1:"$Sreact.fragment" 2:I[39756,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"default"] 3:I[37457,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"default"] 4:I[13250,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js"],"PWAInstaller"] 5:I[2355,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js"],"Analytics"] 7:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"OutletBoundary"] 8:"$Sreact.suspense" a:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"ViewportBoundary"] c:I[97367,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"MetadataBoundary"] e:I[68027,["/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/247eb132b7f7b574.js"],"default"] :HL["/_next/static/chunks/d8e14b76c7770c40.css","style"] :HL["/_next/static/chunks/1e4d60602b0dfa41.css","style"] :HL["/_next/static/media/2a65768255d6b625-s.p.d19752fb.woff2","font",{"crossOrigin":"","type":"font/woff2"}] :HL["/_next/static/media/83afe278b6a6bb3c-s.p.3a6ba036.woff2","font",{"crossOrigin":"","type":"font/woff2"}] 0:{"P":null,"b":"bl3s0FXDnyHkjcd2BYWCh","c":["","blog","securiser-son-reseau-domestique"],"q":"","i":false,"f":[[["",{"children":["blog",{"children":[["slug","securiser-son-reseau-domestique","d"],{"children":["__PAGE__",{}]}]}]},"$undefined","$undefined",true],[["$","$1","c",{"children":[[["$","link","0",{"rel":"stylesheet","href":"/_next/static/chunks/d8e14b76c7770c40.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","link","1",{"rel":"stylesheet","href":"/_next/static/chunks/1e4d60602b0dfa41.css","precedence":"next","crossOrigin":"$undefined","nonce":"$undefined"}],["$","script","script-0",{"src":"/_next/static/chunks/082fa325b2316017.js","async":true,"nonce":"$undefined"}],["$","script","script-1",{"src":"/_next/static/chunks/6d2bab19a212c87a.js","async":true,"nonce":"$undefined"}]],["$","html",null,{"lang":"fr","children":[["$","head",null,{"children":[["$","link",null,{"rel":"apple-touch-icon","href":"/icons/icon-192x192.png"}],["$","meta",null,{"name":"apple-mobile-web-app-capable","content":"yes"}],["$","meta",null,{"name":"apple-mobile-web-app-status-bar-style","content":"black-translucent"}],["$","meta",null,{"name":"mobile-web-app-capable","content":"yes"}]]}],["$","body",null,{"className":"inter_5901b7c6-module__ec5Qua__variable playfair_display_dc3b86c2-module__wRxeBG__variable font-sans antialiased","children":[["$","$L2",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L3",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":[[["$","title",null,{"children":"404: This page could not be found."}],["$","div",null,{"style":{"fontFamily":"system-ui,\"Segoe UI\",Roboto,Helvetica,Arial,sans-serif,\"Apple Color Emoji\",\"Segoe UI Emoji\"","height":"100vh","textAlign":"center","display":"flex","flexDirection":"column","alignItems":"center","justifyContent":"center"},"children":["$","div",null,{"children":[["$","style",null,{"dangerouslySetInnerHTML":{"__html":"body{color:#000;background:#fff;margin:0}.next-error-h1{border-right:1px solid rgba(0,0,0,.3)}@media (prefers-color-scheme:dark){body{color:#fff;background:#000}.next-error-h1{border-right:1px solid rgba(255,255,255,.3)}}"}}],["$","h1",null,{"className":"next-error-h1","style":{"display":"inline-block","margin":"0 20px 0 0","padding":"0 23px 0 0","fontSize":24,"fontWeight":500,"verticalAlign":"top","lineHeight":"49px"},"children":404}],["$","div",null,{"style":{"display":"inline-block"},"children":["$","h2",null,{"style":{"fontSize":14,"fontWeight":400,"lineHeight":"49px","margin":0},"children":"This page could not be found."}]}]]}]}]],[]],"forbidden":"$undefined","unauthorized":"$undefined"}],["$","$L4",null,{}],["$","$L5",null,{}]]}]]}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L2",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L3",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":[null,["$","$L2",null,{"parallelRouterKey":"children","error":"$undefined","errorStyles":"$undefined","errorScripts":"$undefined","template":["$","$L3",null,{}],"templateStyles":"$undefined","templateScripts":"$undefined","notFound":"$undefined","forbidden":"$undefined","unauthorized":"$undefined"}]]}],{"children":[["$","$1","c",{"children":["$L6",[["$","script","script-0",{"src":"/_next/static/chunks/ff1a16fafef87110.js","async":true,"nonce":"$undefined"}],["$","script","script-1",{"src":"/_next/static/chunks/c9a7ecdb85e64f81.js","async":true,"nonce":"$undefined"}]],["$","$L7",null,{"children":["$","$8",null,{"name":"Next.MetadataOutlet","children":"$@9"}]}]]}],{},null,false,false]},null,false,false]},null,false,false]},null,false,false],["$","$1","h",{"children":[null,["$","$La",null,{"children":"$@b"}],["$","div",null,{"hidden":true,"children":["$","$Lc",null,{"children":["$","$8",null,{"name":"Next.Metadata","children":"$@d"}]}]}],["$","meta",null,{"name":"next-size-adjust","content":""}]]}],false]],"m":"$undefined","G":["$e",[]],"S":true} f:I[13293,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js","/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/c9a7ecdb85e64f81.js"],"Header"] 10:I[5500,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js","/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/c9a7ecdb85e64f81.js"],"Image"] 11:I[22016,["/_next/static/chunks/082fa325b2316017.js","/_next/static/chunks/6d2bab19a212c87a.js","/_next/static/chunks/ff1a16fafef87110.js","/_next/static/chunks/c9a7ecdb85e64f81.js"],""] 12:T9f3,

