-logiciel-malveillant-en-informatique-malware","status":"publish","type":"post","link":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/","title":{"rendered":"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"2931\" class=\"elementor elementor-2931\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-c6f8296 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c6f8296\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8ecd007\" data-id=\"8ecd007\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50b8143 elementor-widget elementor-widget-image\" data-id=\"50b8143\" data-element_type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" src=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/elementor\/thumbs\/programme_malveillant-pei1mar6daw99xs0srus2kzvyegcmyb9cifuwrzivc.jpg\" title=\"programme_malveillant\" alt=\"programme_malveillant\" loading=\"lazy\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2925d47 elementor-widget elementor-widget-spacer\" data-id=\"2925d47\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-afb1a63 elementor-widget elementor-widget-theme-post-title elementor-page-title elementor-widget-heading\" data-id=\"afb1a63\" data-element_type=\"widget\" data-widget_type=\"theme-post-title.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\"><a href=\"https:\/\/curtispc.fr\/cyberattaques.html\">D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)<\/a><\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c1c3390 elementor-widget elementor-widget-post-info\" data-id=\"c1c3390\" data-element_type=\"widget\" data-widget_type=\"post-info.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<ul class=\"elementor-inline-items elementor-icon-list-items elementor-post-info\">\n\t\t\t\t\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-87450e9 elementor-inline-item\" itemprop=\"author\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<img decoding=\"async\" class=\"elementor-avatar\" src=\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&amp;d=monsterid&amp;r=g\" alt=\"Picture of curtispc\" loading=\"lazy\">\n\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-author\">\n\t\t\t\t\t\t\t<span class=\"elementor-post-info__item-prefix\">Publi\u00e9 par<\/span>\n\t\t\t\t\t\t\t\t\t\tcurtispc\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-753aac4 elementor-inline-item\" itemprop=\"datePublished\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/2020\/01\/16\/\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-calendar\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-date\">\n\t\t\t\t\t\t\t\t\t\t<time>16\/01\/2020<\/time>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-a085001 elementor-inline-item\" itemprop=\"commentCount\">\n\t\t\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#comments\">\n\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-icon\">\n\t\t\t\t\t\t\t\t<i aria-hidden=\"true\" class=\"fas fa-comments\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-comments\">\n\t\t\t\t\t\t\t\t\t\t2 Comments\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t<\/li>\n\t\t\t\t<li class=\"elementor-icon-list-item elementor-repeater-item-ef1b2bb elementor-inline-item\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-icon-list-text elementor-post-info__item elementor-post-info__item--type-custom\">\n\t\t\t\t\t\t\t\t\t\t <div class=\"post-views content-post post-2931 entry-meta load-static\">\r\n\t\t\t\t<span class=\"post-views-icon dashicons dashicons-chart-bar\"><\/span> <span class=\"post-views-label\">Vues:<\/span> <span class=\"post-views-count\">6\u00a0358<\/span>\r\n\t\t\t<\/div>\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t<\/li>\n\t\t\t\t<\/ul>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-604a418 elementor-widget elementor-widget-spacer\" data-id=\"604a418\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-42a9016 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"42a9016\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-49e4f0c\" data-id=\"49e4f0c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a114e69 elementor-widget elementor-widget-text-editor\" data-id=\"a114e69\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Comment s&rsquo;appelle un logiciel qui peut infecter un fichier et causer des dommages \u00e0 l&rsquo;ordinateur ? C&rsquo;est une des cat\u00e9gories de logiciel malveillant ou programme malveillant ou encore malware. Quelle est la d\u00e9finition d&rsquo;un logiciel malveillant ? On commence par d\u00e9finir ce qu&rsquo;est un logiciel informatique. Puis on verra le premier malware de l&rsquo;histoire.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-9123b58 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"9123b58\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-c1c7647\" data-id=\"c1c7647\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-81c49dd elementor-widget elementor-widget-spacer\" data-id=\"81c49dd\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-d676dd8 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"d676dd8\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-ddbfa7f\" data-id=\"ddbfa7f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-398a0e6 elementor-widget elementor-widget-text-editor\" data-id=\"398a0e6\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h2>D\u00e9finition pr\u00e9alable d\u2019un logiciel informatique<span id=\"Definition_prealable_dun_logiciel_informatique\" class=\"ez-toc-section\"><\/span><\/h2><p>Cauchemar de tout propri\u00e9taire d\u2019ordi ou de smartphone,\u00a0<strong>un logiciel malveillant est d\u2019abord un logiciel informatique<\/strong>. Avant de voir la d\u00e9finition d\u2019un logiciel malveillant, un logiciel informatique ou programme informatique est un ensemble d\u2019instructions ex\u00e9cutables par un ordinateur. Cette ex\u00e9cution a pour but de produire un r\u00e9sultat pr\u00e9cis \u00e0 partir de donn\u00e9es initiales.