1:"$Sreact.fragment" 2:I[13293,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js","/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/c9a7ecdb85e64f81.js"],"Header"] 3:I[22016,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js","/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/c9a7ecdb85e64f81.js"],""] 4:I[5500,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js","/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/c9a7ecdb85e64f81.js"],"Image"] 19:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"OutletBoundary"] 1a:"$Sreact.suspense" 0:{"buildId":"bl3s0FXDnyHkjcd2BYWCh","rsc":["$","$1","c",{"children":[["$","div",null,{"className":"min-h-screen bg-background","children":[["$","$L2",null,{}],["$","section",null,{"className":"pt-32 pb-16 lg:pt-40 lg:pb-20 bg-charcoal text-white","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8","children":["$undefined",["$","h1",null,{"className":"font-serif text-4xl sm:text-5xl lg:text-6xl font-medium tracking-tight text-balance","children":"Blog"}],["$","p",null,{"className":"text-lg text-white/70 mt-4 max-w-2xl","children":"Actualités, conseils et tutoriels informatiques"}]]}]}],["$","main",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-12 lg:py-20","children":[["$","div",null,{"className":"flex flex-wrap gap-2 mb-12","children":[["$","$L3",null,{"href":"/blog","className":"px-4 py-2 text-sm font-medium bg-accent text-accent-foreground rounded-full","children":"Tous"}],[["$","$L3","Sécurité",{"href":"/blog/categorie/sécurité","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Sécurité"}],["$","$L3","Systèmes",{"href":"/blog/categorie/systèmes","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Systèmes"}],["$","$L3","Virtualisation",{"href":"/blog/categorie/virtualisation","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Virtualisation"}],["$","$L3","Sauvegarde",{"href":"/blog/categorie/sauvegarde","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Sauvegarde"}],["$","$L3","Dépannage",{"href":"/blog/categorie/dépannage","className":"px-4 py-2 text-sm font-medium bg-muted text-muted-foreground rounded-full hover:bg-accent hover:text-accent-foreground transition-colors","children":"Dépannage"}]]]}],["$","article",null,{"className":"mb-16","children":["$","$L3",null,{"href":"/blog/securiser-son-reseau-domestique","className":"group block","children":["$","div",null,{"className":"relative aspect-[21/9] rounded-2xl overflow-hidden mb-6","children":[["$","$L4",null,{"src":"/network-security-firewall-protection.jpg","alt":"Comment sécuriser son réseau domestique en 2026","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-black/70 via-black/20 to-transparent"}],["$","div",null,{"className":"absolute bottom-0 left-0 right-0 p-6 lg:p-10","children":[["$","span",null,{"className":"inline-block px-3 py-1 bg-accent text-accent-foreground text-xs font-semibold rounded-full mb-4","children":"Sécurité"}],["$","h2",null,{"className":"text-2xl lg:text-4xl font-serif font-bold text-white mb-3 group-hover:text-gold transition-colors","children":"Comment sécuriser son réseau domestique en 2026"}],["$","p",null,{"className":"text-white/80 mb-4 max-w-2xl hidden sm:block","children":"Découvrez les bonnes pratiques pour protéger votre réseau WiFi et vos appareils connectés contre les menaces actuelles."}],["$","div",null,{"className":"flex items-center gap-4 text-white/60 text-sm","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-4 h-4","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"10 janvier 2026"]}],["$","span",null,{"className":"flex items-center gap-1","children":["$L5","5 min"," de lecture"]}]]}]]}]]}]}]}],"$L6","$L7"]}],"$L8"]}],["$L9","$La"],"$Lb"]}],"loading":null,"isPartial":false} 5:["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-4 h-4","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}] 6:["$","div",null,{"className":"grid md:grid-cols-2 lg:grid-cols-3 gap-8","children":[["$","article","2",{"className":"group","children":["$","$L3",null,{"href":"/blog/windows-11-vs-linux-entreprise","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L4",null,{"src":"/windows-linux-operating-system-comparison.jpg","alt":"Windows 11 vs Linux : quel système pour votre entreprise ?","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Systèmes"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"8 janv."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"7 min"]}]]}],["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"Windows 11 vs Linux : quel système pour votre entreprise ?"}],["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"Analyse comparative des deux systèmes d'exploitation pour vous aider à faire le bon choix selon vos besoins professionnels."}],["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]}],["$","article","3",{"className":"group","children":["$","$L3",null,{"href":"/blog/virtualisation-proxmox-pme","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L4",null,{"src":"/server-virtualization-datacenter-proxmox.jpg","alt":"Proxmox VE : la virtualisation professionnelle accessible aux PME","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Virtualisation"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"5 janv."