{"id":1459,"date":"2020-11-15T22:54:33","date_gmt":"2020-11-15T21:54:33","guid":{"rendered":"http:\/\/mikepolanski.com\/electronics\/?page_id=1459"},"modified":"2020-11-15T22:55:29","modified_gmt":"2020-11-15T21:55:29","slug":"hardware-backdoors-and-troyans","status":"publish","type":"page","link":"http:\/\/mikepolanski.com\/electronics\/hardware-backdoors-and-troyans\/","title":{"rendered":"Hardware backdoors and trojans"},"content":{"rendered":"<blockquote class=\"wp-embedded-content\" data-secret=\"NybUGQCV6J\"><p><a href=\"https:\/\/zaufanatrzeciastrona.pl\/post\/techniki-wykrywania-sprzetowych-koni-trojanskich-i-backdoorow-analiza\/\">Techniki wykrywania sprz\u0119towych koni troja\u0144skich i backdoor\u00f3w &#8211; analiza<\/a><\/p><\/blockquote>\n<p><iframe loading=\"lazy\" class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8222;Techniki wykrywania sprz\u0119towych koni troja\u0144skich i backdoor\u00f3w &#8211; analiza&#8221; &#8212; Zaufana Trzecia Strona\" src=\"https:\/\/zaufanatrzeciastrona.pl\/post\/techniki-wykrywania-sprzetowych-koni-trojanskich-i-backdoorow-analiza\/embed\/#?secret=NybUGQCV6J\" data-secret=\"NybUGQCV6J\" width=\"600\" height=\"338\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Techniki wykrywania sprz\u0119towych koni troja\u0144skich i backdoor\u00f3w &#8211; analiza<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-1459","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/mikepolanski.com\/electronics\/wp-json\/wp\/v2\/pages\/1459","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/mikepolanski.com\/electronics\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/mikepolanski.com\/electronics\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/mikepolanski.com\/electronics\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/mikepolanski.com\/electronics\/wp-json\/wp\/v2\/comments?post=1459"}],"version-history":[{"count":2,"href":"http:\/\/mikepolanski.com\/electronics\/wp-json\/wp\/v2\/pages\/1459\/revisions"}],"predecessor-version":[{"id":1462,"href":"http:\/\/mikepolanski.com\/electronics\/wp-json\/wp\/v2\/pages\/1459\/revisions\/1462"}],"wp:attachment":[{"href":"http:\/\/mikepolanski.com\/electronics\/wp-json\/wp\/v2\/media?parent=1459"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}