<\/p><p>Comme par exemple calculer la somme de deux nombres, afficher la page Web que vous \u00eates en train de lire ou pr\u00e9voir le temps qu\u2019il fera demain.<\/p><p>\u00a0<\/p><p>Et cet ensemble d\u2019instructions se pr\u00e9sente sous la forme d\u2019un fichier sur votre ordi ( sur votre disque dur, votre cl\u00e9 USB, etc). Comme par exemple \u00ab calc.exe \u00bb pour la calculatrice sous Windows ou \u00ab iexplore.exe \u00bb pour\u00a0le navigateur Internet Explorer 11.<\/p><p>\u00a0<\/p><p>Ainsi votre navigateur est un logiciel informatique qui va chercher sur le r\u00e9seau Internet cette page Web et l\u2019affiche sur votre \u00e9cran sous une forme pr\u00e9cis\u00e9e par l\u2019auteur. De m\u00eame la calculatrice enregistre votre saisie des deux nombres, en calcule la somme qu\u2019elle affiche \u00e0 l\u2019\u00e9cran.<\/p><p>\u00a0<\/p><p>Enfin la tr\u00e8s grande majorit\u00e9 des programmes informatiques sont bienveillants. Maintenant voyez en quoi certains logiciels sont malveillants.<\/p><p>\u00a0<\/p><h2>D\u00e9finition d\u2019un logiciel malveillant (malware)<span id=\"Definition_dun_logiciel_malveillant_malware\" class=\"ez-toc-section\"><\/span><\/h2><p>D\u00e9finition d\u2019un logiciel malveillant (malware) : c\u2019est un\u00a0<strong>logiciel qui nuit \u00e0 un syst\u00e8me informatique ou directement \u00e0 son propri\u00e9taire<\/strong>. Par exemple il s\u2019agit de :<\/p><p>\u00a0<\/p><ul><li>contaminer des fichiers sur l\u2019ordi cibl\u00e9 en leur ajoutant\u00a0un code ex\u00e9cutable viral<\/li><li>g\u00eaner ou d\u2019emp\u00eacher certaines applications de l\u2019ordinateur cible de fonctionner (voire de bloquer compl\u00e8tement le syst\u00e8me d\u2019exploitation)<\/li><li>supprimer ou crypter des fichiers cr\u00e9\u00e9s par l\u2019utilisateur (documents textuels, feuilles de calcul, photos, morceaux de musique, etc)<\/li><li>d\u00e9sactiver les logiciels de s\u00e9curit\u00e9 de la cible pour mieux l\u2019infecter<\/li><li>intercepter les comptes et mots de passe\u00a0pour usurper l\u2019identit\u00e9 de la victime sur le Web, voire lui voler de l\u2019argent sur un site Web financier<\/li><li>installer un relai sur l\u2019ordi de la victime pour commettre des m\u00e9faits ailleurs via cet ordi pirat\u00e9, et ainsi cacher son identit\u00e9<\/li><li>etc<\/li><\/ul><p>Il peut s\u2019agir aussi d\u2019un programme inoffensif en tant que tel \u00e0 l\u2019origine, qui d\u00e9tourne son utilisation \u00e0 des fins malveillantes.<\/p><p>\u00a0<\/p><p>Dans la suite on utilise indiff\u00e9remment les termes \u00ab logiciel malveillant \u00bb et \u00ab programme malveillant \u00bb.<\/p><p>\u00a0<\/p><p>Le terme anglais est malware, contraction de \u00ab malicious software \u00bb, signifiant \u00ab logiciel malveillant \u00bb. Et non \u00ab logiciel malicieux \u00bb comme on peut le lire encore souvent. Confondre la malice et la malveillance c\u2019est un peu confondre Coluche et Bernard Tapie.<\/p><p>\u00a0<\/p><h2>Les premiers malwares de l\u2019histoire<span id=\"Les_premiers_malwares_de_lhistoire\" class=\"ez-toc-section\"><\/span><\/h2><h3>Le virus Creeper en 1971<span id=\"Le_virus_Creeper_en_1971\" class=\"ez-toc-section\"><\/span><\/h3><p><a href=\"https:\/\/fr.wikipedia.org\/wiki\/Logiciel_malveillant#Historique\">D\u2019apr\u00e8s cet article<\/a>,\u00a0<strong>le premier malware de l\u2019histoire \u00e9tait un virus apparu dans les ann\u00e9es 1970. Il s\u2019appelait \u00ab Creeper \u00bb<\/strong>\u00a0sur le r\u00e9seau ARPANET, anc\u00eatre d\u2019Internet. Ce virus acc\u00e9dait \u00e0 un syst\u00e8me distant via un modem RTC \u00e0 56 kpbs. Et il s\u2019y int\u00e9grait, imprimait un ficher et affichait un message \u00e0 l\u2019\u00e9cran :<\/p><blockquote><p><span class=\"citation\">I\u2019M THE CREEPER : CATCH ME IF YOU CAN<br \/><\/span><\/p><\/blockquote><p>Mais le virus Creeper \u00e9tait inoffensif puisqu\u2019il n\u2019infectait pas de fichier et ne causait aucun dommage \u00e0 l\u2019ordinateur.<\/p><p>\u00a0<\/p><p>Alors en quoi \u00e9tait-il malveillant ? M\u00eame si c\u2019est mineur, il \u00e9tait nuisible parce qu\u2019il s\u2019introduisait sur un ordi sans le consentement de l\u2019utilisateur. Et il se r\u00e9pandait sur le r\u00e9seau d\u2019un ordi \u00e0 l\u2019autre. Donc pour certains sp\u00e9cialistes, ce programme ne correspond pas vraiment \u00e0 la d\u00e9finition d\u2019un logiciel malveillant.<\/p><p>\u00a0<\/p><h3>Le virus Reaper<span id=\"Le_virus_Reaper\" class=\"ez-toc-section\"><\/span><\/h3><p>Ensuite des hackers ont cr\u00e9\u00e9 le programme malveillant \u00ab Reaper \u00bb pour \u00e9liminer le virus \u00ab Creeper \u00bb quand il le d\u00e9tectait. En fait c\u2019\u00e9tait un autre virus, capable aussi de se propager sur les ordinateurs en r\u00e9seau. Mais on peut aussi dire que c\u2019\u00e9tait le premier antivirus de l\u2019histoire.<\/p><p>Maintenant voyons des exemples de logiciel malveillant plus r\u00e9cents d\u00e9crits ici.<\/p><p>\u00a0<\/p><h2>Quelques exemples de logiciel malveillant plus r\u00e9cents<span id=\"Quelques_exemples_de_logiciel_malveillant_plus_recents\" class=\"ez-toc-section\"><\/span><\/h2><p>Parmi les programmes malveillants vus sur ce site depuis plus de quinze ans, on peut citer quelques exemples.