{"id":574,"date":"2016-05-13T18:34:27","date_gmt":"2016-05-13T09:34:27","guid":{"rendered":"http:\/\/guide.jinbo.net\/digital-security\/?p=574"},"modified":"2016-05-13T18:38:45","modified_gmt":"2016-05-13T09:38:45","slug":"%ec%a0%95%ec%b9%98%ec%a0%81-%ea%b2%80%ec%97%b4-%ec%b0%a8%eb%8b%a8%eb%90%9c-%ec%82%ac%ec%9d%b4%ed%8a%b8-%ec%9a%b0%ed%9a%8c-%ec%a0%91%ec%86%8d%ed%95%98%ea%b8%b0","status":"publish","type":"post","link":"http:\/\/guide.jinbo.net\/digital-security\/574","title":{"rendered":"\uc815\uce58\uc801 \uac80\uc5f4? \ucc28\ub2e8\ub41c \uc0ac\uc774\ud2b8 \uc6b0\ud68c \uc811\uc18d\ud558\uae30!"},"content":{"rendered":"<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"alignright wp-image-577\" src=\"http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/\ubc29\uc2ec\uc704_\ucc28\ub2e8-\uc0ac\uc774\ud2b8-\uc774\ubbf8\uc9c0-400x307.jpg\" alt=\"\ubc29\uc2ec\uc704_\ucc28\ub2e8-\uc0ac\uc774\ud2b8-\uc774\ubbf8\uc9c0\" width=\"323\" height=\"248\" srcset=\"http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/\ubc29\uc2ec\uc704_\ucc28\ub2e8-\uc0ac\uc774\ud2b8-\uc774\ubbf8\uc9c0-400x307.jpg 400w, http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/\ubc29\uc2ec\uc704_\ucc28\ub2e8-\uc0ac\uc774\ud2b8-\uc774\ubbf8\uc9c0-768x589.jpg 768w, http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/\ubc29\uc2ec\uc704_\ucc28\ub2e8-\uc0ac\uc774\ud2b8-\uc774\ubbf8\uc9c0.jpg 800w\" sizes=\"(max-width: 323px) 100vw, 323px\" \/>\uc9c0\ub09c 3\uc6d4 24\uc77c, \ubc29\uc1a1\ud1b5\uc2e0\uc2ec\uc758\uc704\uc6d0\ud68c\uac00 \u2018<a href=\"http:\/\/northkoreatech.org\" target=\"_blank\">\ub178\uc2a4\ucf54\ub9ac\uc544\ud14c\ud06c<\/a>\u2019\ub77c\ub294 \uc0ac\uc774\ud2b8\ub294 \uad6d\uac00\ubcf4\uc548\ubc95 \uc704\ubc18\uc73c\ub85c \uc811\uc18d \ucc28\ub2e8\ud588\ub2e4\uace0 \ud569\ub2c8\ub2e4. \uc774 \uc0ac\uc774\ud2b8\ub294 \uc678\uc2e0 \uae30\uc790\uac00 \ubd81\ud55c\uc758 \uc815\ubcf4\ud1b5\uc2e0 \uae30\uc220 \uad00\ub828\ud55c \uc774\uc288\ub97c \uc804\ubb38\uc801\uc73c\ub85c \uc804 \uc138\uacc4\uc5d0 \uc804\ub2ec\ud558\uae30 \uc704\ud574 2010\ub144\ubd80\ud130 6\ub144\uc9f8 \uc6b4\uc601\ud558\uace0 \uc788\ub294 \ud559\uc220, \ubcf4\ub3c4 \ubaa9\uc801\uc758 \uc6f9\uc0ac\uc774\ud2b8\ub77c\uace0 \ud569\ub2c8\ub2e4. \uc774 \uc0ac\uc774\ud2b8\uac00 \uad6d\uac00\ubcf4\uc548\ubc95 \uc704\ubc18\uc778\uc9c0\ub3c4 \uc758\ubb38\uc774\uac70\ub2c8\uc640, \uc124\uc0ac \ubd81\ud55c\uc744 \ucc2c\uc591\ud558\ub294 \ub0b4\uc6a9\uc744 \ud3ec\ud568\ud558\uace0 \uc788\ub2e4\uace0 \ud558\ub354\ub77c\ub3c4, \uc774\ub807\uac8c \ud589\uc815\uae30\uad00\uc774 \uc0ac\ubc95\uc801 \uacb0\uc815\ub3c4 \uc5c6\uc774 \ud2b9\uc815\ud55c \uc0ac\uc774\ud2b8\uc758 \uc811\uadfc\uc744 \ucc28\ub2e8\ud558\ub294 \uac83\uc740 \u2018\uac80\uc5f4\u2019\uc785\ub2c8\ub2e4. \uc774\uc6a9\uc790\ub4e4\uc740 \uc774 \uc0ac\uc774\ud2b8\uc5d0 \uc811\uadfc\ud574\uc11c \uc815\ubcf4\ub97c \uc5bb\uace0, \uc774\ud574\ud558\uace0, \ub098\ub984\ub300\ub85c \ud310\ub2e8\ud560 \ub2a5\ub825\uacfc \uad8c\ub9ac\ub97c \uac16\uace0 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\uadf8\ub7ec\ub098 \ubc29\ud1b5\uc2ec\uc758\uc704\uac00 \uc774\ub807\uac8c \uc0ac\uc774\ud2b8\ub97c \ucc28\ub2e8\ud574\ub3c4 \uc774 \uc0ac\uc774\ud2b8\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\ub294 \ubc29\ubc95\uc774 \uc804\ud600 \uc5c6\ub294 \uac83\uc740 \uc544\ub2d9\ub2c8\ub2e4. \uc774\ubc88 \ub2ec \ub514\uc9c0\ud138 \ubcf4\uc548 \uac00\uc774\ub4dc\uc5d0\uc11c\ub294 \ucc28\ub2e8\ub41c \uc0ac\uc774\ud2b8\ub97c \uc6b0\ud68c\ud574\uc11c \uc811\uadfc\ud558\ub294 \ubc29\ubc95\uc744 \uc18c\uac1c\ud569\ub2c8\ub2e4.<\/p>\n<p>&nbsp;<\/p>\n<h2><\/h2>\n<h2><\/h2>\n<h2><\/h2>\n<h2><\/h2>\n<h2>http<span style=\"color: #ff0000;\">s<\/span>:\/\/\ub85c \uc811\uc18d\ud558\uae30<\/h2>\n<p>\uc608\uc804 \ubcf4\uc548 \uac00\uc774\ub4dc\uc5d0\uc11c\ub3c4 \ub2e4\ub8e8\uc5c8\uc2b5\ub2c8\ub2e4\ub9cc, https \ub294 http \uc758 \uc548\uc804\ubc84\uc804\uc785\ub2c8\ub2e4. \uc6f9 \ud2b8\ub798\ud53d\uc744 \uc554\ud638\ud654\ud574\uc8fc\ub294 \uac83\uc774\uc9c0\uc694. \ub54c\ub85c http \ub85c \uc811\uc18d\ud560 \ub54c https \ub85c \uc811\uc18d\uc744 \ud574\ubcf4\uba74 \uc811\uc18d\uc774 \ub418\ub294 \uacbd\uc6b0\uac00 \uc788\uc2b5\ub2c8\ub2e4. \uc704\uc5d0\uc11c \uc0ac\ub840\ub85c \ub4e0 \u2018\ub178\uc2a4\ucf54\ub9ac\uc544\ud14c\ud06c\u2019\uc758 \uacbd\uc6b0\uc5d0\ub3c4, \uc8fc\uc18c\ucc3d\uc5d0 https:\/\/www.northkoreatech.org\/ \ub77c\uace0 \uce58\uc2dc\uba74 \uc0ac\uc774\ud2b8\uc5d0 \uc811\uadfc\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p><img decoding=\"async\" class=\"wp-image-579 alignnone\" src=\"http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/\ub178\uc2a4\ucf54\ub9ac\uc544\ud14c\ud06c-\ud648\ud398\uc774\uc9c0-\uc774\ubbf8\uc9c0.jpg\" alt=\"\ub178\uc2a4\ucf54\ub9ac\uc544\ud14c\ud06c-\ud648\ud398\uc774\uc9c0-\uc774\ubbf8\uc9c0\" width=\"660\" height=\"499\" srcset=\"http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/\ub178\uc2a4\ucf54\ub9ac\uc544\ud14c\ud06c-\ud648\ud398\uc774\uc9c0-\uc774\ubbf8\uc9c0-400x303.jpg 