{"id":763,"date":"2010-04-29T09:17:22","date_gmt":"2010-04-29T01:17:22","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/04\/29\/securitynews990429-2\/"},"modified":"2010-04-29T09:17:22","modified_gmt":"2010-04-29T01:17:22","slug":"securitynews990429-2","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=763","title":{"rendered":"\u65e5\u672c\u5927\u5b78\u8077\u54e1\u6d29\u6f0f\u500b\u8cc71.5\u842c\u4ef6"},"content":{"rendered":"<p>\u4eba\u4e8b\u8ab2\u8077\u54e1\u5c07\u696d\u52d9\u7528\u8cc7\u6599\u8907\u88fd\u5230USB\u96a8\u8eab\u789f\u651c\u51fa\uff0c\u5728\u5bb6\u4e2d\u500b\u4eba\u96fb\u8166\u4f7f\u7528\uff0c\u53d7\u5230\u96fb\u8166\u5167P2P\u8edf\u9ad4\u53ca\u75c5\u6bd2\u5f71\u97ff\u800c\u5c0e\u81f4\u81f3\u5c11\u67091\u842c5000\u4efd\u500b\u8cc7\u5df2\u6d41\u5165\u5168\u7403\u7db2\u8def\u4e2d\u3002<\/p>\n<p>\u4f4d\u65bc\u6771\u4eac\u7684\u79c1\u7acb\u65e5\u672c\u5927\u5b78\u7206\u767c\u7db2\u8def\u500b\u8cc7\u6d29\u6f0f\u4e8b\u4ef6\uff0c\u5927\u5b78\u7e3d\u52d9\u90e8\u9577\u5927\u5de5\u539f\u5b5d\u9031\u4e8c\uff084\/27\uff09\u53ec\u958b\u8a18\u8005\u6703\u8b49\u5be6\uff0c\u5df2\u6d29\u6f0f\u500b\u8cc7\u7d041\u842c5000\u4ef6\uff0c\u5176\u9918\u4ecd\u6709\u672a\u67e5\u660e\u7684\u90e8\u5206\u6b63\u5728\u8ffd\u8e64\u8abf\u67e5\u3002<\/p>\n<p>\u6d29\u6f0f\u539f\u7531\u662f4\/24\u65e5\u4eba\u4e8b\u8ab2\u4e00\u540d\u8077\u54e1\u64c5\u81ea\u5c07\u696d\u52d9\u7528\u8cc7\u6599\u8907\u88fd\u5230USB\u96a8\u8eab\u789f\u651c\u51fa\uff0c\u5728\u5bb6\u4e2d\u500b\u4eba\u96fb\u8166\u4f7f\u7528\uff0c\u53d7\u5230\u96fb\u8166\u5167P2P\u8edf\u9ad4Share\u611f\u67d3\u7684\u75c5\u6bd2\u5f71\u97ff\u800c\u6d29\u6f0f\u81f3\u7db2\u8def\u4e2d\u3002<\/p>\n<p>4\u670826\u65e5\u4e0a\u5348\u6821\u65b9\u63a5\u7372\u533f\u540d\u50b3\u771f\u8868\u793a\u7db2\u8def\u4e0a\u6709\u5927\u91cf\u8207\u65e5\u672c\u5927\u5b78\u6709\u95dc\u7684\u696d\u52d9\u6587\u4ef6\u8cc7\u6599\uff0c\u6821\u65b9\u65bc\u540c\u65e5\u5c55\u958b\u8ffd\u8e64\u8abf\u67e5\uff0c\u4e26\u65bc4\/27\u65e5\u6210\u7acb\u7279\u5225\u8abf\u67e5\u59d4\u54e1\u6703\u3002<\/p>\n<p>\u6839\u64da\u8abf\u67e5\u5831\u544a\u986f\u793a\uff0c\u6d29\u6f0f\u7684\u6a94\u6848\u5e7e\u4e4e\u90fd\u662fWord\u8207Excel\u6a94\uff0c\u5305\u62ec\u4eba\u4e8b\u8ab2\u8f44\u4e0b\u696d\u52d9\u8cc7\u6599\u3001\u6703\u8b70\u8a18\u9304\uff0c\u4ee5\u53ca\u8a72\u8077\u54e13\u6708\u4e4b\u524d\u4efb\u8077\u65bc\u65e5\u672c\u5927\u5b78\u91ab\u5b78\u90e8\u9644\u5c6c\u91ab\u9662\u6642\u6240\u7ba1