{"id":862,"date":"2010-08-16T09:22:36","date_gmt":"2010-08-16T01:22:36","guid":{"rendered":"http:\/\/localhost\/portal\/2010\/08\/16\/apple\/"},"modified":"2010-08-16T09:22:36","modified_gmt":"2010-08-16T01:22:36","slug":"apple","status":"publish","type":"post","link":"https:\/\/www.cyberhunter.com.tw\/?p=862","title":{"rendered":"\u6d89\u5acc\u5411\u4e9e\u6d326\u5ee0\u6d29\u5bc6\u62ff\u56de\u6263 \u860b\u679c\u4e00\u63a1\u8cfc\u7d93\u7406\u906d\u8d77\u8a34"},"content":{"rendered":"<p>\u9245\u4ea8\u7db2\u7de8\u8f2f\u67e5\u6dd1\u599d\u3000\u53f0\u5317\u7d9c\u5408\u5831\u5c0e\u3000\u30002010-08-16 08:10:03\u3000<\/p>\n<p>\u7f8e\u570b\u860b\u679c\u96fb\u8166 (APPL-US) \u4e00\u540d\u5168\u7403\u63a1\u8cfc\u7d93\u7406\uff0c\u6d89\u5acc\u5411 6 \u5bb6\u53c3\u8207\u751f\u7522 iPhone \u53ca iPod \u95dc\u9023\u7522\u54c1\u7684\u97d3\u570b\u3001\u4e2d\u570b\u5927\u9678\u3001\u53f0\u7063\u53ca\u65b0\u52a0\u5761\u4f01\u696d\uff0c\u51fa\u8ce3\u516c\u53f8\u6a5f\u5bc6\u8cc7\u6599\uff0c\u5f9e\u4e2d\u6536\u53d6\u8d85\u904e 100 \u842c\u7f8e\u5143 (\u7d04 777 \u842c\u6e2f\u5143) \u56de\u50ad\uff0c\u524d\u65e5\u906d\u806f\u90a6\u5927\u966a\u5be9\u5718\u8d77\u8a34\u3002<\/p>\n<p>\u9999\u6e2f\u300a\u6587\u532f\u5831\u300b\u7d9c\u5408\u5916\u96fb\u6d88\u606f\uff0c\u6d89\u6848\u7684\u8fea\u74e6\u6069 (Paul Shin Devine) \u65bc 2005 \u5e74\u52a0\u5165\u860b\u679c\u516c\u53f8\uff0c\u4efb\u8077\u5168\u7403\u63a1\u8cfc\u7d93\u7406\uff0c\u4e3b\u8981\u8ca0\u8cac\u8207\u6d77\u5916\u751f\u7522\u5546\u6d3d\u8ac7\u8a02\u55ae\u4e8b\u5b9c\uff0c\u5728\u516c\u53f8\u4e2d\u5c6c\u4e2d\u5c64\u8077\u54e1\u3002\u4ed6\u73fe\u88ab\u63a7\u96fb\u5b50\u8a50\u9a19\u3001\u6d17\u9ed1\u9322\u3001\u4e32\u8b00\u8a50\u9a19\u3001\u975e\u6cd5\u6536\u53d7\u56de\u50ad\u7b49 23 \u9805\u7f6a\u540d\uff0c\u63d0\u5802\u5f8c\u4e0d\u6e96\u4fdd\u91cb\u3002\u6b64\u5916\uff0c\u860b\u679c\u4ea6\u5411\u8fea\u74e6\u6069\u63d0\u51fa\u6c11\u4e8b\u8a34\u8a1f\uff0c\u8981\u6c42\u8ce0\u511f\u640d\u5931\u3002<br type=\"_moz\" \/><\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u9245\u4ea8\u7db2\u7de8\u8f2f\u67e5\u6dd1\u599d\u3000\u53f0\u5317\u7d9c\u5408\u5831\u5c0e\u3000\u30002010-08-16 08:10:03\u3000 \u7f8e\u570b\u860b\u679c\u96fb\u8166 (APPL-US)  [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8],"tags":[],"class_list":["post-862","post","type-post","status-publish","format-standard","hentry","category-informationsecurity"],"_links":{"self":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/862","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=862"}],"version-history":[{"count":0,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=\/wp\/v2\/posts\/862\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=862"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=862"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberhunter.com.tw\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=862"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}