Comment sécuriser son réseau domestique en 2026


La sécurité de votre réseau domestique n'a jamais été aussi importante. Avec l'augmentation des objets connectés et le télétravail, votre maison est devenue une cible potentielle pour les cybercriminels.


1. Sécurisez votre box Internet


Commencez par changer le mot de passe par défaut de votre box. Les identifiants standards sont connus de tous les hackers.


Bonnes pratiques :

  • Utilisez un mot de passe de minimum 12 caractères
  • Mélangez lettres, chiffres et caractères spéciaux
  • Changez le nom de votre réseau WiFi (SSID)
  • Activez le chiffrement WPA3 si disponible, sinon WPA2

  • 2. Mettez à jour vos équipements


    Les mises à jour ne servent pas qu'à ajouter des fonctionnalités. Elles corrigent surtout des failles de sécurité.


  • Activez les mises à jour automatiques sur votre box
  • Mettez à jour régulièrement vos appareils connectés
  • Remplacez les équipements obsolètes qui ne reçoivent plus de mises à jour

  • 3. Créez un réseau invité


    Séparez vos appareils sensibles des visiteurs et des objets connectés moins sécurisés.


    4. Utilisez un VPN


    Pour le télétravail ou les activités sensibles, un VPN chiffre votre connexion et protège vos données.


    Conclusion


    La sécurité informatique commence chez vous. Ces quelques mesures simples peuvent faire toute la différence.


    Besoin d'aide pour sécuriser votre réseau ? Contactez Le Bon Contact pour un audit personnalisé.


