{"version":"1.0","provider_name":"Dataplugs","provider_url":"https:\/\/www.dataplugs.com\/tc\/","title":"\u70ba\u4f55\u99ed\u5ba2\u4f7f\u7528DDoS\u653b\u64ca\uff1a\u52d5\u6a5f\u8207\u5f71\u97ff\uff5cDDoS\u9632\u79a6 \u9ad8\u9632\u4f3a\u670d\u5668 \u7de9\u89e3\u5de5\u5177\u7684\u7b56\u7565\u8207\u63aa\u65bd\uff5cDataplugs \u591a\u7dda\u901a","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qb0AskLtL6\"><a href=\"https:\/\/www.dataplugs.com\/tc\/why-hackers-use-ddos-attacks-motivations-and-implications\/\">\u70ba\u4f55\u99ed\u5ba2\u4f7f\u7528DDoS\u653b\u64ca\uff1a\u52d5\u6a5f\u8207\u5f71\u97ff<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.dataplugs.com\/tc\/why-hackers-use-ddos-attacks-motivations-and-implications\/embed\/#?secret=qb0AskLtL6\" width=\"600\" height=\"338\" title=\"\u70ba\u4f55\u99ed\u5ba2\u4f7f\u7528DDoS\u653b\u64ca\uff1a\u52d5\u6a5f\u8207\u5f71\u97ff &#8212; Dataplugs\" data-secret=\"qb0AskLtL6\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"\u5206\u6563\u5f0f\u963b\u65b7\u670d\u52d9DDoS\u653b\u64ca\u662f\u99ed\u5ba2\u5011\u5e38\u7528\u7684\u7b56\u7565\uff0c\u80fd\u4e2d\u65b7\u7db2\u7d61\u3001\u61c9\u7528\u7a0b\u5e8f\u53ca\u7db2\u7ad9\uff0c\u5f71\u97ff\u4f01\u696d\u3001\u670d\u52d9\u63d0\u4f9b\u5546\u548c\u653f\u5e9c\u6a5f\u69cb\u3002\u99ed\u5ba2\u5229\u7528DDoS\u653b\u64ca\u4f86\u52d2\u7d22\u91d1\u9322\u3001\u5be6\u73fe\u653f\u6cbb\u76ee\u6a19\u3001\u63a9\u84cb\u5176\u4ed6\u7db2\u7d61\u72af\u7f6a\u53ca\u5831\u5fa9\u7b49\u3002\u9019\u4e9b\u653b\u64ca\u7684\u76ee\u7684\u662f\u8f49\u79fb\u5b89\u5168\u5718\u968a\u7684\u6ce8\u610f\u529b\uff0c\u9032\u4e00\u6b65\u5a01\u8105\u7db2\u7d61\u5b89\u5168\u3002\u9762\u5c0d\u9019\u4e9b\u5a01\u8105\uff0c\u4f01\u696d\u9700\u8981\u63a1\u53d6\u5148\u9032\u7684DDoS\u6aa2\u6e2c\u548c\u9632\u79a6\u63aa\u65bd\uff0c\u4fdd\u8b77\u5176\u7db2\u7d61\u548c\u57fa\u790e\u8a2d\u65bd\u3002"}