1:"$Sreact.fragment" 2:I[39756,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"default"] 3:I[37457,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"default"] 4:I[13250,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js"],"PWAInstaller"] 5:I[2355,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js"],"Analytics"] 6:I[13293,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js","/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/c9a7ecdb85e64f81.js"],"Header"] 7:I[22016,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js","/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/c9a7ecdb85e64f81.js"],""] 12:I[68027,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"default"] :HL["/_next/static/chunks/d8e14b76c7770c40.css","style"] :HL["/_next/static/chunks/1e4d60602b0dfa41.css","style"] :HL["/_next/static/media/2a65768255d6b625-s.p.d19752fb.woff2","font",{"crossOrigin":"","type":"font/woff2"}] :HL["/_next/static/media/83afe278b6a6bb3c-s.p.3a6ba036.woff2","font",{"crossOrigin":"","type":"font/woff2"}] 0:{"P":null,"b":"bl3s0FXDnyHkjcd2BYWCh","c":["","blog"],"q":"","i":false,"f":[[["",{"children":["blog",{"children":["__PAGE__",{}]}]},"$undefined","$undefined",true],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/d8e14b76c7770c40.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/chunks/1e4d60602b0dfa41.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/082fa325b2316017.js","async":true,"nonce":"$undefined"}],["$","script","script-1",{"src":"/_next/static/chunks/6d2bab19a212c87a.js","async":true,"nonce":"$undefined"}]],["$","html",null,{"lang":"fr","children":[["$","head",null,{"children":[["$","link",null,{"rel":"apple-touch-icon","href":"/icons/icon-192x192.png"}],["$","meta",null,{"name":"apple-mobile-web-app-capable","content":"yes"}],["$","meta",null,{"name":"apple-mobile-web-app-status-bar-style","content":"black-translucent"}],["$","meta",null,{"name":"mobile-web-app-capable","content":"yes"}]]}],["$","body",null,{"className":"inter_5901b7c6-module__ec5Qua__variable playfair_display_dc3b86c2-module__wRxeBG__variable font-sans antialiased","children":[["$","$L2",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L3",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L4",null,{}],["$","$L5",null,{}]]}]]}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L2",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L3",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":[["$","div",null,{"className":"min-h-screen bg-background","children":[["$","$L6",null,{}],["$","section",null,{"className":"pt-32 pb-16 lg:pt-40 lg:pb-20 bg-charcoal text-white","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8","children":["$undefined",["$","h1",null,{"className":"font-serif text-4xl sm:text-5xl lg:text-6xl font-medium tracking-tight text-balance","children":"Blog"}],["$","p",null,{"className":"text-lg text-white/70 mt-4 max-w-2xl","children":"Actualités, conseils et tutoriels informatiques"}]]}]}],["$","main",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-12 lg:py-20","children":[["$","div",null,{"className":"flex flex-wrap gap-2 mb-12","children":[["$","$L7",null,{"href":"/blog","className":"px-4 py-2 text-sm font-medium bg-accent text-accent-foreground rounded-full","children":"Tous"}],[["$","$L7","Sécurité",{"href":"/blog/categorie/sécurité","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Sécurité"}],["$","$L7","Systèmes",{"href":"/blog/categorie/systèmes","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Systèmes"}],["$","$L7","Virtualisation",{"href":"/blog/categorie/virtualisation","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Virtualisation"}],"$L8","$L9"]]}],"$La","$Lb","$Lc"]}],"$Ld"]}],["$Le","$Lf"],"$L10"]}],{},null,false,false]},null,false,false]},null,false,false],"$L11",false]],"m":"$undefined","G":["$12",[]],"S":true} 13:I[5500,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js","/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/c9a7ecdb85e64f81.js"],"Image"] 21:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"OutletBoundary"] 22:"$Sreact.suspense" 24:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"ViewportBoundary"] 26:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"MetadataBoundary"] 8:["$","$L7","Sauvegarde",{"href":"/blog/categorie/sauvegarde","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Sauvegarde"}] 9:["$","$L7","Dépannage",{"href":"/blog/categorie/dépannage","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Dépannage"}] a:["$","article",null,{"className":"mb-16","children":["$","$L7",null,{"href":"/blog/securiser-son-reseau-domestique","className":"group