{"id":22568,"date":"2023-09-26T10:49:34","date_gmt":"2023-09-26T03:49:34","guid":{"rendered":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg"},"modified":"2023-09-26T10:49:34","modified_gmt":"2023-09-26T03:49:34","slug":"cyber-security-isometric-design-concept-2","status":"inherit","type":"attachment","link":"https:\/\/help.ruk-com.in.th\/lo-la\/topic\/20886\/cyber-security-isometric-design-concept-2\/","title":{"rendered":"Cyber Security Isometric Design Concept"},"author":11,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Isometric Design Concept - Ruk-Com Hosting<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg\" \/>\n<meta property=\"og:locale\" content=\"lo_LA\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Isometric Design Concept - Ruk-Com Hosting\" \/>\n<meta property=\"og:description\" content=\"SSUCv3H4sIAAAAAAACA01Ry07DQAz8FcvnQEG95YZKhcqpAm4VB2djUqub3WgfKVGVf8fbB+rNnpkdj2ZP2FAUg\/UJxdocU6Ak3mH9XCG3knwQslg\/zRXGRClHjqrVzVDiTtnzfjPZnQqONW7uvOJiZWV4eAkJ1SQ3Si9fca5u2i82e+et76Z\/fuX7IScOEefvCqljZ6ZyVu8GtkznFDulDkdV9ddIo7TsLyPlVsqIozdklV+WyBrJ9wXtAg17MUFGDmVvOZpQ7k4NB4hscpA0gUTfcwpiQAXSOTDeGR4SHCXtoSex4jpgN7L1A19QLjDEYTpSYCDXgg6u6IpDhJGNlgr3ZT\/CWpumxjKst5\/nNx\/sWk0iDt63b\/DjQ0+lvfRbCsPq2tzFKy6usTLZRbov0x\/0H+d5\/gMk+4fX5QEAAA==\" \/>\n<meta property=\"og:url\" content=\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg\" \/>\n<meta property=\"og:site_name\" content=\"Ruk-Com Hosting\" \/>\n<meta property=\"og:image\" content=\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg\",\"url\":\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg\",\"name\":\"Cyber Security Isometric Design Concept - Ruk-Com Hosting\",\"isPartOf\":{\"@id\":\"https:\/\/help.ruk-com.in.th\/#website\"},\"datePublished\":\"2023-09-26T03:49:34+00:00\",\"dateModified\":\"2023-09-26T03:49:34+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg#breadcrumb\"},\"inLanguage\":\"lo-LA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/help.ruk-com.in.th\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"\u0e81\u0ea7\u0e94\u0ec0\u0eab\u0eb1\u0e99\u0e8a\u0ec8\u0ead\u0e87\u0ea7\u0ec8\u0eb2\u0e87 SQL Injection \u0ec3\u0e99 WordPress (CVE-2022\u201321661)\",\"item\":\"https:\/\/help.ruk-com.in.th\/lo-la\/topic\/20886\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cyber Security Isometric Design Concept\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/help.ruk-com.in.th\/#website\",\"url\":\"https:\/\/help.ruk-com.in.th\/\",\"name\":\"Ruk-Com Hosting\",\"description\":\"Knowledgebase System\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/help.ruk-com.in.th\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"lo-LA\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Isometric Design Concept - Ruk-Com Hosting","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg","og_locale":"lo_LA","og_type":"article","og_title":"Cyber Security Isometric Design Concept - Ruk-Com Hosting","og_description":"SSUCv3H4sIAAAAAAACA01Ry07DQAz8FcvnQEG95YZKhcqpAm4VB2djUqub3WgfKVGVf8fbB+rNnpkdj2ZP2FAUg\/UJxdocU6Ak3mH9XCG3knwQslg\/zRXGRClHjqrVzVDiTtnzfjPZnQqONW7uvOJiZWV4eAkJ1SQ3Si9fca5u2i82e+et76Z\/fuX7IScOEefvCqljZ6ZyVu8GtkznFDulDkdV9ddIo7TsLyPlVsqIozdklV+WyBrJ9wXtAg17MUFGDmVvOZpQ7k4NB4hscpA0gUTfcwpiQAXSOTDeGR4SHCXtoSex4jpgN7L1A19QLjDEYTpSYCDXgg6u6IpDhJGNlgr3ZT\/CWpumxjKst5\/nNx\/sWk0iDt63b\/DjQ0+lvfRbCsPq2tzFKy6usTLZRbov0x\/0H+d5\/gMk+4fX5QEAAA==","og_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg","og_site_name":"Ruk-Com Hosting","og_image":[{"url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg","width":400,"height":400,"type":"image\/jpeg"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg","url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg","name":"Cyber