<\/p><p>\u00a0<\/p><p>\u00a0<\/p><h3>Le virus \u00ab Locky \u00bb en 2016<span id=\"Le_virus_Welchi_en_2003\" class=\"ez-toc-section\"><\/span><\/h3><p>Le virus Locky est un autre\u00a0ransomware\u00a0dangereux qui verrouille les fichiers personnels des utilisateurs d\u2019ordinateurs et leur demande de payer une ran\u00e7on s\u2019ils souhaitent r\u00e9cup\u00e9rer leurs fichiers.Le ransomware Locky modifie les noms des fichiers crypt\u00e9s en une combinaison unique de 16 caract\u00e8res de lettres et de chiffres et ajoute l\u2019 extension de fichier\u00a0<em>.locky<\/em>\u00a0.<\/p><p>\u00a0<\/p><p>Selon le programme, pour d\u00e9verrouiller les fichiers, vous avez besoin du code de d\u00e9cryptage, que vous pouvez obtenir si vous payez la ran\u00e7on. Le programme utilise RSA-2048 (il est donc parfois appel\u00e9 virus RSA-2048) et les algorithmes AES-1024 pour chiffrer les fichiers.<\/p><p>\u00a0<\/p><p>\u00a0<\/p><h3>Le ransomware \u00ab Storm Worm \u00bb en 2017<span id=\"Le_cheval_de_Troie_Storm_Worm_en_2007\" class=\"ez-toc-section\"><\/span><\/h3><p>Consid\u00e9r\u00e9e comme la plus importante cyberattaque par\u00a0<em>ransomware<\/em>\u00a0de l\u2019histoire, WannaCry a infect\u00e9 en quelques heures plus de 300 000 ordinateurs, dans plus de 150 pays. Parmi ses victimes\u00a0: FedEx, Renault, ou encore le minist\u00e8re de l\u2019int\u00e9rieur russe. Cette attaque a \u00e9t\u00e9 revendiqu\u00e9e par le groupe de hackers Shadow Brokers, ceux-l\u00e0 m\u00eames qui, au premier trimestre 2017, avaient r\u00e9ussi \u00e0 s\u2019introduire dans le r\u00e9seau informatique de la NSA, et \u00e0 y d\u00e9rober un attirail consid\u00e9rable de failles, virus et autres outils informatiques, dont la faille exploit\u00e9e par WannaCry, baptis\u00e9e Eternal Blue.\u00a0<\/p><p>\u00a0<\/p><p>Il s\u2019agissait d\u2019une faille d\u00e9j\u00e0 identifi\u00e9e par Microsoft, mais le patch correctif propos\u00e9 n\u2019avait pas \u00e9t\u00e9 suffisamment massivement install\u00e9 pour que l\u2019attaque \u00e9choue. In fine, les co\u00fbts de WannaCry ont \u00e9t\u00e9 \u00e9valu\u00e9s autour d\u2019un milliard de dollars, sans compter bien \u00e9videmment toutes les cons\u00e9quences indirectes qu\u2019ont pu subir ses victimes.<\/p><p>\u00a0<\/p><h3><strong>Petya \/ NotPetya\u00a0<\/strong><span id=\"Les_ransomwares_des_anciens_malwares_de_plus_en_plus_actifs\" class=\"ez-toc-section\"><\/span><\/h3><p>Parmi les cyberattaques qui ont marqu\u00e9 l\u2019ann\u00e9e, il faut encore citer Petya \/ NotPetya. Petya,\u00a0<em>ransomware<\/em>\u00a0apparu en 2016, avait d\u00e9j\u00e0 r\u00e9ussi \u00e0 contaminer des milliers d\u2019ordinateurs, via la m\u00eame faille de s\u00e9curit\u00e9 Windows, exigeant le paiement d\u2019une ran\u00e7on de 300 dollars (en bitcoins bien s\u00fbr) en \u00e9change de la r\u00e9cup\u00e9ration des fichiers.\u00a0<\/p><p>\u00a0<\/p><p>NotPetya, quant \u00e0 lui, a vu le jour en juin 2017\u00a0: il s\u2019agissait en r\u00e9alit\u00e9 d\u2019un virus d\u00e9guis\u00e9 en un\u00a0<em>ransomware<\/em>\u00a0ayant pour vocation de rappeler son pr\u00e9d\u00e9cesseur Petya. Cette cyberattaque bien plus puissante, dont on ne connait pas l\u2019origine, s\u2019est propag\u00e9e presque sans intervention humaine (contrairement \u00e0 Petya qui requ\u00e9rait le t\u00e9l\u00e9chargement d\u2019un spam envoy\u00e9 par email)\u00a0: il suffisait d\u2019un seul poste non mis \u00e0 jour sur un r\u00e9seau pour que l\u2019ensemble du r\u00e9seau soit potentiellement compromis, sans compter que l\u2019int\u00e9gralit\u00e9 du disque dur \u00e9tait touch\u00e9e (et non seulement, comme Wannacry, le syst\u00e8me d\u2019exploitation et les fichiers stock\u00e9s).\u00a0<\/p><p>\u00a0<\/p><p>On estime \u00e0 plus de 2 000 le nombre de soci\u00e9t\u00e9s qui ont \u00e9t\u00e9 infect\u00e9es par ce virus. Parmi elles, Saint-Gobain (co\u00fbt de 220 millions d\u2019euros) et la SNCF, mais aussi le publicitaire WPP ou encore le labo pharmaceutique Merck\u00a0; le syst\u00e8me de surveillance des radiations de la centrale nucl\u00e9aire ukrainienne de Tchernobyl a lui aussi \u00e9t\u00e9 infect\u00e9. Les victimes ne pouvaient m\u00eame pas payer la ran\u00e7on pour r\u00e9cup\u00e9rer la cl\u00e9 de d\u00e9cryptage, l\u2019adresse mail associ\u00e9e \u00e0 l\u2019attaque \u00e9tant invalide\u2026<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-6824576 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"6824576\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-bb26da7\" data-id=\"bb26da7\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7ec5dd4 elementor-widget elementor-widget-spacer\" data-id=\"7ec5dd4\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c740f61 elementor-widget elementor-widget-penci-text-block\" data-id=\"c740f61\" data-element_type=\"widget\" data-widget_type=\"penci-text-block.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"penci-block-vc penci-text-editor\">\n\t\t\t        <div class=\"penci-border-arrow penci-homepage-title penci-home-latest-posts style-7 pcalign-left pciconp-right pcicon-right block-title-icon-left\">\n            <h3 class=\"inner-arrow\">\n                <span>\n                    <span>PARTAGER CET ARTICLE<\/a>                <\/span>\n            <\/h3>\n\t\t\t        <\/div>\n\t\t\t\t\t<div class=\"penci-block_content\">\n\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0f0e0d0 elementor-share-buttons--view-icon elementor-share-buttons--shape-circle elementor-share-buttons--align-center elementor-share-buttons--skin-gradient elementor-grid-0 elementor-share-buttons--color-official elementor-widget elementor-widget-share-buttons\" data-id=\"0f0e0d0\" data-element_type=\"widget\" data-widget_type=\"share-buttons.