400w, http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/\ub178\uc2a4\ucf54\ub9ac\uc544\ud14c\ud06c-\ud648\ud398\uc774\uc9c0-\uc774\ubbf8\uc9c0-768x581.jpg 768w, http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/\ub178\uc2a4\ucf54\ub9ac\uc544\ud14c\ud06c-\ud648\ud398\uc774\uc9c0-\uc774\ubbf8\uc9c0.jpg 798w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><\/p>\n<p>\uc774\uc640 \uc720\uc0ac\ud55c \ubc29\ubc95\uc740 \ubaa8\ubc14\uc77c \ud398\uc774\uc9c0\ub85c \uc811\uadfc\uc744 \ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uc608\ub97c \ub4e4\uc5b4, http:\/\/twitter.com \ub300\uc2e0 http:\/\/m.twitter.com \uc73c\ub85c \uc811\uc18d\uc744 \ud574\ubcf4\ub294 \uac83\uc785\ub2c8\ub2e4. \uc774\ub7ec\ud55c \ubc29\uc2dd\uc774 \uac00\ub2a5\ud55c \uac83\uc740 \uc6f9 \uc0ac\uc774\ud2b8\ub97c \ucc28\ub2e8\ud558\uae30 \uc704\ud574 \ucc28\ub2e8\ubaa9\ub85d\uc744 \ub9cc\ub4e4\uac8c \ub418\ub294\ub370, \uc774 \ucc28\ub2e8\ubaa9\ub85d\uc5d0 \uc6f9\uc0ac\uc774\ud2b8 \uc8fc\uc18c\uc758 \ub2e4\uc591\ud55c \ubcc0\uc885\uc774 \ud3ec\ud568\ub418\uc9c0 \uc54a\uc558\uc744 \uc218\ub3c4 \uc788\uae30 \ub54c\ubb38\uc785\ub2c8\ub2e4.<\/p>\n<p>\ubb3c\ub860 \uc774\ub807\uac8c \uc811\uadfc \uac00\ub2a5\ud558\uae30 \uc704\ud574\uc11c\ub294 \ucc28\ub2e8\ub41c \uc0ac\uc774\ud2b8\uc5d0\uc11c https \ub098 \ubaa8\ubc14\uc77c \ubc84\uc804 \ub4f1\uc744 \uc81c\uacf5\ud574\uc57c\ub9cc \ud558\uaca0\uc8e0.<\/p>\n<p>&nbsp;<\/p>\n<h2><b>\ud504\ub85d\uc2dc(Proxy)\ub97c \uc774\uc6a9\ud55c \uc6b0\ud68c \uc811\uadfc<br \/>\n<\/b><\/h2>\n<p>\ud504\ub85d\uc2dc\uc640 \uac19\uc740 \uc6b0\ud68c\ub3c4\uad6c\ub97c \uc774\uc6a9\ud560 \uc218\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. \uc6b0\ud68c \ub3c4\uad6c\ub294 \ubcf4\ud1b5 \ub2f9\uc2e0\uc758 \uc6f9 \ud2b8\ub798\ud53d \ub4f1\uc744 \ub2e4\ub978 \ucef4\ud4e8\ud130\ub97c \ud1b5\ud574 \uc804\uc1a1\ub418\ub3c4\ub85d \ud568\uc73c\ub85c\uc368, \uac80\uc5f4\uc744 \uc218\ud589\ud558\ub294 \uc7a5\uce58\ub97c \uc6b0\ud68c\ud569\ub2c8\ub2e4. \uc774 \uacfc\uc815\uc5d0\uc11c \ub2f9\uc2e0\uc758 \ud1b5\uc2e0\uc744 \uc720\ud1b5\ud558\ub294 \uc911\uac04\ub9e4\uac1c \uc11c\ube44\uc2a4\ub97c \u2018\ud504\ub85d\uc2dc\u2019\ub77c\uace0 \ud569\ub2c8\ub2e4. \uc989, \uc911\uac04\uc5d0\uc11c \uc0ac\uc774\ud2b8\ub97c \uc2e4\uc81c \ucc28\ub2e8\ud558\ub294 \ud1b5\uc2e0\uc0ac \uc785\uc7a5\uc5d0\uc11c\ub294 \ub2f9\uc2e0\uc774 \ucc28\ub2e8\ub41c \uc0ac\uc774\ud2b8\uc5d0 \uc811\uadfc\ud558\ub294 \uac83\uc774 \uc544\ub2c8\ub77c, \ud504\ub85d\uc2dc \uc11c\ubc84\uc640 \ud1b5\uc2e0\ud558\ub294 \uac83\uc73c\ub85c \ubcf4\uc774\uaca0\uc9c0\uc694. \uc544\ub798 \uadf8\ub9bc\uc744 \ubcf4\uc2dc\uba74 \uc774\ud574\uac00 \uc26c\uc6b8 \uac83\uc785\ub2c8\ub2e4.