    6:["$","div",null,{"className":"min-h-screen bg-background","children":[["$","$Lf",null,{}],["$","div",null,{"className":"relative pt-20","children":["$","div",null,{"className":"relative h-[40vh] lg:h-[50vh]","children":[["$","$L10",null,{"src":"/network-security-firewall-protection.jpg","alt":"Comment sécuriser son réseau domestique en 2026","fill":true,"className":"object-cover","priority":true}],["$","div",null,{"className":"absolute inset-0 bg-gradient-to-t from-background via-background/50 to-transparent"}]]}]}],["$","main",null,{"className":"max-w-4xl mx-auto px-4 sm:px-6 lg:px-8 -mt-32 relative z-10","children":[["$","$L11",null,{"href":"/blog","className":"inline-flex items-center gap-2 text-sm text-muted-foreground hover:text-foreground mb-6 transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-arrow-left w-4 h-4","children":[["$","path","1l729n",{"d":"m12 19-7-7 7-7"}],["$","path","x3x0zl",{"d":"M19 12H5"}],"$undefined"]}],"Retour au blog"]}],["$","article",null,{"className":"bg-card rounded-2xl shadow-lg p-6 lg:p-10","children":[["$","header",null,{"className":"mb-8 pb-8 border-b border-border","children":[["$","span",null,{"className":"inline-block px-3 py-1 bg-accent/10 text-accent text-sm font-medium rounded-full mb-4","children":"Sécurité"}],["$","h1",null,{"className":"text-3xl lg:text-4xl font-serif font-bold text-foreground mb-4","children":"Comment sécuriser son réseau domestique en 2026"}],["$","p",null,{"className":"text-lg text-muted-foreground mb-6","children":"Découvrez les bonnes pratiques pour protéger votre réseau WiFi et vos appareils connectés contre les menaces actuelles."}],["$","div",null,{"className":"flex flex-wrap items-center gap-4 text-sm text-muted-foreground","children":[["$","span",null,{"className":"flex items-center gap-2","children":[["$","div",null,{"className":"w-8 h-8 bg-accent/20 rounded-full flex items-center justify-center","children":["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-user w-4 h-4 text-accent","children":[["$","path","975kel",{"d":"M19 21v-2a4 4 0 0 0-4-4H9a4 4 0 0 0-4 4v2"}],["$","circle","17ys0d",{"cx":"12","cy":"7","r":"4"}],"$undefined"]}]}],"Kévin Moniaux"]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-calendar w-4 h-4","children":[["$","path","1cmpym",{"d":"M8 2v4"}],["$","path","4m81vk",{"d":"M16 2v4"}],["$","rect","1hopcy",{"width":"18","height":"18","x":"3","y":"4","rx":"2"}],["$","path","8toen8",{"d":"M3 10h18"}],"$undefined"]}],"10 janvier 2026"]}],["$","span",null,{"className":"flex items-center gap-1","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-clock w-4 h-4","children":[["$","circle","1mglay",{"cx":"12","cy":"12","r":"10"}],["$","polyline","68esgv",{"points":"12 6 12 12 16 14"}],"$undefined"]}],"5 min"," de lecture"]}]]}]]}],["$","div",null,{"className":"prose prose-lg max-w-none text-foreground","dangerouslySetInnerHTML":{"__html":"$12"}}],"$L13"]}],"$L14"]}],"$L15"]}] 13:["$","footer",null,{"className":"mt-10 pt-8 border-t border-border","children":[["$","div",null,{"className":"flex flex-wrap items-center gap-2","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-tag w-4 h-4 text-muted-foreground","children":[["$","path","vktsd0",{"d":"M12.586 2.586A2 2 0 0 0 11.172 2H4a2 2 0 0 0-2 2v7.172a2 2 0 0 0 .586 1.414l8.704 8.704a2.426 2.426 0 0 0 3.42 0l6.58-6.58a2.426 2.426 0 0 0 0-3.42z"}],["$","circle","kqv944",{"cx":"7.5","cy":"7.5","r":".5","fill":"currentColor"}],"$undefined"]}],[["$","span","sécurité",{"className":"px-3 py-1 bg-muted text-muted-foreground text-sm