
{"id":673,"date":"2021-01-06T18:15:06","date_gmt":"2021-01-06T17:15:06","guid":{"rendered":"https:\/\/parlonstechs.com\/all\/?p=673"},"modified":"2022-09-25T21:25:20","modified_gmt":"2022-09-25T19:25:20","slug":"deni-de-service-quest-ce-que-cest","status":"publish","type":"post","link":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/","title":{"rendered":"D\u00e9ni de Service : Qu&rsquo;est-ce que c&rsquo;est ?"},"content":{"rendered":"\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"https:\/\/cdn.futura-sciences.com\/buildsv6\/images\/wide1920\/e\/f\/f\/eff315adf5_103383_deni-service-dos-ddos.jpg\" alt=\"D\u00e9finition | D\u00e9ni de service - Denial of service - DoS - DDoS | Futura Tech\"\/><\/figure>\n\n\n\n<p style=\"font-size:24px\"><strong>L&rsquo;attaque par d\u00e9ni de service, ou DoS (en anglais&nbsp;<em>Denial of Service<\/em>), vise \u00e0 perturber, ou paralyser totalement, le fonctionnement d&rsquo;un&nbsp;serveur&nbsp;informatique en le bombardant \u00e0 outrance de&nbsp;requ\u00eates&nbsp;erron\u00e9es.<\/strong><\/p>\n\n\n\n<p>Le but peut \u00eatre d&rsquo;affecter un service en ligne ou le r\u00e9seau d&rsquo;une entreprise en saturant une des ressources du syst\u00e8me&nbsp;: la&nbsp;bande passante, l&rsquo;espace de stockage, la capacit\u00e9 de traitement d&rsquo;une&nbsp;base de donn\u00e9es, les ressources de calcul des&nbsp;processeurs, la&nbsp;m\u00e9moire vive, etc.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Attaques par d\u00e9ni de service<\/h2>\n\n\n\n<ul class=\"wp-block-list\"><li>Exploitation de&nbsp;failles&nbsp;de s\u00e9curit\u00e9 pr\u00e9sentes dans l&rsquo;un des composants du syst\u00e8me ;<\/li><li>Attaque SYN Flood&nbsp;: demandes de synchronisation TCP incompl\u00e8tes envoy\u00e9es au serveur ;<\/li><li>UDP Flooding&nbsp;: g\u00e9n\u00e9ration d&rsquo;une grande quantit\u00e9 de&nbsp;paquets&nbsp;UDP ;<\/li><li>Packet Fragment&nbsp;: exploite des faiblesses au niveau de la&nbsp;d\u00e9fragmentation&nbsp;IP ;<\/li><li>Smurfing&nbsp;: trucage des&nbsp;paquets&nbsp;ICMP ECHO REQUEST.<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Ordinateur zombie, ou&nbsp;<em>botnet<\/em>, et DDoS<\/h2>\n\n\n\n<p>Si les premi\u00e8res attaques par d\u00e9ni de service \u00e9taient le fait de cyberpirates solitaires \u0153uvrant \u00e0 partir d&rsquo;un seul ordinateur, la technique s&rsquo;est rapidement perfectionn\u00e9e avec le recours \u00e0 des r\u00e9seaux d&rsquo;ordinateurs \u00ab&nbsp;zombies&nbsp;\u00bb aussi appel\u00e9s&nbsp;<em>botnet<\/em>&nbsp;(contraction des termes anglais&nbsp;<em>robot&nbsp;<\/em>et&nbsp;<em>network<\/em>). Ces machines, qui ont \u00e9t\u00e9 pr\u00e9alablement infect\u00e9es \u00e0 l&rsquo;aide d&rsquo;un&nbsp;logiciel malveillant, sont command\u00e9es \u00e0 distance&nbsp;<em>via<\/em>&nbsp;un centre de contr\u00f4le (<em>command center<\/em>) op\u00e9r\u00e9 par un ou plusieurs pirates.<\/p>\n\n\n\n<p>Dans ce cas, on parle d&rsquo;attaque par d\u00e9ni de service distribu\u00e9 (en anglais DDoS ou&nbsp;<em>Distributed Denial of Service<\/em>). Un&nbsp;<em>botnet<\/em>&nbsp;peut compter parfois plusieurs milliers d&rsquo;ordinateurs dont les propri\u00e9taires ignorent tout de l&rsquo;infection dont ils sont victimes.<\/p>\n\n\n\n<p><strong>Les attaques par d\u00e9ni de service sont souvent utilis\u00e9es pour extorquer de l\u2019argent aux victimes. Il s\u2019agit, dans la plupart des cas, de soci\u00e9t\u00e9s prosp\u00e8res qui peuvent perdre \u00e9norm\u00e9ment d\u2019argent en cas de blocage de leur service en ligne ou de leur r\u00e9seau informatique.&nbsp;<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Chantage et extorsion<\/h2>\n\n\n\n<p>\u00c0 l&rsquo;origine, les attaques DoS \u00e9taient utilis\u00e9es par des hackers comme des d\u00e9monstrations de force destin\u00e9es \u00e0 gagner le respect de leur communaut\u00e9. Cependant,&nbsp;le d\u00e9veloppement de l&rsquo;\u00e9conomie&nbsp;num\u00e9rique&nbsp;en a fait une arme de repr\u00e9sailles, de chantage voire d&rsquo;extorsion. Un pirate va lancer une attaque contre une entreprise ou un service en ligne puis lui r\u00e9clamer de l&rsquo;argent&nbsp;pour y mettre fin.<\/p>\n\n\n\n<p>Une pratique tr\u00e8s r\u00e9pandue consiste \u00e9galement \u00e0 louer un<em>&nbsp;botnet<\/em>&nbsp;pour perp\u00e9trer une attaque. Pour quelques dollars de l&rsquo;heure, on trouve facilement ce genre \u00ab&nbsp;d&rsquo;outils&nbsp;\u00bb sur le march\u00e9 noir d&rsquo;Internet.