\u7406\u7684\u91ab\u9662\u8077\u54e1\u901a\u8a0a\u540d\u518a\uff0c\u81f3\u5c11\u67091\u842c5000\u4efd\u500b\u8cc7\u5df2\u6d41\u5165\u5168\u7403\u7db2\u8def\u4e2d\u3002<\/p>\n<p>\u5927\u5de5\u539f\u8868\u793a\uff0c\u8a72\u54e1\u96a8\u610f\u8907\u88fd\u8cc7\u6599\u5728\u79c1\u4eba\u96fb\u8166\u4e0a\u4f7f\u7528\u662f\u975e\u5e38\u8f15\u7387\u7684\u884c\u70ba\uff0c\u9055\u53cd\u4e86\u5b78\u52d9\u8655\u8a02\u5b9a\u7684\u8cc7\u6599\u4f7f\u7528\u898f\u7bc4\uff0c\u4eca\u5f8c\u5c07\u7531\u7279\u5225\u8abf\u67e5\u59d4\u54e1\u6703\u6c7a\u5b9a\u8a72\u54e1\u61f2\u8655\uff0c\u4e26\u52a0\u5f37\u8077\u54e1\u8cc7\u5b89\u8a13\u7df4\u8fa6\u6cd5\u8207\u8cc7\u6599\u7ba1\u7406\u898f\u7bc4\uff0c\u540c\u6642\u4e5f\u5c0d\u53d7\u6b64\u6848\u727d\u9023\u7684\u4eba\u58eb\u81f4\u4e0a\u6700\u5927\u6b49\u610f\u3002<\/p>\n<p>\u5f15\u767c\u6b64\u6848\u7684\u8077\u54e1\u5df2\u81ea\u8acb\u4f11\u5047\u8207\u5bb6\u4eba\u96e2\u958b\u4f4f\u6240\uff0c\u56e0\u6b64\u65e5\u5a92\u7121\u6cd5\u76f4\u63a5\u8a2a\u554f\u5230\u672c\u4eba\u3002\u65e5\u672c\u5927\u5b78\u662f\u65e5\u672c\u570b\u5167\u5b78\u7cfb\u6700\u591a\u7684\u7d9c\u5408\u5927\u5b78\uff0c\u77e5\u540d\u6821\u53cb\u6709\u6f14\u54e1\u4e2d\u6751\u7345\u7ae5\u3001\u6f2b\u756b\u5bb6\u9752\u5c71\u525b\u660c\u3001\u53f0\u7063\u73fe\u4efb\u7acb\u6cd5\u59d4\u54e1\u674e\u9d3b\u921e\u7b49\u3002\uff08\u7de8\u8b6f \/ <a href=\"http:\/\/www.ithome.com.tw\/itadm\/article.php?c=60875\">iThome online<\/a> \u5f35\u5d50\u9706\uff09 <br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4eba\u4e8b\u8ab2\u8077\u54e1\u5c07\u696d\u52d9\u7528\u8cc7\u6599\u8907\u88fd\u5230USB\u96a8\u8eab\u789f\u651c\u51fa\uff0c\u5728\u5bb6\u4e2d\u500b\u4eba\u96fb\u8166\u4f7f\u7528\uff0c\u53d7\u5230\u96fb\u8166\u5167P2P\u8edf\u9ad4\u53ca\u75c5\u6bd2\u5f71\u97ff\u800c\u5c0e\u81f4\u81f3\u5c11\u67091 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[262,260,263,227],"class_list":["post-763","post","type-post","status-publish","format-standard","hentry","category-informationsecurity","tag-usb","tag-260","tag-263","tag-227"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/763","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=763"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/763\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=763"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=763"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=763"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}