{"id":2558,"date":"2020-09-28T15:57:00","date_gmt":"2020-09-28T13:57:00","guid":{"rendered":"https:\/\/fr.koddos.net\/blog\/?p=2558"},"modified":"2020-09-29T16:00:29","modified_gmt":"2020-09-29T14:00:29","slug":"le-code-source-de-windows-xp-devoile-au-public-par-des-hackers","status":"publish","type":"post","link":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/","title":{"rendered":"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS"},"content":{"rendered":"\n<p>Les rapports constants sur les fuites de donn\u00e9es montrent que les hackers s&rsquo;activent s\u00e9rieusement dans tous les r\u00e9seaux sociaux et les organisations pour compromettre et divulguer des donn\u00e9es importantes au public.<\/p>\n\n\n\n<p>Un rapport r\u00e9cent r\u00e9v\u00e8le que le code source de Windows XP a \u00e9t\u00e9 compromis et expos\u00e9 partout sur Internet la semaine derni\u00e8re.<\/p>\n\n\n\n<p>Des fichiers torrents pour les codes sources de Windows Server et de Windows XP 2003 ont \u00e9t\u00e9 partag\u00e9s sur diff\u00e9rents sites de partage de fichiers cette semaine. C&rsquo;est la premi\u00e8re fois que le code source du syst\u00e8me d&rsquo;exploitation est <strong><a href=\"https:\/\/blog.koddos.net\/microsoft-reveals-that-over-250-million-customer-support-records-were-exposed-online\/\">expos\u00e9 en ligne<\/a><\/strong>.<\/p>\n\n\n\n<p>Les chercheurs en s\u00e9curit\u00e9 ont \u00e9galement v\u00e9rifi\u00e9 l&rsquo;authenticit\u00e9 de <strong><a href=\"https:\/\/blog.koddos.net\/database-of-a-popular-darknet-hosting-provider-leaked-by-a-hacker\/\">la base de donn\u00e9es ayant fait l&rsquo;objet de la fuite<\/a><\/strong>. Un porte-parole de Microsoft a r\u00e9v\u00e9l\u00e9 que l&rsquo;entreprise enqu\u00eate sur l&rsquo;incident et informera le public lorsque quelque chose d&rsquo;important se produira au cours de l&rsquo;enqu\u00eate.<\/p>\n\n\n\n<p>Cependant, cette derni\u00e8re fuite de donn\u00e9es ne pose pas de probl\u00e8me s\u00e9rieux pour les entreprises qui utilisent encore les syst\u00e8mes Windows XP. Microsoft a cess\u00e9 de publier tout patch ou mise \u00e0 jour pour Windows XP depuis 2014, bien que la soci\u00e9t\u00e9 ait publi\u00e9 <strong><a href=\"https:\/\/www.theverge.com\/2017\/5\/13\/15635006\/microsoft-windows-xp-security-patch-wannacry-ransomware-attack\">un patch en 2017<\/a><\/strong> apr\u00e8s l&rsquo;attaque massive du logiciel malveillant <strong><a href=\"https:\/\/blog.koddos.net\/cryptocurrency-mining-botnet-uses-nsa-exploit-wannacry\/\">WannaCry<\/a><\/strong>.<\/p>\n\n\n\n<p><strong>Le programme de s\u00e9curit\u00e9 de Microsoft pourrait ne pas \u00eatre suffisant<\/strong><\/p>\n\n\n\n<p>Bien que ce soit la premi\u00e8re fois que le code source de Windows XP est divulgu\u00e9 au public, la soci\u00e9t\u00e9 g\u00e8re un programme de s\u00e9curit\u00e9 gouvernemental (GSP) sp\u00e9cial qui permet aux organisations et aux gouvernements d&rsquo;avoir un acc\u00e8s contr\u00f4l\u00e9 aux codes sources.<\/p>\n\n\n\n<p>Il y a quelques ann\u00e9es, environ 1 Go de donn\u00e9es li\u00e9es \u00e0 Windows 10 ont \u00e9t\u00e9 expos\u00e9es en ligne. Cette ann\u00e9e, Microsoft a \u00e9galement d\u00fb rem\u00e9dier \u00e0 certaines fuites de codes sources li\u00e9es \u00e0 la Xbox. En mai dernier, les codes sources de Windows NT 3.5 et de la Xbox ont \u00e9t\u00e9 expos\u00e9s en ligne quelques semaines seulement apr\u00e8s que le code de la s\u00e9rie Xbox ait \u00e9t\u00e9 pirat\u00e9 et expos\u00e9 en ligne.<\/p>\n\n\n\n<p>Mais pour cette fuite, il n&rsquo;y a pas d&rsquo;information claire concernant la taille des donn\u00e9es du code source de Windows XP qui ont \u00e9t\u00e9 divulgu\u00e9es en ligne.<\/p>\n\n\n\n<p>Certaines parties de <strong><a href=\"https:\/\/blog.koddos.net\/hackers-leaked-32tb-of-secret-windows-10-source-code\/\">la fuite du code source<\/a><\/strong> comprenaient MS-DOS, qui est le syst\u00e8me d&rsquo;exploitation Windows CE de la soci\u00e9t\u00e9, et d&rsquo;autres mat\u00e9riels Microsoft expos\u00e9s. \u00c9trangement, les fichiers divulgu\u00e9s comprenaient \u00e9galement des r\u00e9f\u00e9rences aux th\u00e9ories de conspiration de Bill Gates, ce qui constitue clairement une tentative de d\u00e9sinformation.