{"id":53,"date":"2008-03-16T01:21:37","date_gmt":"2008-03-15T17:21:37","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/03\/16\/cnn\/"},"modified":"2008-03-16T01:21:37","modified_gmt":"2008-03-15T17:21:37","slug":"cnn","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=53","title":{"rendered":"CNN\u5c08\u8a2a\u3000\u4e2d\u570b\u99ed\u5ba2"},"content":{"rendered":"<p>\u9019\u5247\u65b0\u805e\u662fCNN\u8a18\u8005\u5c08\u8a2a\u4f4d\u65bc\u5927\u9678\u4e0a\u6d77\u5357\u908a\u7684\u821f\u5c71\u7fa4\u5cf6\u5167\u7684\u4e00\u7fa4\u4e2d\u570b\u99ed\u5ba2\uff0c\u63ed\u958b\u5927\u9678\u99ed\u5ba2\u5165\u4fb5\u7f8e\u570b\u4e94\u89d2\u5927\u5ec8\u7684\u795e\u79d8\u9762\u7d17<\/p>\n<p>&nbsp;<\/p>\n<p>[youtube:http:\/\/www.youtube.com\/watch?v=yAUKfdNwhco] <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u9019\u5247\u65b0\u805e\u662fCNN\u8a18\u8005\u5c08\u8a2a\u4f4d\u65bc\u5927\u9678\u4e0a\u6d77\u5357\u908a\u7684\u821f\u5c71\u7fa4\u5cf6\u5167\u7684\u4e00\u7fa4\u4e2d\u570b\u99ed\u5ba2\uff0c\u63ed\u958b\u5927\u9678\u99ed\u5ba2\u5165\u4fb5\u7f8e\u570b\u4e94\u89d2\u5927\u5ec8\u7684\u795e\u79d8\u9762\u7d17 &#038; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-53","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/53","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=53"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/53\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=53"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=53"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=53"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}