{"id":1175,"date":"2011-08-04T15:55:10","date_gmt":"2011-08-04T07:55:10","guid":{"rendered":"http:\/\/localhost\/portal\/2011\/08\/04\/hacker-mcafee-cyberhunter\/"},"modified":"2011-08-04T15:55:10","modified_gmt":"2011-08-04T07:55:10","slug":"hacker-mcafee-cyberhunter","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=1175","title":{"rendered":"\u53f2\u4e0a\u6700\u5927\u99ed\u5ba2\u653b\u64ca \u53f0\u7063\u4e5f\u53d7\u5bb3"},"content":{"rendered":"<p><a target=\"_blank\" href=\"http:\/\/www.ttv.com.tw\/videocity\/video_play.asp?id=60325\" rel=\"noopener\">\u53f0\u8996\u65b0\u805e\u5831\u5c0e<\/a>&nbsp;  2011\/8\/4&nbsp; \u5289\u6cf3\u6690 \u5831\u5c0e<\/p>\n<h2>\u53f2\u4e0a\u6700\u5927\u99ed\u5ba2\u653b\u64ca \u53f0\u7063\u4e5f\u53d7\u5bb3\u3000\u9b5a\u53c9\u5f0f\u7db2\u8def\u91e3\u9b5a\u6cd5 \u76dc\u53d6\u5bc6\u78bc\u99ed\u5165\u3000\u5e55\u5f8c\u85cf\u93e1\u4eba \u5c08\u5bb6\u76f4\u6307\u4e2d\u570b\u5927\u9678&nbsp;&nbsp;<\/h2>\n<p>\n\u96fb\u8166\u99ed\u5ba2\u5165\u4fb5\u5404\u570b\u653f\u5e9c\u8ddf\u7d44\u7e54\uff0c\u7aca\u53d6\u6a5f\u5bc6\u8cc7\u6599\u5df2\u7d93\u5230\u4e86\u7121\u6240\u4e0d\u7528\u5176\u6975\u7684\u5730\u6b65\u3002 \u4e2d\u7ffb\u82f1\u3010Powered by Google AJAX Language API\u3011\uff0c\u7ffb\u8b6f\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u3002<br \/>\n\u7f8e\u570b\u4e00\u5bb6\u77e5\u540d\u9632\u6bd2\u8edf\u9ad4\u5ee0\u5546\uff0c\u4eca\u5929\u516c\u5e03\u865f\u7a31\u53f2\u4e0a\u6700\u5927\u898f\u6a21\u7684\u7db2\u8def\u653b\u64ca\u884c\u52d5\uff0c\u5305\u62ec\u7f8e\u570b\u8ddf\u806f\u5408\u570b\u7b49\u653f\u5e9c\u548c\u7d44\u7e54\u90fd\u6dea\u9677\uff0c\u9023\u53f0\u7063\u4e5f\u5728\u540d\u55ae\u7576\u4e2d\uff0c\u5c08\u5bb6\u8868\u793a\uff0c\u5e55\u5f8c\u7684\u85cf\u93e1\u4eba\u5f88\u53ef\u80fd\u5c31\u662f\u4e2d\u570b\u5927\u9678\u3002 \u4e2d\u7ffb\u82f1\u3010Powered by Google AJAX Language API\u3011\uff0c\u7ffb\u8b6f\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u3002<\/p>\n<p><iframe loading=\"lazy\" height=\"349\" frameborder=\"0\" width=\"425\" src=\"http:\/\/www.youtube.com\/embed\/-_Ti7qFGAzc\" allowfullscreen=\"\"><\/iframe> <\/p>\n<p>\u9019\u9805\u4ee3\u865f\u70ba\u6697\u9f20\u884c\u52d5\u7684\u9023\u74b0\u7db2\u8def\u653b\u64ca\uff0c\u5df2\u7d93\u6301\u7e8c\u4e86\u81f3\u5c11\u4e94\u5e74\uff0c\u7f8e\u570b\u653f\u5e9c\u7db2\u7ad9\uff0c\u806f\u5408\u570b\u4ee5\u53ca\u8a31\u591a\u6c11\u9593\u91cd\u8981\u7522\u696d\u5168\u90fd\u88ab\u653b\u9677\u3002 \u4e2d\u7ffb\u82f1\u3010Powered by Google AJAX Language API\u3011\uff0c\u7ffb\u8b6f\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u3002<br \/>\n\u7f8e\u570b\u77e5\u540d\u9632\u6bd2\u8edf\u9ad4\u5546\u9ea5\u514b\u83f2\u8868\u793a\uff0c\u9019\u4e9b\u653b\u64ca\u884c\u52d5\u7684\u80fd\u91cf\u975e\u5e38\u5927\uff0c\u80cc\u5f8c\u80af\u5b9a\u6709\u570b\u5bb6\u529b\u91cf\u6490\u8170\uff0c\u800c\u53f0\u7063\u66f4\u662f\u9996\u7576\u5176\u885d. \u5c08\u5bb6\u8868\u793a\u99ed\u5ba2\u662f\u5229\u7528\u6240\u8b02\u7684\u9b5a\u53c9\u5f0f\u7db2\u8def\u91e3\u9b5a\u6cd5\uff0c\u76dc\u53d6\u7279\u5b9a\u76ee\u6a19\u7684\u5bc6\u78bc\u3002 \u4e2d\u7ffb\u82f1\u3010Powered by Google AJAX Language API\u3011\uff0c\u7ffb\u8b6f\u5167\u5bb9\u50c5\u4f9b\u53c3\u8003\u3002<\/p>\n<p>\n<script type=\"text\/javascript\"><!--\ngoogle_ad_client = \"ca-pub-1319158505166829\";\n\/* 468x60, \u5df2\u5efa\u7acb 2010\/10\/17 *\/\ngoogle_ad_slot = \"7257811969\";\ngoogle_ad_width = 468;\ngoogle_ad_height = 60;\n\/\/-->\n<\/script> <script type=\"text\/javascript\"\nsrc=\"http:\/\/pagead2.googlesyndication.com\/pagead\/show_ads.js\">\n<\/script> <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u53f0\u8996\u65b0\u805e\u5831\u5c0e&nbsp; 2011\/8\/4&nbsp; \u5289\u6cf3\u6690 \u5831\u5c0e \u53f2\u4e0a\u6700\u5927\u99ed\u5ba2\u653b\u64ca \u53f0\u7063\u4e5f\u53d7\u5bb3\u3000\u9b5a\u53c9\u5f0f\u7db2\u8def [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-1175","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1175","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1175"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/1175\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1175"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1175"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1175"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}