{"id":440,"date":"2009-01-07T22:13:28","date_gmt":"2009-01-07T14:13:28","guid":{"rendered":"http:\/\/localhost\/portal\/2009\/01\/07\/%e9%9f%93%e5%9c%8b%e4%b8%89%e6%98%9f%e6%95%b8%e4%bd%8d%e7%9b%b8%e6%a1%86-%e8%97%8f%e6%9c%89%e6%83%a1%e6%84%8f%e7%97%85%e6%af%92\/"},"modified":"2009-01-07T22:13:28","modified_gmt":"2009-01-07T14:13:28","slug":"%e9%9f%93%e5%9c%8b%e4%b8%89%e6%98%9f%e6%95%b8%e4%bd%8d%e7%9b%b8%e6%a1%86-%e8%97%8f%e6%9c%89%e6%83%a1%e6%84%8f%e7%97%85%e6%af%92","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=440","title":{"rendered":"\u97d3\u570b\u4e09\u661f\u6578\u4f4d\u76f8\u6846 \u85cf\u6709\u60e1\u610f\u75c5\u6bd2"},"content":{"rendered":"<p>\n\u4f5c\u8005\uff1aiseditor -01\/06\/2009<\/p>\n<p>\n\u8457\u540d\u7dda\u4e0a\u8cfc\u7269\u7db2\u7ad9\u300c\u4e9e\u99ac\u905c\u300d\u5728\u65b0\u5e74\u5047\u671f\u92b7\u552e\u7684\u4e00\u6b3e\u97d3\u570b\u4e09\u661f\u7522\uff18\u82f1\u5bf8\u6578\u4f4d\u76f8\u6846\uff0c\u53ca\u6c83\u723e\u746a\u8d85\u5e02\u92b7\u552e\u76841.5\u82f1\u5bf8\u6578\u4f4d\u76f8\u6846\uff0c\u90fd\u88ab\u767c\u73fe\u6709\u53ef\u80fd\u50b3\u64ad\u96fb\u8166\u75c5\u6bd2\u3002<\/p>\n<p>\u4e9e\u99ac\u905c\u7db2\u7ad9\u767c\u73fe\u8a72\u554f\u984c\u5f8c\uff0c\u4fbf\u70ba\u8cfc\u8cb7\u4e86\u6709\u95dc\u7522\u54c1\u7684\u9867\u5ba2\u767c\u51fa\u96fb\u5b50\u90f5\u4ef6\uff0c\u63d0\u9192\u4ed6\u5011\u91cd\u8996\u9019\u4e00\u554f\u984c\uff0c\u4e26\u63d0\u51fa\u6bba\u75c5\u6bd2\u7684\u5efa\u8b70\u3002\u4e9e\u99ac\u905c\u7db2\u7ad9\u5728\u96fb\u5b50\u90f5\u4ef6\u4e2d\u9084\u8aaa\uff0c\u9867\u5ba2\u5982\u679c\u8cfc\u8cb7\u4e86\u9019\u7a2e\u6578\u4f4d\u76f8\u6846\u4f5c\u70ba\u79ae\u54c1\u9001\u7d66\u4ed6\u4eba\uff0c\u61c9\u7acb\u5373\u901a\u77e5\u5c0d\u65b9\u6ce8\u610f\u9632\u7bc4\u75c5\u6bd2\u3002<\/p>\n<p>\u64da\u5831\u5c0e\uff0c\u4e09\u661f\u516c\u53f8\u65e9\u5df2\u5c31\u6578\u4f4d\u76f8\u6846\u5e36\u300c\u6bd2\u300d\u4e00\u4e8b\u767c\u51fa\u5b89\u5168\u516c\u544a\u3002\u4e09\u661f\u8868\u793a\uff0c\u4ed6\u5011\u4e00\u4e9b\u6578\u4f4d\u76f8\u6846\u7522\u54c1\u7684\u9a45\u52d5\u5149\u789f\u4e2d\uff0c\u500b\u5225\u5957\u88dd\u8edf\u9ad4\u542b\u6709\u8815\u87f2\u75c5\u6bd2\u3002\u6d88\u8cbb\u8005\u5728\u5b89\u88dd\u904e\u7a0b\u4e2d\uff0c\u6709\u53ef\u80fd\u4f7f\u5176\u96fb\u8166\u67d3\u4e0a\u8815\u87f2\u75c5\u6bd2\uff0c\u800c\u9019\u4e9b\u8815\u87f2\u75c5\u6bd2\u6703\u81ea\u52d5\u5f9e\u7db2\u4e0a\u4e0b\u8f09\u7834\u58de\u6027\u66f4\u5927\u7684\u60e1\u610f\u8edf\u9ad4\u3002<\/p>\n<p>\u7f8e\u570b\u5fae\u8edf\u516c\u53f8\u60e1\u610f\u8edf\u4ef6\u9632\u8b77\u4e2d\u5fc3\u7684\u9f4a\u592b?\u99ac\u591a\u723e\u7b49\u5c08\u5bb6\u5efa\u8b70\u8aaa\uff0c\u6d88\u8cbb\u8005\u5728\u4f7f\u7528\u6578\u4f4d\u76f8\u6846\u7b49\u9700\u8981\u8207\u96fb\u8166\u9023\u63a5\u7684\u7522\u54c1\u6642\uff0c\u4e00\u5b9a\u8981\u6ce8\u610f\u958b\u555f\u4e26\u53ca\u6642\u66f4\u65b0\u9632\u75c5\u6bd2\u8edf\u9ad4\u3002 <\/p>\n<p>\n\u4ee5\u4e0a\u6587\u7ae0\u4f86\u81ea\uff1a<a href=\"http:\/\/www.isecutech.com.tw\/article\/article_detail.aspx?aid=4747\" target=\"_blank\" rel=\"noopener\">\u8cc7\u5b89\u4eba<\/a><\/p>\n<p>\n<a href=\"http:\/\/tw.webmaster.yahoo.com\/\"><img decoding=\"async\" border=\"0\" alt=\"alt\" src=\"http:\/\/tw.img.webmaster.yahoo.com\/108667\/ystats.gif\" \/><\/a><br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4f5c\u8005\uff1aiseditor -01\/06\/2009 \u8457\u540d\u7dda\u4e0a\u8cfc\u7269\u7db2\u7ad9\u300c\u4e9e\u99ac\u905c\u300d\u5728\u65b0\u5e74\u5047\u671f\u92b7\u552e\u7684\u4e00\u6b3e\u97d3\u570b\u4e09\u661f\u7522\uff18\u82f1\u5bf8 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-440","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/440","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=440"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/440\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}