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-grid\">\n\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_facebook\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on facebook\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-facebook\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_twitter\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on twitter\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-twitter\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_linkedin\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on linkedin\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-linkedin\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_whatsapp\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on whatsapp\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fab fa-whatsapp\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-grid-item\">\n\t\t\t\t\t\t<div\n\t\t\t\t\t\t\tclass=\"elementor-share-btn elementor-share-btn_email\"\n\t\t\t\t\t\t\trole=\"button\"\n\t\t\t\t\t\t\ttabindex=\"0\"\n\t\t\t\t\t\t\taria-label=\"Share on email\"\n\t\t\t\t\t\t>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-share-btn__icon\">\n\t\t\t\t\t\t\t\t<i class=\"fas fa-envelope\" aria-hidden=\"true\"><\/i>\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-82d7e6c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"82d7e6c\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-a53f34f\" data-id=\"a53f34f\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-64aef9c elementor-post-navigation-borders-yes elementor-widget elementor-widget-post-navigation\" data-id=\"64aef9c\" data-element_type=\"widget\" data-widget_type=\"post-navigation.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation\">\n\t\t\t<div class=\"elementor-post-navigation__prev elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/quest-ce-quune-attaque-ddos-comment-ca-marche\/\" rel=\"prev\"><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-prev\"><i class=\"fa fa-chevron-circle-left\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Prev<\/span><\/span><span class=\"elementor-post-navigation__link__prev\"><span class=\"post-navigation__prev--label\">Pr\u00e9c\u00e9dent<\/span><span class=\"post-navigation__prev--title\">Qu\u2019est-ce qu\u2019une attaque DDoS? Comment \u00e7a marche?<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-post-navigation__separator-wrapper\">\n\t\t\t\t\t<div class=\"elementor-post-navigation__separator\"><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"elementor-post-navigation__next elementor-post-navigation__link\">\n\t\t\t\t<a href=\"https:\/\/curtispc.fr\/blog\/piratage-informatique\/\" rel=\"next\"><span class=\"elementor-post-navigation__link__next\"><span class=\"post-navigation__next--label\">Suivant<\/span><span class=\"post-navigation__next--title\">Piratage informatique des PME et ETI<\/span><\/span><span class=\"post-navigation__arrow-wrapper post-navigation__arrow-next\"><i class=\"fa fa-chevron-circle-right\" aria-hidden=\"true\"><\/i><span class=\"elementor-screen-only\">Next<\/span><\/span><\/a>\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-50f7d18 elementor-widget elementor-widget-spacer\" data-id=\"50f7d18\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-848085d elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"848085d\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-cf0e263\" data-id=\"cf0e263\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-50c34b0 elementor-headline--style-highlight elementor-widget elementor-widget-animated-headline\" data-id=\"50c34b0\" data-element_type=\"widget\" data-settings=\"{&quot;marker&quot;:&quot;double&quot;,&quot;highlighted_text&quot;:&quot;Articles Similaires&quot;,&quot;headline_style&quot;:&quot;highlight&quot;,&quot;loop&quot;:&quot;yes&quot;,&quot;highlight_animation_duration&quot;:1200,&quot;highlight_iteration_delay&quot;:8000}\" data-widget_type=\"animated-headline.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<h2 class=\"elementor-headline\">\n\t\t\t\t<span class=\"elementor-headline-dynamic-wrapper elementor-headline-text-wrapper\">\n\t\t\t\t\t<span class=\"elementor-headline-dynamic-text elementor-headline-text-active\">Articles Similaires<\/span>\n\t\t\t\t<\/span>\n\t\t\t\t<\/h2>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-2fc543e elementor-widget elementor-widget-spacer\" data-id=\"2fc543e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-2932f20 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"2932f20\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-6a0b773\" data-id=\"6a0b773\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9d2fd96 elementor-widget elementor-widget-penci-featured-sliders\" data-id=\"9d2fd96\" data-element_type=\"widget\" data-widget_type=\"penci-featured-sliders.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"penci-block-el featured-area featured-style-23\"><div class=\"penci-owl-featured-area elsl-style-23 swiper penci-owl-carousel pcfg-slide-9d2fd96 elsl-style-23\" data-dots=\"false\" data-nav=\"true\" data-ceffect=\"swing\" data-seffect=\"creative\" data-style=\"style-23\" data-auto=\"true\" data-autotime=\"4000\" data-speed=\"600\" data-loop=\"true\"><div class=\"penci-owl-nav\"><div class=\"owl-prev\"><i class=\"penciicon-left-chevron\"><\/i><\/div><div class=\"owl-next\"><i class=\"penciicon-right-chevron\"><\/i><\/div><\/div><div class=\"swiper-wrapper\">    <div class=\"item swiper-slide\">\n        <div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473-585x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2025\/01\/deepseek-ai-icon-logo-png_seeklogo-611473-585x585.