{"id":19874,"date":"2022-03-25T00:32:56","date_gmt":"2022-03-24T17:32:56","guid":{"rendered":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies.jpg"},"modified":"2022-03-25T00:32:56","modified_gmt":"2022-03-24T17:32:56","slug":"network-safety-concept-internet-security-technologies-2","status":"inherit","type":"attachment","link":"https:\/\/help.ruk-com.in.th\/lo-la\/network-safety-concept-internet-security-technologies-2\/","title":{"rendered":"Network Safety Concept. Internet Security Technologies."},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Network Safety Concept. Internet Security Technologies. - Ruk-Com Hosting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg\" \/>\n<meta property=\"og:locale\" content=\"lo_LA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Network Safety Concept. Internet Security Technologies. - Ruk-Com Hosting\" \/>\n<meta property=\"og:description\" content=\"Network Safety Concept. Internet Security Technologies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg\" \/>\n<meta property=\"og:site_name\" content=\"Ruk-Com Hosting\" \/>\n<meta property=\"og:image\" content=\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg\",\"url\":\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg\",\"name\":\"Network Safety Concept. Internet Security Technologies. - Ruk-Com Hosting\",\"isPartOf\":{\"@id\":\"https:\/\/help.ruk-com.in.th\/#website\"},\"datePublished\":\"2022-03-24T17:32:56+00:00\",\"dateModified\":\"2022-03-24T17:32:56+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg#breadcrumb\"},\"inLanguage\":\"lo-LA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/help.ruk-com.in.th\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Network Safety Concept. Internet Security Technologies.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/help.ruk-com.in.th\/#website\",\"url\":\"https:\/\/help.ruk-com.in.th\/\",\"name\":\"Ruk-Com Hosting\",\"description\":\"Knowledgebase System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/help.ruk-com.in.th\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lo-LA\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Network Safety Concept. Internet Security Technologies. - Ruk-Com Hosting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg","og_locale":"lo_LA","og_type":"article","og_title":"Network Safety Concept. Internet Security Technologies. - Ruk-Com Hosting","og_description":"Network Safety Concept. Internet Security Technologies.","og_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg","og_site_name":"Ruk-Com Hosting","og_image":[{"width":2560,"height":1707,"url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg","url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg","name":"Network Safety Concept. Internet Security Technologies. - Ruk-Com Hosting","isPartOf":{"@id":"https:\/\/help.ruk-com.in.th\/#website"},"datePublished":"2022-03-24T17:32:56+00:00","dateModified":"2022-03-24T17:32:56+00:00","breadcrumb":{"@id":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg#breadcrumb"},"inLanguage":"lo-LA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/help.ruk-com.in.th\/"},{"@type":"ListItem","position":2,"name":"Network Safety Concept. Internet Security Technologies."}]},{"@type":"WebSite","@id":"https:\/\/help.ruk-com.in.th\/#website","url":"https:\/\/help.ruk-com.in.th\/","name":"Ruk-Com Hosting","description":"Knowledgebase System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/help.ruk-com.in.th\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lo-LA"}]}},"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-300x200.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-300x200.jpg 300w, https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-600x400.jpg 600w, https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-768x512.jpg 768w, https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-1536x1024.jpg 1536w, https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-2048x1365.jpg 2048w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n"},"caption":{"rendered":"<p>Network Safety Concept. Internet Security Technologies.<\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":2560,"height":1707,"file":"2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg","sizes":{"medium":{"file":"network-safety-concept-internet-security-technologies-300x200.jpg","width":300,"height":200,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-300x200.jpg"},"large":{"file":"network-safety-concept-internet-security-technologies-600x400.jpg","width":600,"height":400,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-600x400.jpg"},"thumbnail":{"file":"network-safety-concept-internet-security-technologies-267x133.jpg","width":267,"height":133,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-267x133.jpg"},"medium_large":{"file":"network-safety-concept-internet-security-technologies-768x512.jpg","width":768,"height":512,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-768x512.jpg"},"1536x1536":{"file":"network-safety-concept-internet-security-technologies-1536x1024.jpg","width":1536,"height":1024,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-1536x1024.jpg"},"2048x2048":{"file":"network-safety-concept-internet-security-technologies-2048x1365.jpg","width":2048,"height":1365,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-2048x1365.jpg"},"blog-thumb":{"file":"network-safety-concept-internet-security-technologies-150x120.jpg","width":150,"height":120,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-150x120.jpg"},"event-list":{"file":"network-safety-concept-internet-security-technologies-420x336.jpg","width":420,"height":336,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-420x336.jpg"},"event-single-type1":{"file":"network-safety-concept-internet-security-technologies-773x520.jpg","width":773,"height":520,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-773x520.jpg"},"event-single-type4":{"file":"network-safety-concept-internet-security-technologies-570x460.jpg","width":570,"height":460,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-570x460.jpg"},"event-single-type5":{"file":"network-safety-concept-internet-security-technologies-746x770.jpg","width":746,"height":770,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-746x770.jpg"},"event-list2":{"file":"network-safety-concept-internet-security-technologies-420x275.jpg","width":420,"height":275,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-420x275.jpg"},"full":{"file":"network-safety-concept-internet-security-technologies-scaled.jpg","width":2560,"height":1707,"mime_type":"image\/jpeg","source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg"}},"image_meta":{"aperture":"5.6","credit":"Alexander Yakimov Nickolaevich","camera":"Canon EOS 77D","caption":"Network Safety Concept. Internet Security Technologies.","created_timestamp":"1536394478","copyright":"Alexander Yakimov Nickolaevich","focal_length":"85","iso":"100","shutter_speed":"0.3","title":"Network Safety Concept. Internet Security Technologies.","orientation":"0","keywords":["ssl","data","password","network","protect","access","internet","technology","padlock","digital","web","abstract","website","icon","background","lock","information","protection","safe","login","online","hacker","locker","cyber","server","privacy","attack","code","coding","database","hacking","horizontal","illustration","key","networking","system","businessman","certificate","concept","https","sign","symbol","secure","address","administrator","center","communication","computer","connect","design"]},"original_image":"network-safety-concept-internet-security-technologies.jpg"},"post":null,"source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/network-safety-concept-internet-security-technologies-scaled.jpg","_links":{"self":[{"href":"https:\/\/help.ruk-com.in.th\/lo-la\/wp-json\/wp\/v2\/media\/19874"}],"collection":[{"href":"https:\/\/help.ruk-com.in.th\/lo-la\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/help.ruk-com.in.th\/lo-la\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/help.ruk-com.in.th\/lo-la\/wp-json\/wp\/v2\/users\/1"}]}}