{"id":79,"date":"2008-04-05T17:30:44","date_gmt":"2008-04-05T09:30:44","guid":{"rendered":"http:\/\/localhost\/portal\/2008\/04\/05\/wireless\/"},"modified":"2008-04-05T17:30:44","modified_gmt":"2008-04-05T09:30:44","slug":"wireless","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=79","title":{"rendered":"\u5c0f\u5fc3\u7121\u7dda\u4e0a\u7db2\u4e4b\u5b89\u5168"},"content":{"rendered":"<p>\u5728\u53f0\u7063\u8d8a\u4f86\u8d8a\u591a\u7684\u516c\u5171\u5834\u6240\u63d0\u4f9b\u7121\u7dda\u4e0a\u7db2\u529f\u80fd\uff0c\u5728\u5496\u5561\u5ef3\u3001\u98ef\u5e97\u3001\u6a5f\u5834\u3001\u9ad8\u9435\u7ad9\u7b49\u7b49\uff0c\u7531\u65bc\u6c11\u773e\u5c0d\u65bc\u7121\u7dda\u7db2\u8def<\/p>\n<p>\u4f7f\u7528\u7684\u5b89\u5168\u6027\u4e0d\u8db3\uff0c\u7d93\u5e38\u6709\u4eba\u53d7\u5bb3\uff0c\u770b\u4e86\u4ee5\u4e0b\u65b0\u805e\uff0c\u5e0c\u671b\u80fd\u5920\u63d0\u9ad8\u4f60\u5c0d\u4f7f\u7528\u7121\u7dda\u7db2\u8def\u7684\u8b66\u89ba\u3002 <\/p>\n<p>&nbsp;<\/p>\n<p>[youtube:http:\/\/youtube.com\/watch?v=kh9dHnjmBWY] <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u5728\u53f0\u7063\u8d8a\u4f86\u8d8a\u591a\u7684\u516c\u5171\u5834\u6240\u63d0\u4f9b\u7121\u7dda\u4e0a\u7db2\u529f\u80fd\uff0c\u5728\u5496\u5561\u5ef3\u3001\u98ef\u5e97\u3001\u6a5f\u5834\u3001\u9ad8\u9435\u7ad9\u7b49\u7b49\uff0c\u7531\u65bc\u6c11\u773e\u5c0d\u65bc\u7121\u7dda\u7db2\u8def \u4f7f\u7528\u7684\u5b89\u5168\u6027 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-79","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/79","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=79"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/79\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=79"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=79"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=79"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}