rounded-full","children":"sécurité"}],["$","span","réseau",{"className":"px-3 py-1 bg-muted text-muted-foreground text-sm rounded-full","children":"réseau"}],["$","span","WiFi",{"className":"px-3 py-1 bg-muted text-muted-foreground text-sm rounded-full","children":"WiFi"}],["$","span","particuliers",{"className":"px-3 py-1 bg-muted text-muted-foreground text-sm rounded-full","children":"particuliers"}]]]}],["$","div",null,{"className":"mt-8 p-6 bg-charcoal rounded-xl text-center","children":[["$","h3",null,{"className":"text-xl font-semibold text-white mb-2","children":"Besoin d'aide ?"}],["$","p",null,{"className":"text-white/70 mb-4","children":"Contactez-moi pour un devis gratuit et personnalisé."}],["$","$L11",null,{"href":"/contact","children":"Demander un devis","data-slot":"button","className":"inline-flex items-center justify-center gap-2 whitespace-nowrap rounded-md text-sm font-medium transition-all disabled:pointer-events-none disabled:opacity-50 [&_svg]:pointer-events-none [&_svg:not([class*='size-'])]:size-4 shrink-0 [&_svg]:shrink-0 outline-none focus-visible:border-ring focus-visible:ring-ring/50 focus-visible:ring-[3px] aria-invalid:ring-destructive/20 dark:aria-invalid:ring-destructive/40 aria-invalid:border-destructive h-9 px-4 py-2 has-[>svg]:px-3 bg-gold text-charcoal hover:bg-gold-light","ref":null}]]}]]}] 14:["$","section",null,{"className":"mt-16 mb-20","children":[["$","h2",null,{"className":"text-2xl font-serif font-bold mb-8","children":"Articles similaires"}],["$","div",null,{"className":"grid md:grid-cols-2 gap-6","children":[["$","$L11","2",{"href":"/blog/windows-11-vs-linux-entreprise","className":"group flex gap-4 p-4 bg-card rounded-xl hover:shadow-md transition-shadow","children":[["$","div",null,{"className":"relative w-24 h-24 rounded-lg overflow-hidden shrink-0","children":["$","$L10",null,{"src":"/windows-linux-operating-system-comparison.jpg","alt":"Windows 11 vs Linux : quel système pour votre entreprise ?","fill":true,"className":"object-cover"}]}],["$","div",null,{"children":[["$","span",null,{"className":"text-xs text-accent font-medium","children":"Systèmes"}],["$","h3",null,{"className":"font-semibold text-foreground group-hover:text-accent transition-colors line-clamp-2","children":"Windows 11 vs Linux : quel système pour votre entreprise ?"}],["$","span",null,{"className":"text-xs text-muted-foreground","children":"7 min"}]]}]]}],["$","$L11","3",{"href":"/blog/virtualisation-proxmox-pme","className":"group flex gap-4 p-4 bg-card rounded-xl hover:shadow-md transition-shadow","children":[["$","div",null,{"className":"relative w-24 h-24 rounded-lg overflow-hidden shrink-0","children":["$","$L10",null,{"src":"/server-virtualization-datacenter-proxmox.jpg","alt":"Proxmox VE : la virtualisation professionnelle accessible aux PME","fill":true,"className":"object-cover"}]}],["$","div",null,{"children":[["$","span",null,{"className":"text-xs text-accent font-medium","children":"Virtualisation"}],["$","h3",null,{"className":"font-semibold text-foreground group-hover:text-accent transition-colors line-clamp-2","children":"Proxmox VE : la virtualisation professionnelle accessible aux PME"}],["$","span",null,{"className":"text-xs text-muted-foreground","children":"6 min"}]]}]]}]]}]]}] 15:["$","footer",null,{"className":"bg-charcoal text-white","children":["$","div",null,{"className":"max-w-7xl mx-auto px-4 sm:px-6 lg:px-8 py-12 lg:py-16","children":[["$","div",null,{"className":"grid grid-cols-2 md:grid-cols-3 lg:grid-cols-5 gap-8 lg:gap-12","children":[["$","div",null,{"className":"col-span-2 