<\/p>\n<figure id=\"attachment_55\" aria-describedby=\"caption-attachment-55\" style=\"width: 660px\" class=\"wp-caption alignnone\"><img decoding=\"async\" class=\" wp-image-55\" src=\"http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2015\/07\/3.5_03-1024x565.png\" alt=\"\uc774\ubbf8\uc9c0 \ucd9c\ucc98 : How to Bypass Internet Censorship - http:\/\/flossmanuals.net\/bypassing-censorship\/\" width=\"660\" height=\"364\" srcset=\"http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2015\/07\/3.5_03-400x221.png 400w, http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2015\/07\/3.5_03-1024x565.png 1024w\" sizes=\"(max-width: 660px) 100vw, 660px\" \/><figcaption id=\"caption-attachment-55\" class=\"wp-caption-text\">\uc774\ubbf8\uc9c0 \ucd9c\ucc98 : How to Bypass Internet Censorship &#8211; http:\/\/flossmanuals.net\/bypassing-censorship\/<\/figcaption><\/figure>\n<p>\uac00\uc7a5 \ud3b8\ud55c \ubc29\ubc95\uc740 \uc6f9 \uae30\ubc18 \ud504\ub85d\uc2dc\ub97c \uc774\uc6a9\ud558\ub294 \uac83\uc785\ub2c8\ub2e4. \uacf5\uac1c\ub41c \uc6f9 \uae30\ubc18 \ud504\ub85d\uc2dc\uc5d0 \uc811\uc18d\ud558\uc5ec, \uc5ec\ub7ec\ubd84\uc774 \uc811\uc18d\ud558\uace0 \uc2f6\uc740 \uc0ac\uc774\ud2b8\uc758 \uc8fc\uc18c\ub97c \uce58\uc2dc\uba74 \ub429\ub2c8\ub2e4. \uacf5\uac1c\ub41c \uc6f9 \uae30\ubc18 \ud504\ub85d\uc2dc \ubaa9\ub85d\ub4e4\uc740 http:\/\/proxy.org\/ \uc5d0\uc11c \ubcf4\uc2e4 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc544\ub798\ub294 atozProxy\ub85c \ub178\uc2a4\ucf54\ub9ac\uc544\ud14c\ud06c\ub97c \uc811\uc18d\ud588\uc744 \ub54c\uc758 \ud654\uba74\uc785\ub2c8\ub2e4.<\/p>\n<p><img decoding=\"async\" class=\"wp-image-580 alignnone\" src=\"http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/atozProxy\ub97c-\ud1b5\ud55c-\uc811\uc18d-400x220.jpg\" alt=\"atozProxy\ub97c-\ud1b5\ud55c-\uc811\uc18d\" width=\"671\" height=\"369\" srcset=\"http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/atozProxy\ub97c-\ud1b5\ud55c-\uc811\uc18d-400x220.jpg 400w, http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/atozProxy\ub97c-\ud1b5\ud55c-\uc811\uc18d-768x422.jpg 768w, http:\/\/guide.jinbo.net\/digital-security\/wp-content\/uploads\/sites\/3\/2016\/05\/atozProxy\ub97c-\ud1b5\ud55c-\uc811\uc18d.jpg 798w\" sizes=\"(max-width: 671px) 100vw, 671px\" \/><\/p>\n<p>\ubb3c\ub860 \uba54\uc2e0\uc800 \uc11c\ube44\uc2a4\uc640 \uac19\uc740 \uc6f9 \uc11c\ube44\uc2a4\uac00 \uc544\ub2cc \uc11c\ube44\uc2a4\ub97c \uc774\uc6a9\ud560 \uacbd\uc6b0\uc5d0\ub294 \ub3c4\uc6c0\uc774 \ub418\uc9c0 \uc54a\uaca0\uc8e0. \uadf8\ub9ac\uace0 \uc6f9 \uae30\ubc18 \ud504\ub85d\uc2dc \uc790\uccb4\uac00 \uc774\uc6a9\uc790\uc758 \uc811\uc18d \ub0b4\uc5ed\uc744 \uae30\ub85d\ud558\uae30 \ub54c\ubb38\uc5d0 \uc774\uac83\uc774 \uc6b0\ub824\ub41c\ub2e4\uba74 \uc0ac\uc6a9\ud558\uc9c0 \uc54a\ub294 \uac83\uc774 \uc88b\uaca0\uc2b5\ub2c8\ub2e4. \ud504\ub85d\uc2dc\uc640 \uc720\uc0ac\ud558\uac8c \uc601\ub9ac\/\ube44\uc601\ub9ac\uc801\uc778 \uac00\uc0c1 \uc0ac\uc124 \ub124\ud2b8\uc6cc\ud06c(VPN)\ub77c\ub294 \uac83\ub3c4 \ub3d9\uc77c\ud55c \uae30\ub2a5\uc744 \uc81c\uacf5\ud569\ub2c8\ub2e4.<\/p>\n<p>&nbsp;<\/p>\n<h2><b>\ud1a0\ub974(Tor)<br \/>\n<\/b><\/h2>\n<p>PC \ud639\uc740 \uc2a4\ub9c8\ud2b8\ud3f0\uc5d0\uc11c \ud1a0\ub974 \ube0c\ub77c\uc6b0\uc800\ub97c \uc0ac\uc6a9\ud558\ub294 \ubc29\ubc95\ub3c4 \uc788\uc2b5\ub2c8\ub2e4. \ud1a0\ub974\ub294 \uc774\uc6a9\uc790\uc758 \uc775\uba85\uc131\uc744 \ubcf4\uc7a5\ud558\ub294 \ube0c\ub77c\uc6b0\uc800\uc785\ub2c8\ub2e4. \uc774\uc6a9\uc790\uc758 \ud2b8\ub798\ud53d\uc774 \ubd84\uc0b0\ub41c \uc11c\ubc84 \ub124\ud2b8\uc6cc\ud06c\ub97c \ub3cc\uace0 \ub3cc\uc544\uc11c \uc804\uc1a1\uc774 \ub429\ub2c8\ub2e4. \ubcf4\ud1b5 \uc6f9 \uc0ac\uc774\ud2b8\uc5d0\ub294 \uc5ec\ub7ec \ubd84\ub4e4\uc758 IP \uc8fc\uc18c\uac00 \uae30\ub85d\ub418\ub294\ub370, \ud1a0\ub974\ub97c \uc774\uc6a9\ud558\uba74 \uc5ec\ub7ec \ubd84\ub4e4\uc758 IP \uc8fc\uc18c\ub97c \uc228\uae38 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc989, \ucc28\ub2e8\ub41c \uc0ac\uc774\ud2b8\ub97c \uc811\uadfc\ud560 \ub54c\uc5d0\ub9cc \uc774\uc6a9\ub418\ub294 \uac83\uc774 \uc544\ub2c8\ub77c, \uc790\uc2e0\uc758 IP \uc8fc\uc18c\ub97c \ub0a8\uae30\uace0 \uc2f6\uc9c0 \uc54a\uc744 \ub54c\uc5d0\ub3c4 \uc774\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. \uc989, \uae30\uc5c5\uc774\ub098 \uc815\ubd80\uc758 \uac10\uc2dc\ub85c\ubd80\ud130 \ud53c\ud560 \uc218 \uc788\ub294 \uac83\uc774\uc8e0. \ub2e4\ub9cc, \ud1a0\ub974\ub97c \uc774\uc6a9\ud560 \ub54c \uc57d\uac04 \ub290\ub9b4 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n<p>\ud1a0\ub974\ub97c \uc774\uc6a9\ud558\ub824\uba74 \ud1a0\ub974 \ube0c\ub77c\uc6b0\uc800\ub97c \uc124\uce58\ud574\uc57c \ud558\ub294\ub370, \uc790\uc138\ud55c \uc124\uce58 \ubc29\ubc95\uc740 &lt;<a href=\"http:\/\/guide.jinbo.net\/digital-security\/communication-security\/how-to-use-tor\" target=\"_blank\">\uc708\ub3c4\uc5d0\uc11c \ud1a0\ub974(Tor) \uc0ac\uc6a9\ubc95<\/a>&gt;\uc744 \ucc38\uace0\ud558\uc138\uc694.