{"id":23,"date":"2008-02-26T00:01:38","date_gmt":"2008-02-25T16:01:38","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/02\/26\/%e5%8f%b0%e7%81%a3%e5%a8%98%e5%ad%90%e9%a7%ad%e5%ae%a2%e6%9c%a8%e9%a6%ac%e7%a8%8b%e5%bc%8f%e7%9b%9c%e5%b8%b3%e8%99%9f\/"},"modified":"2008-02-26T00:01:38","modified_gmt":"2008-02-25T16:01:38","slug":"%e5%8f%b0%e7%81%a3%e5%a8%98%e5%ad%90%e9%a7%ad%e5%ae%a2%e6%9c%a8%e9%a6%ac%e7%a8%8b%e5%bc%8f%e7%9b%9c%e5%b8%b3%e8%99%9f","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=23","title":{"rendered":"\u53f0\u7063\u5a18\u5b50\u99ed\u5ba2\u6728\u99ac\u7a0b\u5f0f\u76dc\u5e33\u865f"},"content":{"rendered":"<p><object width=\"425\" height=\"355\"><param name=\"movie\" value=\"http:\/\/www.youtube.com\/v\/RZE7FmaElb0&#038;rel=1\"><\/param><param name=\"wmode\" value=\"transparent\"><\/param><embed src=\"http:\/\/www.youtube.com\/v\/RZE7FmaElb0&#038;rel=1\" type=\"application\/x-shockwave-flash\" wmode=\"transparent\" width=\"425\" height=\"355\"><\/embed><\/object><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-23","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/23","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=23"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/23\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=23"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=23"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=23"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}