block","children":["$","div",null,{"className":"relative aspect-[21/9] rounded-2xl overflow-hidden mb-6","children":[["$","$L13",null,{"src":"/network-security-firewall-protection.jpg","alt":"Comment sécuriser son réseau domestique en 2026","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-black/70 via-black/20 to-transparent"}],["$","div",null,{"className":"absolute bottom-0 left-0 right-0 p-6 lg:p-10","children":[["$","span",null,{"className":"inline-block px-3 py-1 bg-accent text-accent-foreground text-xs font-semibold rounded-full mb-4","children":"Sécurité"}],["$","h2",null,{"className":"text-2xl lg:text-4xl font-serif font-bold text-white mb-3 group-hover:text-gold transition-colors","children":"Comment sécuriser son réseau domestique en 2026"}],["$","p",null,{"className":"text-white/80 mb-4 max-w-2xl hidden sm:block","children":"Découvrez les bonnes pratiques pour protéger votre réseau WiFi et vos appareils connectés contre les menaces actuelles."}],["$","div",null,{"className":"flex items-center gap-4 text-white/60 text-sm","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-4 h-4","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"10 janvier 2026"]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-4 h-4","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"5 min"," de lecture"]}]]}]]}]]}]}]}] b:["$","div",null,{"className":"grid md:grid-cols-2 lg:grid-cols-3 gap-8","children":[["$","article","2",{"className":"group","children":["$","$L7",null,{"href":"/blog/windows-11-vs-linux-entreprise","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L13",null,{"src":"/windows-linux-operating-system-comparison.jpg","alt":"Windows 11 vs Linux : quel système pour votre entreprise ?","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Systèmes"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"8 janv."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"7 min"]}]]}],["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"Windows 11 vs Linux : quel système pour votre entreprise ?"}],["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"Analyse comparative des deux systèmes d'exploitation pour vous aider à faire le bon choix selon vos besoins professionnels."}],["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]}],["$","article","3",{"className":"group","children":["$","$L7",null,{"href":"/blog/virtualisation-proxmox-pme","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L13",null,{"src":"/server-virtualization-datacenter-proxmox.jpg","alt":"Proxmox VE : la virtualisation professionnelle accessible aux PME","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Virtualisation"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"5 janv."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":["$L14","$L15","$undefined"]}],"6 min"]}]]}],"$L16","$L17","$L18"]}]}],"$L19","$L1a","$L1b"]}] c:["$","div",null,{"className":"mt-20 bg-charcoal rounded-2xl p-8 lg:p-12 text-center","children":[["$","h3",null,{"className":"text-2xl lg:text-3xl font-serif font-bold text-white mb-4","children":"Restez informé"}],["$","p",null,{"className":"text-white/70 mb-6 max-w-xl mx-auto","children":"Recevez nos derniers articles et conseils informatiques directement dans votre boîte mail."}],["$","form",null,{"className":"flex flex-col sm:flex-row gap-3 max-w-md mx-auto","children":[["$","input",null,{"type":"email","placeholder":"Votre email","className":"flex-1 px-4 py-3 bg-white/10 border border-white/20 rounded-lg text-white placeholder:text-white/50 focus:outline-none focus:ring-2 focus:ring-gold"}],["$","button",null,{"type":"submit","className":"px-6 py-3 bg-gold text-charcoal font-semibold rounded-lg hover:bg-gold-light transition-colors","children":"S'abonner"}]]}]]}] d:["$","footer",null,{"className":"bg-charcoal text-white","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-12 lg:py-16","children":[["$","div",null,{"className":"grid grid-cols-2 md:grid-cols-3 lg:grid-cols-5 gap-8 lg:gap-12","children":[["$","div",null,{"className":"col-span-2 md:col-span-3 lg:col-span-2","children":[["$","$L7",null,{"href":"/","className":"flex items-center gap-3 mb-4","children":[["$","$L13",null,{"src":"/images/chatgpt-20image-2013-20janv.png","alt":"Le Bon Contact Logo","width":40,"height":40,"className":"w-10 h-10 rounded-lg"}],["$","div",null,{"className":"flex flex-col","children":[["$","span",null,{"className":"font-serif text-lg font-semibold","children":"Le Bon Contact"}],["$","span",null,{"className":"text-[10px] text-white/50 uppercase tracking-widest","children":"Admin Sys & Réseaux"}]]}]]}],["$","p",null,{"className":"text-sm text-white/60 mb-6 max-w-sm","children":"Prestataire informatique : administration systèmes, réseaux, virtualisation, sécurité et création de sites web. Interventions pour particuliers et professionnels."