<\/p>\n\n\n\n<p>Au d\u00e9but de la semaine derni\u00e8re, Twitter a de nouveau \u00e9t\u00e9 touch\u00e9 par la fuite des comptes de personnalit\u00e9s comme <strong><a href=\"https:\/\/blog.koddos.net\/mastermind-behind-twitter-hack-found-its-a-teen-from-florida\/\">Bill Gates<\/a><\/strong> et <strong><a href=\"https:\/\/blog.koddos.net\/deletefacebook-challenge-sees-elon-musk-delete-spacex-and-tesla-from-facebook\/\">ElonMusk<\/a><\/strong>. Cela a conduit \u00e0 un renforcement de la s\u00e9curit\u00e9 interne de Twitter. Cependant, alors que l&rsquo;\u00e9lection pr\u00e9sidentielle am\u00e9ricaine approche, il semble que les hackers tenteront toujours leur chance pour infiltrer les syst\u00e8mes.<\/p>\n\n\n\n<p>Le minist\u00e8re am\u00e9ricain de la justice a \u00e9t\u00e9 tr\u00e8s occup\u00e9 ce mois-ci, avec plusieurs arrestations d\u00e9j\u00e0 effectu\u00e9es. Au d\u00e9but du mois, le d\u00e9partement a arr\u00eat\u00e9 179 vendeurs de darknet dans le monde entier, dans le cadre d&rsquo;un effort coordonn\u00e9 avec certaines autorit\u00e9s polici\u00e8res europ\u00e9ennes.<\/p>\n\n\n\n<p>Ils ont d\u00e9clar\u00e9 que les suspects ont \u00e9t\u00e9 arr\u00eat\u00e9s en raison du rapport de renseignement qu&rsquo;ils ont re\u00e7u apr\u00e8s le march\u00e9 de Wall Street tenu en mai de l&rsquo;ann\u00e9e derni\u00e8re.<\/p>\n\n\n\n<p>Facebook a \u00e9galement \u00e9t\u00e9 impliqu\u00e9 dans de nombreuses op\u00e9rations de nettoyage et de mise \u00e0 jour de s\u00e9curit\u00e9, puisqu&rsquo;il a d\u00e9mantel\u00e9 des r\u00e9seaux de d\u00e9sinformation des services de renseignements militaires russes, des Philippines et de la Chine.<\/p>\n\n\n\n<p>De plus, des chercheurs ont pu d\u00e9couvrir des logiciels publicitaires dans des applications suite \u00e0 un tuyau d&rsquo;un enfant sur un profil TikTok suspect. L&rsquo;application a d\u00e9j\u00e0 \u00e9t\u00e9 t\u00e9l\u00e9charg\u00e9e plus de 2 millions de fois avant d&rsquo;\u00eatre d\u00e9couverte.<\/p>\n\n\n\n<p><strong>Les anciens syst\u00e8mes d&rsquo;exploitation sont des cibles constantes pour les hackers<\/strong><\/p>\n\n\n\n<p>Le refus de Windows XP de s&rsquo;\u00e9teindre a entra\u00een\u00e9 de nombreux probl\u00e8mes de s\u00e9curit\u00e9, car Microsoft a cess\u00e9 de publier des correctifs pour cette version depuis longtemps. Cela signifie que toute vuln\u00e9rabilit\u00e9 de Windows XP ne sera pas corrig\u00e9e, ce qui le rendra exploitable par les <strong><a href=\"https:\/\/blog.koddos.net\/cybercriminals-hack-25-million-user-details-from-popular-math-app\/\">cybercriminels<\/a><\/strong>. Ainsi, ceux qui utilisent encore le paquet XP restent expos\u00e9s et vuln\u00e9rables aux attaques, ce qui s&rsquo;est produit la semaine derni\u00e8re.<\/p>\n\n\n\n<p>Les hackers peuvent identifier les faiblesses potentielles d&rsquo;un syst\u00e8me lorsqu&rsquo;ils passent au peigne fin les codes sources. Il est ainsi plus facile pour les hackers de concevoir des logiciels malveillants contre le syst\u00e8me d&rsquo;exploitation de Microsoft, qui n&rsquo;a probablement pas de r\u00e9ponse de s\u00e9curit\u00e9 contre les logiciels malveillants.<\/p>\n\n\n\n<p>Selon certaines informations, le code source a \u00e9t\u00e9 expos\u00e9 en priv\u00e9 depuis l&rsquo;ann\u00e9e derni\u00e8re, ce qui signifie que certains utilisateurs de la version Windows XP pourraient d\u00e9j\u00e0 avoir \u00e9t\u00e9 compromis. Cette fuite de donn\u00e9es est un autre exemple qui montre les dommages que les hackers peuvent causer aux syst\u00e8mes et aux serveurs qui n&rsquo;ont pas \u00e9t\u00e9 mis \u00e0 jour. C&rsquo;est aussi un avertissement aux utilisateurs qui n&rsquo;ont pas pris la peine de passer \u00e0 une version plus r\u00e9cente du syst\u00e8me d&rsquo;exploitation de Microsoft, qui re\u00e7oit r\u00e9guli\u00e8rement des mises \u00e0 jour.