<\/p>\n\n\n\n<p>Face \u00e0 ce type de menaces, des unit\u00e9s de lutte contre le cybercrime m\u00e8nent r\u00e9guli\u00e8rement des op\u00e9rations de d\u00e9mant\u00e8lement de ces&nbsp;<em>botnets<\/em>. En 2013,&nbsp;Microsoft&nbsp;a fait tomber le&nbsp;<em>botnet<\/em>&nbsp;Citadel qui aurait caus\u00e9 pr\u00e8s de 500 millions de dollars de pertes financi\u00e8res \u00e0 des particuliers et des entreprises.<\/p>\n\n\n\n<p>Avec Futura<\/p>\n","protected":false},"excerpt":{"rendered":"<p>L&rsquo;attaque par d\u00e9ni de service, ou DoS (en anglais&nbsp;Denial of Service), vise \u00e0 perturber, ou paralyser totalement, le fonctionnement d&rsquo;un&nbsp;serveur&nbsp;informatique en le bombardant \u00e0 outrance de&nbsp;requ\u00eates&nbsp;erron\u00e9es. Le but peut \u00eatre [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":675,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[21,117,11],"tags":[],"class_list":["post-673","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite","category-ckoi","category-cybersecurite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>D\u00e9ni de Service : Qu&#039;est-ce que c&#039;est ? - Parlons Techs - Store<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"D\u00e9ni de Service : Qu&#039;est-ce que c&#039;est ?\" \/>\n<meta property=\"og:description\" content=\"L&#039;attaque par d\u00e9ni de service, ou DoS (en anglais\u00a0Denial of Service), vise \u00e0 perturber, ou paralyser totalement, le fonctionnement d&#039;un\u00a0serveur\u00a0informatique en le bombardant \u00e0 outrance de\u00a0requ\u00eates\u00a0erron\u00e9es.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/\" \/>\n<meta property=\"og:site_name\" content=\"Parlons Techs - Store\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-06T17:15:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-25T19:25:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/social.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"500\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"wisdom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"D\u00e9ni de Service : Qu&#039;est-ce que c&#039;est ?\" \/>\n<meta name=\"twitter:description\" content=\"L&#039;attaque par d\u00e9ni de service, ou DoS (en anglais\u00a0Denial of Service), vise \u00e0 perturber, ou paralyser totalement, le fonctionnement d&#039;un\u00a0serveur\u00a0informatique en le bombardant \u00e0 outrance de\u00a0requ\u00eates\u00a0erron\u00e9es.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/social.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"wisdom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/\"},\"author\":{\"name\":\"wisdom\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"headline\":\"D\u00e9ni de Service : Qu&rsquo;est-ce que c&rsquo;est ?\",\"datePublished\":\"2021-01-06T17:15:06+00:00\",\"dateModified\":\"2022-09-25T19:25:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/\"},\"wordCount\":564,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-28.jpg\",\"articleSection\":[\"Actualit\u00e9\",\"Ckoi\",\"CyberS\u00e9curit\u00e9\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/\",\"name\":\"D\u00e9ni de Service : Qu'est-ce que c'est ? - Parlons Techs - Store\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-28.jpg\",\"datePublished\":\"2021-01-06T17:15:06+00:00\",\"dateModified\":\"2022-09-25T19:25:20+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/#primaryimage\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-28.jpg\",\"contentUrl\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/pt-28.jpg\",\"width\":265,\"height\":119},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/2021\\\/01\\\/06\\\/deni-de-service-quest-ce-que-cest\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"D\u00e9ni de Service : Qu&rsquo;est-ce que c&rsquo;est ?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#website\",\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/\",\"name\":\"Parlons Techs - Store\",\"description\":\"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/#\\\/schema\\\/person\\\/a93526e9c6c72ccb484abb7008892823\",\"name\":\"wisdom\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g\",\"caption\":\"wisdom\"},\"sameAs\":[\"https:\\\/\\\/parlonstechs.com\\\/all\"],\"url\":\"https:\\\/\\\/parlonstechs.com\\\/all\\\/author\\\/wisdom\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"D\u00e9ni de Service : Qu'est-ce que c'est ? - Parlons Techs - Store","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/","og_locale":"fr_FR","og_type":"article","og_title":"D\u00e9ni