}],["$","div",null,{"className":"space-y-3","children":[["$","a",null,{"href":"tel:+33756863475","className":"flex items-center gap-3 text-sm text-white/70 hover:text-gold transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-phone w-4 h-4","children":[["$","path","foiqr5",{"d":"M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"}],"$undefined"]}],"07 56 86 34 75"]}],["$","a",null,{"href":"mailto:kmoniaux@gmail.com","className":"flex items-center gap-3 text-sm text-white/70 hover:text-gold transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail w-4 h-4","children":[["$","rect","18n3k1",{"width":"20","height":"16","x":"2","y":"4","rx":"2"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],"$undefined"]}],"kmoniaux@gmail.com"]}],["$","div",null,{"className":"flex items-start gap-3 text-sm text-white/70","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-map-pin w-4 h-4 mt-0.5","children":[["$","path","1r0f0z",{"d":"M20 10c0 4.993-5.539 10.193-7.399 11.799a1 1 0 0 1-1.202 0C9.539 20.193 4 14.993 4 10a8 8 0 0 1 16 0"}],["$","circle","ilqhr7",{"cx":"12","cy":"10","r":"3"}],"$undefined"]}],"Sigean (11130) - Aude"]}]]}]]}],["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4 text-gold text-sm","children":"Services"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Particuliers",{"children":["$","$L7",null,{"href":"/services#particuliers","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Particuliers"}]}],["$","li","Entreprises",{"children":["$","$L7",null,{"href":"/services#entreprises","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Entreprises"}]}],["$","li","Sites Web",{"children":["$","$L7",null,{"href":"/services#web","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Sites Web"}]}]]}]]}],["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4 text-gold text-sm","children":"Navigation"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Accueil",{"children":["$","$L7",null,{"href":"/","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Accueil"}]}],["$","li","Tarifs",{"children":["$","$L7",null,{"href":"/tarifs","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Tarifs"}]}],"$L1c","$L1d","$L1e"]}]]}],"$L1f"]}],"$L20"]}]}] e:["$","script","script-0",{"src":"/_next/static/chunks/ff1a16fafef87110.js","async":true,"nonce":"$undefined"}] f:["$","script","script-1",{"src":"/_next/static/chunks/c9a7ecdb85e64f81.js","async":true,"nonce":"$undefined"}] 10:["$","$L21",null,{"children":["$","$22",null,{"name":"Next.MetadataOutlet","children":"$@23"}]}] 11:["$","$1","h",{"children":[null,["$","$L24",null,{"children":"$@25"}],["$","div",null,{"hidden":true,"children":["$","$L26",null,{"children":["$","$22",null,{"name":"Next.Metadata","children":"$@27"}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}] 14:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] 15:["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}] 16:["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"Proxmox VE : la virtualisation professionnelle accessible aux PME"}] 17:["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"Comment Proxmox peut réduire vos coûts d'infrastructure tout en offrant des performances de niveau entreprise."}] 18:["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}] 19:["$","article","4",{"className":"group","children":["$","$L7",null,{"href":"/blog/sauvegarde-3-2-1-donnees","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L13",null,{"src":"/data-backup-cloud-storage-security.jpg","alt":"La règle 3-2-1 : protégez vos données efficacement","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Sauvegarde"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"2 janv."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"5 min"]}]]}],["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"La règle 3-2-1 : protégez vos données efficacement"}],["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"La méthode infaillible pour ne jamais perdre vos données importantes, que vous soyez particulier ou professionnel."}],["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]}] 1a:["$","article","5",{"className":"group","children":["$","$L7",null,{"href":"/blog/pfsense-firewall-entreprise","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L13",null,{"src":"/firewall-network-security-pfsense.jpg","alt":"pfSense : le firewall open source qui rivalise avec les leaders","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Sécurité"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"28 déc."