<\/p>\n<p>\uc704\uc5d0 \uc124\uba85\ud55c \uac83\uc740 \uc9c0\uae08 \uc811\uc18d\ucc28\ub2e8\ub41c \uc0ac\uc774\ud2b8\uc5d0 \uc811\uadfc\ud558\uae30 \uc704\ud55c \ubc29\ubc95\uc774\uc9c0\ub9cc, \uc544\uc608 \ud2b9\uc815 \uc0ac\uc774\ud2b8\uac00 \uc811\uc18d \ucc28\ub2e8\ub418\uc9c0 \uc54a\ub3c4\ub85d, \uc815\ubd80\uc758 \uac80\uc5f4\uc744 \ucca0\ud3d0\ud558\ub294 \uac83\uc774 \uadfc\ubcf8\uc801\uc778 \ud574\uacb0 \ubc29\ubc95\uc774\uaca0\uc9c0\uc694.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; \uc9c0\ub09c 3\uc6d4 24\uc77c, \ubc29\uc1a1\ud1b5\uc2e0\uc2ec\uc758\uc704\uc6d0\ud68c\uac00 \u2018\ub178\uc2a4\ucf54\ub9ac\uc544\ud14c\ud06c\u2019\ub77c\ub294 \uc0ac\uc774\ud2b8\ub294 \uad6d\uac00\ubcf4\uc548\ubc95 \uc704\ubc18\uc73c\ub85c \uc811\uc18d \ucc28\ub2e8\ud588\ub2e4\uace0 \ud569\ub2c8\ub2e4. \uc774 \uc0ac\uc774\ud2b8\ub294 \uc678\uc2e0 \uae30\uc790\uac00 \ubd81\ud55c\uc758 \uc815\ubcf4\ud1b5\uc2e0 \uae30\uc220 \uad00\ub828\ud55c \uc774\uc288\ub97c \uc804\ubb38\uc801\uc73c\ub85c \uc804 \uc138\uacc4\uc5d0 \uc804\ub2ec\ud558\uae30 \uc704\ud574 2010\ub144\ubd80\ud130 6\ub144\uc9f8 \uc6b4\uc601\ud558\uace0 \uc788\ub294 \ud559\uc220, \ubcf4\ub3c4 \ubaa9\uc801\uc758 \uc6f9\uc0ac\uc774\ud2b8\ub77c\uace0 \ud569\ub2c8\ub2e4. \uc774 \uc0ac\uc774\ud2b8\uac00 \uad6d\uac00\ubcf4\uc548\ubc95 \uc704\ubc18\uc778\uc9c0\ub3c4 \uc758\ubb38\uc774\uac70\ub2c8\uc640, \uc124\uc0ac \ubd81\ud55c\uc744 \ucc2c\uc591\ud558\ub294 \ub0b4\uc6a9\uc744 \ud3ec\ud568\ud558\uace0 \uc788\ub2e4\uace0 \ud558\ub354\ub77c\ub3c4, \uc774\ub807\uac8c \ud589\uc815\uae30\uad00\uc774 \uc0ac\ubc95\uc801 \uacb0\uc815\ub3c4 \uc5c6\uc774 \ud2b9\uc815\ud55c \uc0ac\uc774\ud2b8\uc758 \uc811\uadfc\uc744 &hellip;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false,"jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false}}},"categories":[1],"tags":[],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p6uv38-9g","_links":{"self":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/posts\/574"}],"collection":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/comments?post=574"}],"version-history":[{"count":0,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/posts\/574\/revisions"}],"wp:attachment":[{"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/media?parent=574"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/categories?post=574"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/guide.jinbo.net\/digital-security\/wp-json\/wp\/v2\/tags?post=574"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}