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\"\n                           title=\"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source\"\n                           href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/\">DeepSeek : La Startup Chinoise qui R\u00e9volutionne l\u2019IA Open-Source<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2025-01-28T15:33:19+01:00\">28 janvier 2025<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/deepseek-la-startup-chinoise-qui-revolutionne-lia-open-source\/#respond \">0 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/Windows-11-security-585x390.webp\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/Windows-11-security-585x365.webp\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-un-clic-suffit-pour-renforcer-votre-securite-introduction\/\"\n                           title=\"Windows 11 : un clic suffit pour renforcer votre s\u00e9curit\u00e9 Introduction\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Windows 11 : un clic suffit pour renforcer votre s\u00e9curit\u00e9 Introduction\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-un-clic-suffit-pour-renforcer-votre-securite-introduction\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Windows 11 : un clic suffit pour renforcer votre s\u00e9curit\u00e9 Introduction\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/windows-11-un-clic-suffit-pour-renforcer-votre-securite-introduction\/\">Windows 11 : un clic suffit pour renforcer votre s\u00e9curit\u00e9 Introduction<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2024-12-22T10:26:54+01:00\">22 d\u00e9cembre 2024<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/windows-11-un-clic-suffit-pour-renforcer-votre-securite-introduction\/#respond \">0 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/Copilote-512x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/Copilote.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-la-traduction-en-direct-des-sous-titres-setend-aux-pc-intel-et-amd\/\"\n                           title=\"Windows 11 : la traduction en direct des sous-titres s&rsquo;\u00e9tend aux PC Intel et AMD\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Windows 11 : la traduction en direct des sous-titres s&rsquo;\u00e9tend aux PC Intel et AMD\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-la-traduction-en-direct-des-sous-titres-setend-aux-pc-intel-et-amd\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Windows 11 : la traduction en direct des sous-titres s&rsquo;\u00e9tend aux PC Intel et AMD\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/windows-11-la-traduction-en-direct-des-sous-titres-setend-aux-pc-intel-et-amd\/\">Windows 11 : la traduction en direct des sous-titres s&rsquo;\u00e9tend aux PC...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/windows-11-500x500-01-500x390.png\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2024\/12\/windows-11-500x500-01.png\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-microsoft-vous-rappelle-a-lordre-si-vous-forcez-linstallation\/\"\n                           title=\"Windows 11 : Microsoft vous rappelle \u00e0 l&rsquo;ordre si vous forcez l&rsquo;installation\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Windows 11 : Microsoft vous rappelle \u00e0 l&rsquo;ordre si vous forcez l&rsquo;installation\"\n                           href=\"https:\/\/curtispc.fr\/blog\/windows-11-microsoft-vous-rappelle-a-lordre-si-vous-forcez-linstallation\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Windows 11 : Microsoft vous rappelle \u00e0 l&rsquo;ordre si vous forcez l&rsquo;installation\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/windows-11-microsoft-vous-rappelle-a-lordre-si-vous-forcez-linstallation\/\">Windows 11 : Microsoft vous rappelle \u00e0 l&rsquo;ordre si vous forcez l&rsquo;installation<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/istockphoto-832169838-612x612-1-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"\n                           title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution silencieuse dans le domaine du droit\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/lintelligence-artificielle-et-lapprentissage\/\">L&rsquo;intelligence artificielle et l&rsquo;apprentissage automatique sont les fers de lance d&rsquo;une r\u00e9volution...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/byod_risque-585x439.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"\n                           title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/boyd-%e2%80%89bring-your-own-device%e2%80%89-quelle-sont-les-risques%e2%80%89\/\">Boyd \u00ab\u2009Bring your own device\u2009\u00bb quelle sont les risques\u2009?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-computing.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/cloud-computing.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comparatif-des-offres-de-cloud-en-ligne\/\"\n                           title=\"Comparatif des offres de cloud en ligne\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Comparatif des offres de cloud en ligne\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comparatif-des-offres-de-cloud-en-ligne\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Comparatif des offres de cloud en ligne\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/comparatif-des-offres-de-cloud-en-ligne\/\">Comparatif des offres de cloud en ligne<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-28T10:00:12+02:00\">28 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/comparatif-des-offres-de-cloud-en-ligne\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/vpn_windows-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/vpn_windows-585x384.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-installer-un-vpn-sous-windows-10\/\"\n                           title=\"Comment installer un vpn sous windows 10 ?