Security Isometric Design Concept - Ruk-Com Hosting","isPartOf":{"@id":"https:\/\/help.ruk-com.in.th\/#website"},"datePublished":"2023-09-26T03:49:34+00:00","dateModified":"2023-09-26T03:49:34+00:00","breadcrumb":{"@id":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg#breadcrumb"},"inLanguage":"lo-LA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/help.ruk-com.in.th\/"},{"@type":"ListItem","position":2,"name":"\u0e81\u0ea7\u0e94\u0ec0\u0eab\u0eb1\u0e99\u0e8a\u0ec8\u0ead\u0e87\u0ea7\u0ec8\u0eb2\u0e87 SQL Injection \u0ec3\u0e99 WordPress (CVE-2022\u201321661)","item":"https:\/\/help.ruk-com.in.th\/lo-la\/topic\/20886\/"},{"@type":"ListItem","position":3,"name":"Cyber Security Isometric Design Concept"}]},{"@type":"WebSite","@id":"https:\/\/help.ruk-com.in.th\/#website","url":"https:\/\/help.ruk-com.in.th\/","name":"Ruk-Com Hosting","description":"Knowledgebase System","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/help.ruk-com.in.th\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"lo-LA"}]}},"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"200\" height=\"200\" src=\"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg\" class=\"attachment-medium size-medium\" alt=\"\" \/><\/a><\/p>\n"},"caption":{"rendered":"<p>SSUCv3H4sIAAAAAAACA01Ry07DQAz8FcvnQEG95YZKhcqpAm4VB2djUqub3WgfKVGVf8fbB+rNnpkdj2ZP2FAUg\/UJxdocU6Ak3mH9XCG3knwQslg\/zRXGRClHjqrVzVDiTtnzfjPZnQqONW7uvOJiZWV4eAkJ1SQ3Si9fca5u2i82e+et76Z\/fuX7IScOEefvCqljZ6ZyVu8GtkznFDulDkdV9ddIo7TsLyPlVsqIozdklV+WyBrJ9wXtAg17MUFGDmVvOZpQ7k4NB4hscpA0gUTfcwpiQAXSOTDeGR4SHCXtoSex4jpgN7L1A19QLjDEYTpSYCDXgg6u6IpDhJGNlgr3ZT\/CWpumxjKst5\/nNx\/sWk0iDt63b\/DjQ0+lvfRbCsPq2tzFKy6usTLZRbov0x\/0H+d5\/gMk+4fX5QEAAA==<\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":4001,"height":4001,"file":"2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg","filesize":2107797,"sizes":{},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"SSUCv3H4sIAAAAAAACA01Ry07DQAz8FcvnQEG95YZKhcqpAm4VB2djUqub3WgfKVGVf8fbB+rNnpkdj2ZP2FAUg\/UJxdocU6Ak3mH9XCG3knwQslg\/zRXGRClHjqrVzVDiTtnzfjPZnQqONW7uvOJiZWV4eAkJ1SQ3Si9fca5u2i82e+et76Z\/fuX7IScOEefvCqljZ6ZyVu8GtkznFDulDkdV9ddIo7TsLyPlVsqIozdklV+WyBrJ9wXtAg17MUFGDmVvOZpQ7k4NB4hscpA0gUTfcwpiQAXSOTDeGR4SHCXtoSex4jpgN7L1A19QLjDEYTpSYCDXgg6u6IpDhJGNlgr3ZT\/CWpumxjKst5\/nNx\/sWk0iDt63b\/DjQ0+lvfRbCsPq2tzFKy6usTLZRbov0x\/0H+d5\/gMk+4fX5QEAAA==","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"Cyber Security Isometric Design Concept","orientation":"0","keywords":["spyware","internet","web","network","password","biometric","id","identification","information","data","fingerprint","app","identify","unlock","touchscreen","secure","access","lock","code","unique","touch","check","software","control","smartphone","protection","smart","cyber","threats","encryption","email","virus","attack","password","notification","encryption","ddos","anonymous","hacking","attack","hacker","design","creative","decorative","icons","vector","illustration","graphic","3d","isometric"]}},"post":20886,"source_url":"https:\/\/help.ruk-com.in.th\/wp-content\/uploads\/2022\/01\/2007.i039.024.cyber-security-spyware-data-protection-isometric.jpg","_links":{"self":[{"href":"https:\/\/help.ruk-com.in.th\/lo-la\/wp-json\/wp\/v2\/media\/22568"}],"collection":[{"href":"https:\/\/help.ruk-com.in.th\/lo-la\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/help.ruk-com.in.th\/lo-la\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/help.ruk-com.in.th\/lo-la\/wp-json\/wp\/v2\/users\/11"}]}}