{"version":"1.0","provider_name":"SpeedTest.pl Wiadomo\u015bci","provider_url":"https:\/\/www.speedtest.pl\/wiadomosci","author_name":"PJ","author_url":"https:\/\/www.speedtest.pl\/wiadomosci\/author\/przemek\/","title":"Kto pod kim backdoory kopie... - SpeedTest.pl Wiadomo\u015bci","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"Xv0xCGd19k\"><a href=\"https:\/\/www.speedtest.pl\/wiadomosci\/windows\/kto-pod-kim-backdoory-kopie\/\">Kto pod kim backdoory kopie&#8230;<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.speedtest.pl\/wiadomosci\/windows\/kto-pod-kim-backdoory-kopie\/embed\/#?secret=Xv0xCGd19k\" width=\"600\" height=\"338\" title=\"&#8222;Kto pod kim backdoory kopie&#8230;&#8221; &#8212; SpeedTest.pl Wiadomo\u015bci\" data-secret=\"Xv0xCGd19k\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.speedtest.pl\/wiadomosci\/wp-content\/uploads\/2016\/08\/Fotolia_77554821_Subscription_Monthly_M.jpg","thumbnail_width":1688,"thumbnail_height":1125,"description":"Backdoor t\u0142umaczony nasz j\u0119zyk dos\u0142ownie to tak zwane tylne drzwi, b\u0105d\u017a te\u017c tylna furtka. Jest to pewien rodzaj nie tyle szkodliwego oprogramowania, ile pozostawionej luki umo\u017cliwiaj\u0105cej nieautoryzowany dost\u0119p. Szczerze powiedziawszy, to jestem przeciwnikiem takich akcji i to mocno zagorza\u0142ym.\u00a0Cz\u0119sto w\u00a0funk\u00adcje tyl\u00adnych drzwi wyposa\u017cone s\u0105 trojany i\u00a0boty, dzi\u0119ki czemu operator sieci kom\u00adputer\u00f3w zom\u00adbie mo\u017ce zleca\u0107 im [&hellip;]"}