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Comment installer un vpn sous windows 10 ?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-installer-un-vpn-sous-windows-10\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Comment installer un vpn sous windows 10 ?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/comment-installer-un-vpn-sous-windows-10\/\">Comment installer un vpn sous windows 10 ?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-03-20T11:00:07+01:00\">20 mars 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/comment-installer-un-vpn-sous-windows-10\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/10_hacker-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"\n                           title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-hackers-les-plus-celebres\/\">TOP 10 DES HACKERS LES PLUS C\u00c9L\u00c8BRES<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/coronavirus-wuhan-ia-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/coronavirus-wuhan-ia-585x351.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lapplication-de-coronavirus\/\"\n                           title=\"L&rsquo;application de coronavirus propuls\u00e9e par l&rsquo;IA aidera les individus \u00e0 \u00e9valuer le risque de coronavirus\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"L&rsquo;application de coronavirus propuls\u00e9e par l&rsquo;IA aidera les individus \u00e0 \u00e9valuer le risque de coronavirus\"\n                           href=\"https:\/\/curtispc.fr\/blog\/lapplication-de-coronavirus\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"L&rsquo;application de coronavirus propuls\u00e9e par l&rsquo;IA aidera les individus \u00e0 \u00e9valuer le risque de coronavirus\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/lapplication-de-coronavirus\/\">L&rsquo;application de coronavirus propuls\u00e9e par l&rsquo;IA aidera les individus \u00e0 \u00e9valuer le...<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/infogerance_windows-585x300.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/infogerance_windows-585x293.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/infogerance-informatique-externalisee\/\"\n                           title=\"Infog\u00e9rance informatique externalis\u00e9e\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Infog\u00e9rance informatique externalis\u00e9e\"\n                           href=\"https:\/\/curtispc.fr\/blog\/infogerance-informatique-externalisee\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Infog\u00e9rance informatique externalis\u00e9e\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/infogerance-informatique-externalisee\/\">Infog\u00e9rance informatique externalis\u00e9e<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/eset-cybersecurite-solutions-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/eset-cybersecurite-solutions-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-mon-mac-des-virus\/\"\n                           title=\"Comment prot\u00e9ger mon mac des virus  ?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Comment prot\u00e9ger mon mac des virus  ?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-mon-mac-des-virus\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Comment prot\u00e9ger mon mac des virus  ?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/comment-proteger-mon-mac-des-virus\/\">Comment prot\u00e9ger mon mac des virus ?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t<\/div><\/div><div class=\"item swiper-slide\"><div class=\"wrapper-item wrapper-item-classess\">\n\t\t\t\t                <div class=\"penci-item-mag penci-item-1 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/social_engineering_2.0-585x293.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"\n                           title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                           href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/\">\u00cates-vous une faille de s\u00e9curit\u00e9 humaine sur Internet ? Social engineering<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2021-02-22T10:00:07+01:00\">22 f\u00e9vrier 2021<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/etes-vous-une-faille-de-securite-humaine-sur-internet-social-engineering\/#comments \">2 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-2 penci-pitem-big\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/fond_ecran_whatsapp-320x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/fond_ecran_whatsapp.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/whatsapp-comment-savoir-si-quelquun-ma-bloque\/\"\n                           title=\"WhatsApp : comment savoir si quelqu\u2019un m\u2019a bloqu\u00e9 ?\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"WhatsApp : comment savoir si quelqu\u2019un m\u2019a bloqu\u00e9 ?\"\n                           href=\"https:\/\/curtispc.fr\/blog\/whatsapp-comment-savoir-si-quelquun-ma-bloque\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"WhatsApp : comment savoir si quelqu\u2019un m\u2019a bloqu\u00e9 ?\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/whatsapp-comment-savoir-si-quelquun-ma-bloque\/\">WhatsApp : comment savoir si quelqu\u2019un m\u2019a bloqu\u00e9 ?<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <div class=\"feat-meta\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-time\"><time class=\"entry-date published\" datetime=\"2020-02-24T10:00:37+01:00\">24 f\u00e9vrier 2020<\/time><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                                <span class=\"feat-comments\"><a\n                                                            href=\"https:\/\/curtispc.fr\/blog\/whatsapp-comment-savoir-si-quelquun-ma-bloque\/#comments \">1 Commentaires<\/a><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                                        <\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-3 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/algorithme-585x329.