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Les rapports constants sur les fuites de donn\u00e9es montrent que les hackers s&rsquo;activent s\u00e9rieusement dans tous les r\u00e9seaux sociaux et les organisations pour compromettre et divulguer des donn\u00e9es importantes au public. Un rapport r\u00e9cent r\u00e9v\u00e8le que le code source de Windows XP a \u00e9t\u00e9 compromis et expos\u00e9 partout sur Internet la semaine derni\u00e8re. Des fichiers &hellip; <a href=\"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS<\/span><\/a><\/p>\n","protected":false},"author":5,"featured_media":2559,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[6],"tags":[],"class_list":["post-2558","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-actualite"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS - Blog KoDDoS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS - Blog KoDDoS\" \/>\n<meta property=\"og:description\" content=\"Les rapports constants sur les fuites de donn\u00e9es montrent que les hackers s&rsquo;activent s\u00e9rieusement dans tous les r\u00e9seaux sociaux et les organisations pour compromettre et divulguer des donn\u00e9es importantes au public. Un rapport r\u00e9cent r\u00e9v\u00e8le que le code source de Windows XP a \u00e9t\u00e9 compromis et expos\u00e9 partout sur Internet la semaine derni\u00e8re. Des fichiers &hellip; Continue reading LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Blog KoDDoS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/koddosCom\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-28T13:57:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-29T14:00:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"825\" \/>\n\t<meta property=\"og:image:height\" content=\"510\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"KoDDoS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:site\" content=\"@koddoscom\" \/>\n<meta name=\"twitter:label1\" content=\"\u00c9crit par\" \/>\n\t<meta name=\"twitter:data1\" content=\"KoDDoS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Dur\u00e9e de lecture estim\u00e9e\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/\"},\"author\":{\"name\":\"KoDDoS\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\"},\"headline\":\"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS\",\"datePublished\":\"2020-09-28T13:57:00+00:00\",\"dateModified\":\"2020-09-29T14:00:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/\"},\"wordCount\":961,\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1\",\"articleSection\":[\"Actualit\u00e9s\"],\"inLanguage\":\"fr-FR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/\",\"name\":\"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS - Blog KoDDoS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1\",\"datePublished\":\"2020-09-28T13:57:00+00:00\",\"dateModified\":\"2020-09-29T14:00:29+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/#primaryimage\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/09\\\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1\",\"width\":825,\"height\":510},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Accueil\",\"item\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"name\":\"Blog KoDDoS\",\"description\":\"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.\",\"publisher\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#organization\",\"name\":\"KoDDoS\",\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i1.wp.com\\\/fr.koddos.net\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/02\\\/logo.png?fit=258%2C55&ssl=1\",\"width\":258,\"height\":55,\"caption\":\"KoDDoS\"},\"image\":{\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/koddosCom\",\"https:\\\/\\\/x.com\\\/koddoscom\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/#\\\/schema\\\/person\\\/d22f7fb31dc4d117c9eb5c9cfe533f85\",\"name\":\"KoDDoS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g\",\"caption\":\"KoDDoS\"},\"url\":\"https:\\\/\\\/fr.koddos.net\\\/blog\\\/author\\\/oiyndjepop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS - Blog KoDDoS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/","og_locale":"fr_FR","og_type":"article","og_title":"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS - Blog KoDDoS","og_description":"Les rapports constants sur les fuites de donn\u00e9es montrent que les hackers s&rsquo;activent s\u00e9rieusement dans tous les r\u00e9seaux sociaux et les organisations pour compromettre et divulguer des donn\u00e9es importantes au public. Un rapport r\u00e9cent r\u00e9v\u00e8le que le code source de Windows XP a \u00e9t\u00e9 compromis et expos\u00e9 partout sur Internet la semaine derni\u00e8re. Des fichiers &hellip; Continue reading LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS","og_url":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/","og_site_name":"Blog