{"id":832,"date":"2010-07-22T22:05:58","date_gmt":"2010-07-22T14:05:58","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/07\/22\/kioskpdf\/"},"modified":"2010-07-22T22:05:58","modified_gmt":"2010-07-22T14:05:58","slug":"kioskpdf","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=832","title":{"rendered":"\u5217\u5370\u4e0d\u7528\u9322\uff1f \u4fbf\u5229\u5546\u5e97KIOSK\u670d\u52d9\u7ad9\u6709PDF\u6f0f\u6d1e"},"content":{"rendered":"<p>\u4f5c\u8005\uff1a<a target=\"_blank\" href=\"http:\/\/www.informationsecurity.com.tw\/article\/article_detail.aspx?aid=5820\" rel=\"noopener\">\u5f35\u7dad\u541b<\/a> -07\/19\/2010<\/p>\n<p>\u65e5\u524d\u5ee3\u70ba\u9031\u77e5\u7684Adobe Reader\u6f0f\u6d1e\uff0c\u5728\u88ab\u7528\u505a\u7db2\u9801\u639b\u99ac\u4e26\u5c0e\u81f4\u591a\u8d77\u96f6\u6642\u5dee\u653b\u64ca\u4e4b\u5f8c\uff0cAdobe\u5df2\u91cb\u51fa\u66f4\u65b0\u4fee\u88dc\u7a0b\u5f0f\u3002\u7136\u800c\uff0c\u4ecd\u6709\u8a31\u591a\u5c0d\u5916\u63d0\u4f9b\u670d\u52d9\u7684\u8cc7\u8a0a\u8a2d\u5099\u4e0a\u537b\u9084\u4f7f\u7528\u820a\u7248\u672a\u66f4\u65b0\u7684Adobe Reader\u7248\u672c\uff0c\u7cfb\u7d71\u5c07\u66b4\u9732\u5728\u9ad8\u5ea6\u98a8\u96aa\u4e4b\u4e2d\uff0c\u4f8b\u5982\u4fbf\u5229\u5546\u5e97\u53ef\u7528\u4f86\u5217\u5370PDF\u6587\u4ef6\u7684Kiosk\u8cc7\u8a0a\u670d\u52d9\u7ad9\u3002<\/p>\n<p>&nbsp;<br \/>\n\u672c\u5c46\u99ed\u5ba2\u5e74\u6703zha0\u793a\u7bc4\u4e86\u77e5\u540d\u4fbf\u5229\u5546\u5e97\u7684Kiosk\u5373\u5b58\u6709\u6b64\u4e00\u5f31\u9ede\uff0c\u63d0\u4f9b\u4f7f\u7528\u8005\u6587\u4ef6\u5217\u5370\u7684Adobe Reader\u9084\u505c\u7559\u57287.X\u7248\u672c\uff0c\u6709\u5fc3\u4eba\u58eb\u53ea\u8981\u5229\u7528\u5df2\u516c\u958b\u5728\u7db2\u8def\u4e0a\u7684\u60e1\u610f\u653b\u64ca\u7a0b\u5f0f\u5c31\u53ef\u5229\u7528\u8a72\u5f31\u9ede\u53d6\u5f97\u8a72\u53f0Kiosk\u63a7\u5236\u6b0a\u9650\u3002<\/p>\n<p>\u76ee\u524d\u4fbf\u5229\u5546\u5e97\u7684Kiosk\u9664\u4e86\u5217\u5370\u6587\u4ef6\u3001\u7e73\u8cbb\u5916\uff0c\u9084\u8207\u5916\u90e8\u55ae\u4f4d\u5408\u4f5c\u63d0\u4f9b\u8d8a\u4f86\u8d8a\u591a\u8cc7\u8a0a\u670d\u52d9\uff0c\u5305\u62ec\u8207\u5730\u65b9\u653f\u5e9c\u5408\u4f5c\uff0c\u6c11\u773e\u53ef\u4f7f\u7528\u81ea\u7136\u4eba\u6191\u8b49\u900f\u904e\u4fbf\u5229\u5546\u5e97\u7684Kiosk\u7533\u8acb\u500b\u4eba\u6236\u7c4d\u8b04\u672c\u6216\u88dc\u9818\u6236\u53e3\u540d\u7c3f\u7b49\u3002\u56e0\u6b64\u82e5Kiosk\u7cfb\u7d71\u7684\u5b89\u5168\u9632\u8b77\u51fa\u73fe\u6f0f\u6d1e\uff0c\u4e0d\u53ea\u8b93\u6709\u5fc3\u4eba\u58eb\u5f71\u5370\u4e0d\u7528\u9322\uff0c\u66f4\u53ef\u80fd\u9020\u6210\u4f7f\u7528\u8005\u500b\u8cc7\u5916\u6d29\u7684\u554f\u984c\u3002<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u4f5c\u8005\uff1a\u5f35\u7dad\u541b -07\/19\/2010 \u65e5\u524d\u5ee3\u70ba\u9031\u77e5\u7684Adobe Reader\u6f0f\u6d1e\uff0c\u5728\u88ab\u7528\u505a\u7db2\u9801\u639b\u99ac\u4e26\u5c0e\u81f4\u591a\u8d77\u96f6 [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-832","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=832"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/832\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}