de Service : Qu'est-ce que c'est ?","og_description":"L'attaque par d\u00e9ni de service, ou DoS (en anglais\u00a0Denial of Service), vise \u00e0 perturber, ou paralyser totalement, le fonctionnement d'un\u00a0serveur\u00a0informatique en le bombardant \u00e0 outrance de\u00a0requ\u00eates\u00a0erron\u00e9es.","og_url":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/","og_site_name":"Parlons Techs - Store","article_published_time":"2021-01-06T17:15:06+00:00","article_modified_time":"2022-09-25T19:25:20+00:00","og_image":[{"width":900,"height":500,"url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/social.jpg","type":"image\/jpeg"}],"author":"wisdom","twitter_card":"summary_large_image","twitter_title":"D\u00e9ni de Service : Qu'est-ce que c'est ?","twitter_description":"L'attaque par d\u00e9ni de service, ou DoS (en anglais\u00a0Denial of Service), vise \u00e0 perturber, ou paralyser totalement, le fonctionnement d'un\u00a0serveur\u00a0informatique en le bombardant \u00e0 outrance de\u00a0requ\u00eates\u00a0erron\u00e9es.","twitter_image":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/social.jpg","twitter_misc":{"\u00c9crit par":"wisdom","Dur\u00e9e de lecture estim\u00e9e":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/#article","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/"},"author":{"name":"wisdom","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"headline":"D\u00e9ni de Service : Qu&rsquo;est-ce que c&rsquo;est ?","datePublished":"2021-01-06T17:15:06+00:00","dateModified":"2022-09-25T19:25:20+00:00","mainEntityOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/"},"wordCount":564,"commentCount":0,"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-28.jpg","articleSection":["Actualit\u00e9","Ckoi","CyberS\u00e9curit\u00e9"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/","url":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/","name":"D\u00e9ni de Service : Qu'est-ce que c'est ? - Parlons Techs - Store","isPartOf":{"@id":"https:\/\/parlonstechs.com\/all\/#website"},"primaryImageOfPage":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/#primaryimage"},"image":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/#primaryimage"},"thumbnailUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-28.jpg","datePublished":"2021-01-06T17:15:06+00:00","dateModified":"2022-09-25T19:25:20+00:00","author":{"@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823"},"breadcrumb":{"@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/#primaryimage","url":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-28.jpg","contentUrl":"https:\/\/parlonstechs.com\/all\/wp-content\/uploads\/2021\/01\/pt-28.jpg","width":265,"height":119},{"@type":"BreadcrumbList","@id":"https:\/\/parlonstechs.com\/all\/2021\/01\/06\/deni-de-service-quest-ce-que-cest\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/parlonstechs.com\/all\/"},{"@type":"ListItem","position":2,"name":"D\u00e9ni de Service : Qu&rsquo;est-ce que c&rsquo;est ?"}]},{"@type":"WebSite","@id":"https:\/\/parlonstechs.com\/all\/#website","url":"https:\/\/parlonstechs.com\/all\/","name":"Parlons Techs - Store","description":"Toute L&#039;Actualit\u00e9 sur La Technologie et La Science","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/parlonstechs.com\/all\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Person","@id":"https:\/\/parlonstechs.com\/all\/#\/schema\/person\/a93526e9c6c72ccb484abb7008892823","name":"wisdom","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e752642935d05c7ef20c7ff136e0baadd18b8f39f34dbcffed7f1221cb763284?s=96&d=mm&r=g","caption":"wisdom"},"sameAs":["https:\/\/parlonstechs.com\/all"],"url":"https:\/\/parlonstechs.com\/all\/author\/wisdom\/"}]}},"_links":{"self":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/673","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/comments?post=673"}],"version-history":[{"count":2,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/673\/revisions"}],"predecessor-version":[{"id":3574,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/posts\/673\/revisions\/3574"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media\/675"}],"wp:attachment":[{"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/media?parent=673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/categories?post=673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/parlonstechs.com\/all\/wp-json\/wp\/v2\/tags?post=673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}