{"id":814,"date":"2010-07-10T08:58:05","date_gmt":"2010-07-10T00:58:05","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/07\/10\/5-5\/"},"modified":"2010-07-10T08:58:05","modified_gmt":"2010-07-10T00:58:05","slug":"5-5","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=814","title":{"rendered":"\u97d3\u7e3d\u7d71\u5e9c5\u500b\u6a5f\u69cb\u7db2\u7ad9\u53d7\u5230\u99ed\u5ba2\u653b\u64ca"},"content":{"rendered":"<p>\u30102010\/07\/07 23:49 <a href=\"http:\/\/www.bcc.com.tw\/news\/newsview.asp?cde=1161523\" target=\"_blank\" rel=\"noopener\">\u4e2d\u570b\u5ee3\u64ad\u516c\u53f8<\/a>\u5831\u5c0e \u3011&nbsp; &nbsp;&nbsp; <\/p>\n<p>\u5357\u97d3\u9752\u74e6\u53f0\uff08\u7e3d\u7d71\u5e9c\uff09\u3001\u5916\u4ea4\u90e8\u3001\u8fb2\u5354\u4ee5\u53ca\u5916\u63db\u9280\u884c\uff0c\u906d\u5230\u99ed\u5ba2\u5206\u6563\u5f0f\u62d2\u7d55\u670d\u52d9\u653b\u64ca\u3002<br \/>\n\u5ee3\u64ad\u901a\u8a0a\u59d4\u54e1\u6703\u65b9\u9762\u4eca\u5929\u8868\u793a\uff0c\u7576\u5929\u4e0b\u5348\u516d\u9ede\u8d77\uff0c\u767c\u73fe\u6709\u99ed\u5ba2\u5c0d\u9019\u4e94\u500b\u7db2\u7ad9\u9032\u884c\u653b\u64ca\uff0c\u56e0\u6b64\u63a1\u53d6\u4e86\u7dca\u6025\u63aa\u65bd\u3002\u6709\u95dc\u4eba\u58eb\u8868\u793a\uff1a\u6b64\u6b21\u653b\u64ca\u6bd4\u8d77\u53bb\u5e74\u898f\u6a21\u5f88\u5c0f\uff0c\u76ee\u524d\u9084\u7121\u9700\u64d4\u6182\uff0c\u4f46\u5404\u90e8\u9580\u5df2\u505a\u597d\u5fb9\u5e95\u7684\u6e96\u5099\uff0c\u4ee5\u9632\u842c\u4e00\u3002\u76ee\u524d\u9084\u672a\u767c\u751f\u640d\u5931\u3002<br \/>\n\u5ee3\u64ad\u901a\u8a0a\u59d4\u54e1\u6703\u62ff\u5230\u7528\u65bc\u653b\u64ca\u7684\u60e1\u6027\u4ee3\u78bc\uff0c\u6b63\u5728\u9032\u884c\u7cbe\u5bc6\u5206\u6790\u3002\u6b64\u5916\uff0c\u4e5f\u4e0d\u6392\u9664\u5728\u53bb\u5e74\u7684\u653b\u64ca\u4e2d\u3001\u611f\u67d3\u75c5\u6bd2\u7684\u96fb\u8166\uff0c\u53ef\u80fd\u6c92\u6709\u5fb9\u5e95\u6e05\u9664\u75c5\u6bd2\uff0c\u5c0e\u81f4\u91cd\u65b0\u906d\u5230\u653b\u64ca\u3002\uff08\u738b\u9577\u5049 \u9996\u723e\u5831\u5c0e\uff09 <br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u30102010\/07\/07 23:49 \u4e2d\u570b\u5ee3\u64ad\u516c\u53f8\u5831\u5c0e \u3011&nbsp; &nbsp;&nbsp; \u5357\u97d3\u9752\u74e6\u53f0\uff08\u7e3d [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-814","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/814","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=814"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/814\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=814"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=814"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=814"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}