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":["$Lc","$Ld","$undefined"]}],"6 min"]}]]}],"$Le","$Lf","$L10"]}]}],"$L11","$L12","$L13"]}] 7:["$","div",null,{"className":"mt-20 bg-charcoal rounded-2xl p-8 lg:p-12 text-center","children":[["$","h3",null,{"className":"text-2xl lg:text-3xl font-serif font-bold text-white mb-4","children":"Restez informé"}],["$","p",null,{"className":"text-white/70 mb-6 max-w-xl mx-auto","children":"Recevez nos derniers articles et conseils informatiques directement dans votre boîte mail."}],["$","form",null,{"className":"flex flex-col sm:flex-row gap-3 max-w-md mx-auto","children":[["$","input",null,{"type":"email","placeholder":"Votre email","className":"flex-1 px-4 py-3 bg-white/10 border border-white/20 rounded-lg text-white placeholder:text-white/50 focus:outline-none focus:ring-2 focus:ring-gold"}],["$","button",null,{"type":"submit","className":"px-6 py-3 bg-gold text-charcoal font-semibold rounded-lg hover:bg-gold-light transition-colors","children":"S'abonner"}]]}]]}] 8:["$","footer",null,{"className":"bg-charcoal text-white","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-12 lg:py-16","children":[["$","div",null,{"className":"grid grid-cols-2 md:grid-cols-3 lg:grid-cols-5 gap-8 lg:gap-12","children":[["$","div",null,{"className":"col-span-2 md:col-span-3 lg:col-span-2","children":[["$","$L3",null,{"href":"/","className":"flex items-center gap-3 mb-4","children":[["$","$L4",null,{"src":"/images/chatgpt-20image-2013-20janv.png","alt":"Le Bon Contact Logo","width":40,"height":40,"className":"w-10 h-10 rounded-lg"}],["$","div",null,{"className":"flex flex-col","children":[["$","span",null,{"className":"font-serif text-lg font-semibold","children":"Le Bon Contact"}],["$","span",null,{"className":"text-[10px] text-white/50 uppercase tracking-widest","children":"Admin Sys & Réseaux"}]]}]]}],["$","p",null,{"className":"text-sm text-white/60 mb-6 max-w-sm","children":"Prestataire informatique : administration systèmes, réseaux, virtualisation, sécurité et création de sites web. Interventions pour particuliers et professionnels."}],["$","div",null,{"className":"space-y-3","children":[["$","a",null,{"href":"tel:+33756863475","className":"flex items-center gap-3 text-sm text-white/70 hover:text-gold transition-colors","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-phone w-4 h-4","children":[["$","path","foiqr5",{"d":"M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"}],"$undefined"]}],"07 56 86 34 75"]}],["$","a",null,{"href":"mailto:kmoniaux@gmail.com","className":"flex items-center gap-3 text-sm text-white/70 hover:text-gold transition-colors","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail w-4 h-4","children":[["$","rect","18n3k1",{"width":"20","height":"16","x":"2","y":"4","rx":"2"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],"$undefined"]}],"kmoniaux@gmail.com"]}],["$","div",null,{"className":"flex items-start gap-3 text-sm text-white/70","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-map-pin w-4 h-4 mt-0.5","children":[["$","path","1r0f0z",{"d":"M20 10c0 4.993-5.539 10.193-7.399 11.799a1 1 0 0 1-1.202 0C9.539 20.193 4 14.993 4 10a8 8 0 0 1 16 0"}],["$","circle","ilqhr7",{"cx":"12","cy":"10","r":"3"}],"$undefined"]}],"Sigean (11130) - Aude"]}]]}]]}],["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4 text-gold text-sm","children":"Services"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Particuliers",{"children":["$","$L3",null,{"href":"/services#particuliers","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Particuliers"}]}],["$","li","Entreprises",{"children":["$","$L3",null,{"href":"/services#entreprises","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Entreprises"}]}],["$","li","Sites Web",{"children":["$","$L3",null,{"href":"/services#web","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Sites Web"}]}]]}]]}],["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4 text-gold text-sm","children":"Navigation"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Accueil",{"children":["$","$L3",null,{"href":"/","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Accueil"}]}],["$","li","Tarifs",{"children":["$","$L3",null,{"href":"/tarifs","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Tarifs"}]}],"$L14","$L15","$L16"]}]]}],"$L17"]}],"$L18"]}]}] 9:["$","script","script-0",{"src":"/_next/static/chunks/ff1a16fafef87110.js","async":true}] a:["$","script","script-1",{"src":"/_next/static/chunks/c9a7ecdb85e64f81.js","async":true}] b:["$","$L19",null,{"children":["$","$1a",null,{"name":"Next.MetadataOutlet","children":"$@1b"}]}] c:["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}] d:["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}] e:["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"Proxmox VE : la virtualisation professionnelle accessible aux PME"}] f:["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"Comment Proxmox peut réduire vos coûts d'infrastructure tout en offrant des performances de niveau entreprise."