KoDDoS","article_publisher":"https:\/\/www.facebook.com\/koddosCom","article_published_time":"2020-09-28T13:57:00+00:00","article_modified_time":"2020-09-29T14:00:29+00:00","og_image":[{"width":825,"height":510,"url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1","type":"image\/jpeg"}],"author":"KoDDoS","twitter_card":"summary_large_image","twitter_creator":"@koddoscom","twitter_site":"@koddoscom","twitter_misc":{"\u00c9crit par":"KoDDoS","Dur\u00e9e de lecture estim\u00e9e":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/#article","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/"},"author":{"name":"KoDDoS","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85"},"headline":"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS","datePublished":"2020-09-28T13:57:00+00:00","dateModified":"2020-09-29T14:00:29+00:00","mainEntityOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/"},"wordCount":961,"publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1","articleSection":["Actualit\u00e9s"],"inLanguage":"fr-FR"},{"@type":"WebPage","@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/","url":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/","name":"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS - Blog KoDDoS","isPartOf":{"@id":"https:\/\/fr.koddos.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/#primaryimage"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1","datePublished":"2020-09-28T13:57:00+00:00","dateModified":"2020-09-29T14:00:29+00:00","breadcrumb":{"@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/#primaryimage","url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1","contentUrl":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1","width":825,"height":510},{"@type":"BreadcrumbList","@id":"https:\/\/fr.koddos.net\/blog\/le-code-source-de-windows-xp-devoile-au-public-par-des-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Accueil","item":"https:\/\/fr.koddos.net\/blog\/"},{"@type":"ListItem","position":2,"name":"LE CODE SOURCE DE WINDOWS XP D\u00c9VOIL\u00c9 AU PUBLIC PAR DES HACKERS"}]},{"@type":"WebSite","@id":"https:\/\/fr.koddos.net\/blog\/#website","url":"https:\/\/fr.koddos.net\/blog\/","name":"Blog KoDDoS","description":"Blog KoDDoS est un blog d\u2019information et d\u2019actualit\u00e9 focalis\u00e9 sur le hacking, la cyber criminalit\u00e9, la vie priv\u00e9e et la surveillance.","publisher":{"@id":"https:\/\/fr.koddos.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fr.koddos.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/fr.koddos.net\/blog\/#organization","name":"KoDDoS","url":"https:\/\/fr.koddos.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","contentUrl":"https:\/\/i1.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/logo.png?fit=258%2C55&ssl=1","width":258,"height":55,"caption":"KoDDoS"},"image":{"@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/koddosCom","https:\/\/x.com\/koddoscom"]},{"@type":"Person","@id":"https:\/\/fr.koddos.net\/blog\/#\/schema\/person\/d22f7fb31dc4d117c9eb5c9cfe533f85","name":"KoDDoS","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/239872ddb935e40a5bf46e7421e0fdd8419ae8e91164a61d84219911f7648c73?s=96&d=mm&r=g","caption":"KoDDoS"},"url":"https:\/\/fr.koddos.net\/blog\/author\/oiyndjepop\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/i0.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2020\/09\/Windows-XP-Source-Code-Leaked-to-the-Public-by-Hackers.jpg?fit=825%2C510&ssl=1","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p9DjzA-Fg","jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2558","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/comments?post=2558"}],"version-history":[{"count":1,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2558\/revisions"}],"predecessor-version":[{"id":2560,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/posts\/2558\/revisions\/2560"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media\/2559"}],"wp:attachment":[{"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/media?parent=2558"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/categories?post=2558"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/fr.koddos.net\/blog\/wp-json\/wp\/v2\/tags?post=2558"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}