{"id":552,"date":"2009-06-29T23:26:50","date_gmt":"2009-06-29T15:26:50","guid":{"rendered":"http:\/\/localhost\/portal\/2009\/06\/29\/dell\/"},"modified":"2009-06-29T23:26:50","modified_gmt":"2009-06-29T15:26:50","slug":"dell","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=552","title":{"rendered":"\u5feb\u5831\uff1a\u6234\u723e(Dell)\u7db2\u7ad9\u6a19\u50f9\u932f\u8aa4\u5f15\u8d77\u760b\u72c2\u6436\u8cfc"},"content":{"rendered":"<p>\n\u8b1d\u81f3\u6069\/\u5831\u5c0e<br \/>\n2009\/06\/26 \u4e0a\u53484:54<\/p>\n<p>\u5f9e25\u65e522:30\u958b\u59cb\uff0cPTT\u8207\u5657\u6d6a\u4e0a\u958b\u59cb\u6d41\u50b3\u8457\u4e00\u5247\u50b3\u8aaa\u8cbc\u6587\uff1a\u300c\u4e00\u984619\u540bDell\u5bec\u87a2\u5e55\uff0c\u53ea\u8981500\u5143&hellip;&hellip;\u300d\uff0c\u5f88\u5feb\u5730\uff0c\u6709\u8a31\u591a\u52c7\u58eb\u6c7a\u5b9a\u89aa\u81ea\u9a57\u8b49\u9019\u5247\u50b3\u8aaa\u8cbc\u6587\uff0c\u622a\u6b6226\u65e5\u51cc\u66684:00\uff0c\u8a72\u50b3\u5947\u4ecd\u7136\u4e0d\u65b7\uff0c\u77ed\u77ed\u6578\u5c0f\u6642\u5167\uff0c\u8a02\u55ae\u7de8\u865f\u5df2\u7d93\u8df3\u904e\u4e8690\u6578\u842c\u865f\u4e86&hellip;&hellip;\u3002<\/p>\n<p>\u8a71\u8aaa1998\u5e74\uff0c\u65b0\u52a0\u5761HP\u7b2c\u4e00\u6b21\u8de8\u5165\u7dda\u4e0a\u92b7\u552e\uff0c\u6210\u7acb\u7db2\u8def\u5546\u5e97\uff0c\u92b7\u552e\u5370\u8868\u6a5f\u7b49\u5468\u908a\u8a2d\u5099\u3002\u5728\u90a3\u6a23\u7684\u9752\u6f80\u5e74\u4ee3\uff0c\u67d0\u53f0\u539f\u50f94\u5343\u9918\u5143\u7684\u5674\u58a8\u5370\u8868\u6a5f\uff0c\u50f9\u683c\u8aa4\u690d\u70ba800\u5143\uff0c\u5728ICQ\u7db2\u8def\u4e0a\u760b\u72c2\u8f49\u5bc4\uff0c\u77ed\u77ed\u6578\u5c0f\u6642\u5167\uff0c\u4e5f\u662f\u6e67\u9032\u4e86\u6578\u5343\u5f35\u8a02\u55ae\u3002<\/p>\n<p>\u7d50\u679cHP\u6700\u5f8c\u6c7a\u5b9a\u5403\u4e0b\u6240\u6709\u932f\u8aa4\u50f9\u683c\u7684\u8a02\u55ae\uff0c\u786c\u8457\u982d\u76ae\u51fa\u8ca8\uff0c\u800c\u4e2d\u570bcnbeta\u7db2\u7ad9\u66fe\u5831\u5c0e\u904eDell\u65bc2\u670815\u65e5\u7684\u7522\u54c1\u6a19\u50f9\u932f\u8aa4\u5c07\u7167\u6a23\u51fa\u8ca8\uff0c\u56e0\u6b64\u53ef\u9810\u671fDell\u4ecd\u7136\u6703\u5c0d\u9019\u6b21\u7684\u50f9\u683c\u6a19\u793a\u932f\u8aa4\u4e8b\u4ef6\u8ca0\u8d77\u8cac\u4efb\u3002<\/p>\n<p>\u81f3\u65bc\u70ba\u4f55\u6703\u6709\u6a19\u50f9\u932f\u8aa4\u7684\u60c5\u6cc1\u767c\u751f\uff0c\u4e3b\u8981\u662f\u56e0\u70ba\u7dda\u4e0a\u6298\u6263\u7684\u8a2d\u5b9a\u51fa\u554f\u984c\uff0c\u5168\u7ad9\u5747\u4e00\u50f9\uff0c\u5148\u62637,000\u5143\u518d\u8aaa\uff0c\u5c0e\u81f4\u842c\u5143\u4ee5\u5167\u7684\u7522\u54c1\u5176\u6298\u6263\u5f8c\u50f9\u683c\u76f8\u7576\u4f4e\u5ec9\u3002<\/p>\n<p>\u4ee5\u4e0a\u65b0\u805e\u4f86\u6e90\uff1a<a href=\"http:\/\/news.networkmagazine.com.tw\/web\/2009\/06\/26\/13624\/\" target=\"_blank\" rel=\"noopener\">\u7db2\u8def\u8cc7\u8a0a\u96dc\u8a8c<\/a><\/p>\n<p>\n<a href=\"http:\/\/tw.webmaster.yahoo.com\/\"><img decoding=\"async\" border=\"0\" src=\"http:\/\/tw.img.webmaster.yahoo.com\/108667\/ystats.gif\" alt=\"alt\" \/><\/a><br \/>\n<span class=\"article_separator\">\u00a0<\/span><br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u8b1d\u81f3\u6069\/\u5831\u5c0e 2009\/06\/26 \u4e0a\u53484:54 \u5f9e25\u65e522:30\u958b\u59cb\uff0cPTT\u8207\u5657\u6d6a\u4e0a\u958b\u59cb\u6d41\u50b3\u8457\u4e00\u5247\u50b3\u8aaa\u8cbc\u6587 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-552","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/552","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=552"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/552\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=552"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=552"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=552"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}