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"6 min"]}]]}],["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"pfSense : le firewall open source qui rivalise avec les leaders"}],["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"Pourquoi pfSense est devenu incontournable pour sécuriser les réseaux des PME sans exploser le budget."}],["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]}] 1b:["$","article","6",{"className":"group","children":["$","$L7",null,{"href":"/blog/pc-lent-solutions-simples","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L13",null,{"src":"/slow-computer-repair-upgrade-ssd.jpg","alt":"Votre PC est lent ? 5 solutions simples avant de le changer","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Dépannage"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"20 déc."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"4 min"]}]]}],["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"Votre PC est lent ? 5 solutions simples avant de le changer"}],["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"Avant d'investir dans un nouvel ordinateur, essayez ces astuces qui peuvent redonner vie à votre machine."}],["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]}] 1c:["$","li","Blog",{"children":["$","$L7",null,{"href":"/blog","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Blog"}]}] 1d:["$","li","À Propos",{"children":["$","$L7",null,{"href":"/a-propos","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"À Propos"}]}] 1e:["$","li","Contact",{"children":["$","$L7",null,{"href":"/contact","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Contact"}]}] 1f:["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4 text-gold text-sm","children":"Légal"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Mentions Légales",{"children":["$","$L7",null,{"href":"/mentions-legales","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Mentions Légales"}]}],["$","li","Confidentialité",{"children":["$","$L7",null,{"href":"/confidentialite","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Confidentialité"}]}]]}]]}] 20:["$","div",null,{"className":"mt-10 pt-8 border-t border-white/10","children":["$","div",null,{"className":"flex flex-col sm:flex-row items-center justify-between gap-4 text-center sm:text-left","children":[["$","p",null,{"className":"text-xs text-white/50","children":["© ",2026," Le Bon Contact - Kévin Moniaux. Tous droits réservés."]}],["$","p",null,{"className":"text-xs text-gold hidden sm:block","children":"Veiller • Prévenir • Sécuriser • Réaliser • Définir"}]]}]}] 25:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1, maximum-scale=5, viewport-fit=cover, user-scalable=yes"}],["$","meta","2",{"name":"theme-color","content":"#1a1a1a"}]] 27:[["$","title","0",{"children":"Blog | Le Bon Contact - Actualités IT & Conseils Informatiques"}],["$","meta","1",{"name":"description","content":"Conseils, tutoriels et actualités sur l'informatique, la sécurité, les réseaux et le dépannage. Restez informé avec Le Bon Contact."}],["$","meta","2",{"name":"author","content":"Kévin Moniaux - Le Bon Contact"}],["$","link","3",{"rel":"manifest","href":"/manifest.json","crossOrigin":"$undefined"}],["$","meta","4",{"name":"generator","content":"v0.app"}],["$","meta","5",{"name":"keywords","content":"informatique,dépannage,administration systèmes,réseaux,virtualisation,sécurité,sites web,Sigean,Aude"}],["$","meta","6",{"name":"mobile-web-app-capable","content":"yes"}],["$","meta","7",{"name":"apple-mobile-web-app-title","content":"Le Bon Contact"}],["$","meta","8",{"name":"apple-mobile-web-app-status-bar-style","content":"black-translucent"}],["$","meta","9",{"property":"og:title","content":"Le Bon Contact | Expert Informatique & Solutions IT"}],["$","meta","10",{"property":"og:description","content":"Votre partenaire informatique de confiance. Dépannage, administration systèmes, réseaux et création web pour particuliers et professionnels."}],["$","meta","11",{"property":"og:site_name","content":"Le Bon Contact"}],["$","meta","12",{"property":"og:locale","content":"fr_FR"}],["$","meta","13",{"property":"og:type","content":"website"}],["$","meta","14",{"name":"twitter:card","content":"summary"}],["$","meta","15",{"name":"twitter:title","content":"Le Bon Contact | Expert Informatique & Solutions IT"}],["$","meta","16",{"name":"twitter:description","content":"Votre partenaire informatique de confiance. Dépannage, administration systèmes, réseaux et création web pour particuliers et professionnels."}]] 23:null