md:col-span-3 lg:col-span-2","children":[["$","$L11",null,{"href":"/","className":"flex items-center gap-3 mb-4","children":[["$","$L10",null,{"src":"/images/chatgpt-20image-2013-20janv.png","alt":"Le Bon Contact Logo","width":40,"height":40,"className":"w-10 h-10 rounded-lg"}],["$","div",null,{"className":"flex flex-col","children":[["$","span",null,{"className":"font-serif text-lg font-semibold","children":"Le Bon Contact"}],["$","span",null,{"className":"text-[10px] text-white/50 uppercase tracking-widest","children":"Admin Sys & Réseaux"}]]}]]}],["$","p",null,{"className":"text-sm text-white/60 mb-6 max-w-sm","children":"Prestataire informatique : administration systèmes, réseaux, virtualisation, sécurité et création de sites web. Interventions pour particuliers et professionnels."}],["$","div",null,{"className":"space-y-3","children":[["$","a",null,{"href":"tel:+33756863475","className":"flex items-center gap-3 text-sm text-white/70 hover:text-gold transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-phone w-4 h-4","children":[["$","path","foiqr5",{"d":"M22 16.92v3a2 2 0 0 1-2.18 2 19.79 19.79 0 0 1-8.63-3.07 19.5 19.5 0 0 1-6-6 19.79 19.79 0 0 1-3.07-8.67A2 2 0 0 1 4.11 2h3a2 2 0 0 1 2 1.72 12.84 12.84 0 0 0 .7 2.81 2 2 0 0 1-.45 2.11L8.09 9.91a16 16 0 0 0 6 6l1.27-1.27a2 2 0 0 1 2.11-.45 12.84 12.84 0 0 0 2.81.7A2 2 0 0 1 22 16.92z"}],"$undefined"]}],"07 56 86 34 75"]}],["$","a",null,{"href":"mailto:kmoniaux@gmail.com","className":"flex items-center gap-3 text-sm text-white/70 hover:text-gold transition-colors","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-mail w-4 h-4","children":[["$","rect","18n3k1",{"width":"20","height":"16","x":"2","y":"4","rx":"2"}],["$","path","1ocrg3",{"d":"m22 7-8.97 5.7a1.94 1.94 0 0 1-2.06 0L2 7"}],"$undefined"]}],"kmoniaux@gmail.com"]}],["$","div",null,{"className":"flex items-start gap-3 text-sm text-white/70","children":[["$","svg",null,{"ref":"$undefined","xmlns":"http://www.w3.org/2000/svg","width":24,"height":24,"viewBox":"0 0 24 24","fill":"none","stroke":"currentColor","strokeWidth":2,"strokeLinecap":"round","strokeLinejoin":"round","className":"lucide lucide-map-pin w-4 h-4 mt-0.5","children":[["$","path","1r0f0z",{"d":"M20 10c0 4.993-5.539 10.193-7.399 11.799a1 1 0 0 1-1.202 0C9.539 20.193 4 14.993 4 10a8 8 0 0 1 16 0"}],["$","circle","ilqhr7",{"cx":"12","cy":"10","r":"3"}],"$undefined"]}],"Sigean (11130) - Aude"]}]]}]]}],["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4 text-gold text-sm","children":"Services"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Particuliers",{"children":["$","$L11",null,{"href":"/services#particuliers","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Particuliers"}]}],["$","li","Entreprises",{"children":["$","$L11",null,{"href":"/services#entreprises","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Entreprises"}]}],["$","li","Sites Web",{"children":["$","$L11",null,{"href":"/services#web","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Sites Web"}]}]]}]]}],["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4 text-gold text-sm","children":"Navigation"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Accueil",{"children":["$","$L11",null,{"href":"/","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Accueil"}]}],["$","li","Tarifs",{"children":["$","$L11",null,{"href":"/tarifs","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Tarifs"}]}],"$L16","$L17","$L18"]}]]}],"$L19"]}],"$L1a"]}]}] 16:["$","li","Blog",{"children":["$","$L11",null,{"href":"/blog","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Blog"}]}] 