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"\n                           title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                           href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/top-10-des-algorithmes-que-chaque-programmeur-devrait-connaitre\/\">Top 10 des algorithmes que chaque programmeur devrait conna\u00eetre<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-4 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/security-4851428_960_720-585x366.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"\n                           title=\"Mise en garde contre les menaces qui existent sur le web\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Mise en garde contre les menaces qui existent sur le web\"\n                           href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Mise en garde contre les menaces qui existent sur le web\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/mise-en-garde-contre-les-menaces-qui-existent-sur-le-web\/\">Mise en garde contre les menaces qui existent sur le web<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-5 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password-585x390.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/02\/security-password-585x390.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\"\n                           title=\"Authentification par mot de passe\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"Authentification par mot de passe\"\n                           href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"Authentification par mot de passe\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/authentification-par-mot-de-passe\/\">Authentification par mot de passe<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t                <div class=\"penci-item-mag penci-item-0 penci-pitem-small\">\n\t\t\t\t\t\t\t\t\t\t                        <a class=\"penci-image-holder penci-lazy\"\n                           data-bgset=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\" data_bg_hidpi=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\"\n                           href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\"\n                           title=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"><\/a>\n\t\t\t\t\t                    <div class=\"penci-slide-overlay penci-slider6-overlay\">\n                        <a class=\"overlay-link\"\n                           aria-label=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"\n                           href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\"><\/a>\n\t\t\t\t\t\t                        <div class=\"penci-mag-featured-content\">\n                            <div class=\"feat-text\">\n\t\t\t\t\t\t\t\t                                <h3><a title=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"\n                                       href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\">D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)<\/a>\n                                <\/h3>\n\t\t\t\t\t\t\t\t                            <\/div>\n                        <\/div>\n                    <\/div>\n                <\/div>\n\n\t\t\t\t\n\t\t\t\t        <\/div>\n    <\/div>\n<\/div><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-eb4006e elementor-widget elementor-widget-spacer\" data-id=\"eb4006e\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"penci-section penci-disSticky penci-structure-10 elementor-section elementor-top-section elementor-element elementor-element-cc2256e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"cc2256e\" data-element_type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"penci-ercol-100 penci-ercol-order-1 penci-sticky-ct    elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-70d5c9c\" data-id=\"70d5c9c\" data-element_type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-9f9d352 elementor-widget elementor-widget-spacer\" data-id=\"9f9d352\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Comment s&rsquo;appelle un logiciel qui peut infecter un fichier et causer des dommages \u00e0 l&rsquo;ordinateur ? C&rsquo;est une des cat\u00e9gories de logiciel malveillant ou programme malveillant ou encore malware. Quelle&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2982,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[28,27],"tags":[46,50,49,47],"class_list":["post-2931","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-securite-informatique","category-windows-mac-linux","tag-cyber-securite","tag-linux","tag-mac","tag-windows"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>D\u00e9finition d\u2019un logiciel malveillant en informatique (malware)<\/title>\n<meta name=\"description\" content=\"C\u2019est une des cat\u00e9gories de logiciel malveillant ou programme malveillant ou encore malware. Quelle est la d\u00e9finition d\u2019un logiciel malveillant ?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9finition d\u2019un logiciel malveillant en informatique (malware)\" \/>\n<meta property=\"og:description\" content=\"C\u2019est une des cat\u00e9gories de logiciel malveillant ou programme malveillant ou encore malware. Quelle est la d\u00e9finition d\u2019un logiciel malveillant ?