{"id":1079,"date":"2011-03-06T20:57:09","date_gmt":"2011-03-06T12:57:09","guid":{"rendered":"http:\/\/localhost\/portal\/2011\/03\/06\/korea-hacker-government\/"},"modified":"2011-03-06T20:57:09","modified_gmt":"2011-03-06T12:57:09","slug":"korea-hacker-government","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=1079","title":{"rendered":"\u5357\u97d340\u591a\u500b\u653f\u5e9c\u53ca\u4f01\u696d\u7db2\u7ad9\u906d\u99ed"},"content":{"rendered":"<p>&nbsp;&nbsp;&nbsp;&nbsp; 2011-03-04 \u3010<a target=\"_blank\" href=\"http:\/\/news.chinatimes.com\/world\/50405709\/132011030400981.html\" rel=\"noopener\">\u4e2d\u5ee3\u65b0\u805e<\/a>\uff0f\u8b1d\u4f50\u4eba\u3011<\/p>\n<p>&nbsp;&nbsp;&nbsp; \u5357\u97d3\u4e00\u5bb6\u7db2\u8def\u5b89\u5168\u516c\u53f8\u8868\u793a\uff0c\u56db\u5341\u591a\u500b\u653f\u5e9c\u6a5f\u95dc\u53ca\u4f01\u696d\u7684\u7db2\u7ad9\u906d\u5230\u99ed\u5ba2\u653b\u64ca\u3002\u5176\u4e2d\u5305\u62ec\u5357\u97d3\u7e3d\u7d71\u5e9c\u3001\u5916\u4ea4\u90e8\u3001\u570b\u5bb6\u60c5\u5831\u5c40\u3001\u99d0\u97d3\u7f8e\u8ecd\u53ca\u591a\u5bb6\u4e3b\u8981\u91d1\u878d\u6a5f\u69cb\u3002<\/p>\n<p>&nbsp;&nbsp;&nbsp; \u9019\u5bb6\u7db2\u8def\u5b89\u5168\u516c\u53f8\u8aaa\uff0c\u99ed\u5ba2\u653b\u64ca\u5f9e\u4eca\u5929\u65e9\u4e0a\u958b\u59cb\uff0c\u516c\u53f8\u5df2\u63d0\u4f9b\u514d\u8cbb\u7684\u9632\u6bd2\u8edf\u9ad4\uff0c\u4fee\u5fa9\u53d7\u99ed\u7684\u96fb\u8166\u3002\u76ee\u524d\u9084\u4e0d\u6e05\u695a\u4eca\u65e9\u7684\u7db2\u8def\u653b\u64ca\u9020\u6210\u591a\u56b4\u91cd\u7684\u640d\u5bb3\u3002\u800c\u5357\u97d3\u7e3d\u7d71\u5e9c\u4e26\u672a\u7acb\u5373\u8b49\u5be6\u9019\u8d77\u5831\u5c0e\u3002<br \/>\n<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp;&nbsp;&nbsp;&nbsp; 2011-03-04 \u3010\u4e2d\u5ee3\u65b0\u805e\uff0f\u8b1d\u4f50\u4eba\u3011 &nbsp;&#038;n [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1079","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1079","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1079"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1079\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1079"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1079"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1079"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}