17:["$","li","À Propos",{"children":["$","$L11",null,{"href":"/a-propos","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"À Propos"}]}] 18:["$","li","Contact",{"children":["$","$L11",null,{"href":"/contact","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Contact"}]}] 19:["$","div",null,{"children":[["$","h4",null,{"className":"font-semibold mb-4 text-gold text-sm","children":"Légal"}],["$","ul",null,{"className":"space-y-2","children":[["$","li","Mentions Légales",{"children":["$","$L11",null,{"href":"/mentions-legales","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Mentions Légales"}]}],["$","li","Confidentialité",{"children":["$","$L11",null,{"href":"/confidentialite","className":"text-sm text-white/60 hover:text-gold transition-colors","children":"Confidentialité"}]}]]}]]}] 1a:["$","div",null,{"className":"mt-10 pt-8 border-t border-white/10","children":["$","div",null,{"className":"flex flex-col sm:flex-row items-center justify-between gap-4 text-center sm:text-left","children":[["$","p",null,{"className":"text-xs text-white/50","children":["© ",2026," Le Bon Contact - Kévin Moniaux. Tous droits réservés."]}],["$","p",null,{"className":"text-xs text-gold hidden sm:block","children":"Veiller • Prévenir • Sécuriser • Réaliser • Définir"}]]}]}] b:[["$","meta","0",{"charSet":"utf-8"}],["$","meta","1",{"name":"viewport","content":"width=device-width, initial-scale=1, maximum-scale=5, viewport-fit=cover, user-scalable=yes"}],["$","meta","2",{"name":"theme-color","content":"#1a1a1a"}]] d:[["$","title","0",{"children":"Comment sécuriser son réseau domestique en 2026 | Le Bon Contact"}],["$","meta","1",{"name":"description","content":"Découvrez les bonnes pratiques pour protéger votre réseau WiFi et vos appareils connectés contre les menaces actuelles."}],["$","meta","2",{"name":"author","content":"Kévin Moniaux - Le Bon Contact"}],["$","link","3",{"rel":"manifest","href":"/manifest.json","crossOrigin":"$undefined"}],["$","meta","4",{"name":"generator","content":"v0.app"}],["$","meta","5",{"name":"keywords","content":"informatique,dépannage,administration systèmes,réseaux,virtualisation,sécurité,sites web,Sigean,Aude"}],["$","meta","6",{"name":"mobile-web-app-capable","content":"yes"}],["$","meta","7",{"name":"apple-mobile-web-app-title","content":"Le Bon Contact"}],["$","meta","8",{"name":"apple-mobile-web-app-status-bar-style","content":"black-translucent"}],["$","meta","9",{"property":"og:title","content":"Comment sécuriser son réseau domestique en 2026"}],["$","meta","10",{"property":"og:description","content":"Découvrez les bonnes pratiques pour protéger votre réseau WiFi et vos appareils connectés contre les menaces actuelles."}],["$","meta","11",{"property":"og:image","content":"http://localhost:3000/network-security-firewall-protection.jpg"}],["$","meta","12",{"property":"og:type","content":"article"}],["$","meta","13",{"property":"article:published_time","content":"2026-01-10"}],["$","meta","14",{"property":"article:author","content":"Kévin Moniaux"}],["$","meta","15",{"name":"twitter:card","content":"summary_large_image"}],["$","meta","16",{"name":"twitter:title","content":"Comment sécuriser son réseau domestique en 2026"}],["$","meta","17",{"name":"twitter:description","content":"Découvrez les bonnes pratiques pour protéger votre réseau WiFi et vos appareils connectés contre les menaces actuelles."}],["$","meta","18",{"name":"twitter:image","content":"http://localhost:3000/network-security-firewall-protection.jpg"}]] 9:null