}] 10:["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}] 11:["$","article","4",{"className":"group","children":["$","$L3",null,{"href":"/blog/sauvegarde-3-2-1-donnees","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L4",null,{"src":"/data-backup-cloud-storage-security.jpg","alt":"La règle 3-2-1 : protégez vos données efficacement","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Sauvegarde"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"2 janv."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"5 min"]}]]}],["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"La règle 3-2-1 : protégez vos données efficacement"}],["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"La méthode infaillible pour ne jamais perdre vos données importantes, que vous soyez particulier ou professionnel."}],["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]}] 12:["$","article","5",{"className":"group","children":["$","$L3",null,{"href":"/blog/pfsense-firewall-entreprise","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L4",null,{"src":"/firewall-network-security-pfsense.jpg","alt":"pfSense : le firewall open source qui rivalise avec les leaders","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Sécurité"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"28 déc."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"6 min"]}]]}],["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"pfSense : le firewall open source qui rivalise avec les leaders"}],["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"Pourquoi pfSense est devenu incontournable pour sécuriser les réseaux des PME sans exploser le budget."}],["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]}] 13:["$","article","6",{"className":"group","children":["$","$L3",null,{"href":"/blog/pc-lent-solutions-simples","children":[["$","div",null,{"className":"relative aspect-[16/10] rounded-xl overflow-hidden mb-4","children":[["$","$L4",null,{"src":"/slow-computer-repair-upgrade-ssd.jpg","alt":"Votre PC est lent ? 5 solutions simples avant de le changer","fill":true,"className":"object-cover transition-transform duration-500 group-hover:scale-105"}],["$","div",null,{"className":"absolute top-3 left-3","children":["$","span",null,{"className":"px-2.5 py-1 bg-charcoal/80 backdrop-blur-sm text-white text-xs font-medium rounded-full","children":"Dépannage"}]}]]}],["$","div",null,{"className":"flex items-center gap-3 text-muted-foreground text-xs mb-2","children":[["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-3 h-3","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"20 déc."]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-3 h-3","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"4 min"]}]]}],["$","h3",null,{"className":"text-lg font-semibold text-foreground mb-2 group-hover:text-accent transition-colors line-clamp-2","children":"Votre PC est lent ? 5 solutions simples avant de le changer"}],["$","p",null,{"className":"text-sm text-muted-foreground line-clamp-2 mb-3","children":"Avant d'investir dans un nouvel ordinateur, essayez ces astuces qui peuvent redonner vie à votre machine."}],["$","span",null,{"className":"inline-flex items-center gap-1 text-sm font-medium text-accent group-hover:gap-2 transition-all","children":["Lire l'article",["$","svg",null,{"xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-right w-4 h-4","children":[["$","path","1ays0h",{"d":"M5 12h14"}],["$","path","xquz4c",{"d":"m12 5 7 7-7 7"}],"$undefined"]}]]}]]}]}] 14:["$","li","Blog",{"children":["$","$L3",null,{"href":"/blog","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Blog"}]}] 15:["$","li","À Propos",{"children":["$","$L3",null,{"href":"/a-propos","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"À Propos"}]}] 16:["$","li","Contact",{"children":["$","$L3",null,{"href":"/contact","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Contact"}]}] 17:["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4 text-gold text-sm","children":"Légal"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Mentions Légales",{"children":["$","$L3",null,{"href":"/mentions-legales","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Mentions Légales"}]}],["$","li","Confidentialité",{"children":["$","$L3",null,{"href":"/confidentialite","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Confidentialité"}]}]]}]]}] 18:["$","div",null,{"className":"mt-10 pt-8 border-t border-white/10","children":["$","div",null,{"className":"flex flex-col sm:flex-row items-center justify-between gap-4 text-center sm:text-left","children":[["$","p",null,{"className":"text-xs text-white/50","children":["© ",2026," Le Bon Contact - Kévin Moniaux. Tous droits réservés."]}],["$","p",null,{"className":"text-xs text-gold hidden sm:block","children":"Veiller • Prévenir • Sécuriser • Réaliser • Définir"}]]}]}] 1b:null