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog | Curtis PC 2025\" \/>\n<meta property=\"article:published_time\" content=\"2020-01-16T13:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-03-22T23:51:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"478\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"curtispc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@curtispcfr\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"curtispc\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\",\"url\":\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\",\"name\":\"D\u00e9finition d\u2019un logiciel malveillant en informatique (malware)\",\"isPartOf\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\",\"datePublished\":\"2020-01-16T13:00:19+00:00\",\"dateModified\":\"2020-03-22T23:51:41+00:00\",\"author\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\"},\"description\":\"C\u2019est une des cat\u00e9gories de logiciel malveillant ou programme malveillant ou encore malware. Quelle est la d\u00e9finition d\u2019un logiciel malveillant ?\",\"breadcrumb\":{\"@id\":\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#primaryimage\",\"url\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\",\"contentUrl\":\"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg\",\"width\":478,\"height\":360},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\/\/curtispc.fr\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#website\",\"url\":\"https:\/\/curtispc.fr\/blog\/\",\"name\":\"Blog | Curtis PC 2025\",\"description\":\"Pour une vie num\u00e9rique plus simple\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/curtispc.fr\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653\",\"name\":\"curtispc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g\",\"caption\":\"curtispc\"},\"sameAs\":[\"https:\/\/www.curtispc.fr\/\",\"https:\/\/x.com\/curtispcfr\"],\"url\":\"https:\/\/curtispc.fr\/blog\/author\/curtispc\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9finition d\u2019un logiciel malveillant en informatique (malware)","description":"C\u2019est une des cat\u00e9gories de logiciel malveillant ou programme malveillant ou encore malware. Quelle est la d\u00e9finition d\u2019un logiciel malveillant ?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/","og_locale":"fr_FR","og_type":"article","og_title":"D\u00e9finition d\u2019un logiciel malveillant en informatique (malware)","og_description":"C\u2019est une des cat\u00e9gories de logiciel malveillant ou programme malveillant ou encore malware. Quelle est la d\u00e9finition d\u2019un logiciel malveillant ?","og_url":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/","og_site_name":"Blog | Curtis PC 2025","article_published_time":"2020-01-16T13:00:19+00:00","article_modified_time":"2020-03-22T23:51:41+00:00","og_image":[{"width":478,"height":360,"url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg","type":"image\/jpeg"}],"author":"curtispc","twitter_card":"summary_large_image","twitter_creator":"@curtispcfr","twitter_misc":{"\u00c9crit par":"curtispc","Dur\u00e9e de lecture estim\u00e9e":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/","url":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/","name":"D\u00e9finition d\u2019un logiciel malveillant en informatique (malware)","isPartOf":{"@id":"https:\/\/curtispc.fr\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#primaryimage"},"image":{"@id":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg","datePublished":"2020-01-16T13:00:19+00:00","dateModified":"2020-03-22T23:51:41+00:00","author":{"@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653"},"description":"C\u2019est une des cat\u00e9gories de logiciel malveillant ou programme malveillant ou encore malware. Quelle est la d\u00e9finition d\u2019un logiciel malveillant ?","breadcrumb":{"@id":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#primaryimage","url":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg","contentUrl":"https:\/\/curtispc.fr\/blog\/wp-content\/uploads\/2020\/03\/malware_window-2.jpg","width":478,"height":360},{"@type":"BreadcrumbList","@id":"https:\/\/curtispc.fr\/blog\/definition-dun-logiciel-malveillant-en-informatique-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/curtispc.fr\/blog\/"},{"@type":"ListItem","position":2,"name":"D\u00e9finition d\u2019un logiciel malveillant en informatique (Malware)"}]},{"@type":"WebSite","@id":"https:\/\/curtispc.fr\/blog\/#website","url":"https:\/\/curtispc.fr\/blog\/","name":"Blog | Curtis PC 2025","description":"Pour une vie num\u00e9rique plus simple","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/curtispc.fr\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/751262d339812b9e62cb0d1dc09c5653","name":"curtispc","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/curtispc.fr\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/663d9ed39cf5b5548c531ba51ac4c235?s=96&d=monsterid&r=g","caption":"curtispc"},"sameAs":["https:\/\/www.curtispc.fr\/","https:\/\/x.com\/curtispcfr"],"url":"https:\/\/curtispc.fr\/blog\/author\/curtispc\/"}]}},"_links":{"self":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/2931","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/comments?post=2931"}],"version-history":[{"count":20,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/2931\/revisions"}],"predecessor-version":[{"id":3343,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/posts\/2931\/revisions\/3343"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media\/2982"}],"wp:attachment":[{"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/media?parent=2931"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/categories?post=2931"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/curtispc.fr\/blog\/wp-json\/wp\/v2\/tags?post=2931"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}