{"version":"1.0","provider_name":"Insside PT","provider_url":"https:\/\/www.insside.net\/pt","author_name":"INSSIDE","author_url":"https:\/\/www.insside.net\/pt\/author\/cruiz\/","title":"Protegendo seu mundo digital: conhe\u00e7a e evite rootkits - Insside PT","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"2kz8gkIVcU\"><a href=\"https:\/\/www.insside.net\/pt\/protegendo-seu-mundo-digital-conheca-e-evite-rootkits\/\">Protegendo seu mundo digital: conhe\u00e7a e evite rootkits<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.insside.net\/pt\/protegendo-seu-mundo-digital-conheca-e-evite-rootkits\/embed\/#?secret=2kz8gkIVcU\" width=\"600\" height=\"338\" title=\"&#8220;Protegendo seu mundo digital: conhe\u00e7a e evite rootkits&#8221; &#8212; Insside PT\" data-secret=\"2kz8gkIVcU\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/www.insside.net\/pt\/wp-content\/uploads\/sites\/8\/2024\/01\/Diseno-sin-titulo-2024-01-11T110922.958.png","thumbnail_width":1080,"thumbnail_height":1080,"description":"Na era digital de hoje, a prolifera\u00e7\u00e3o de software malicioso representa uma amea\u00e7a constante \u00e0 seguran\u00e7a cibern\u00e9tica dos nossos dispositivos. Entre estes, os rootkits surgiram como uma preocupa\u00e7\u00e3o s\u00e9ria devido \u00e0 sua capacidade de se infiltrar furtivamente nos sistemas de computador. Rootkits s\u00e3o malware, ou um am\u00e1lgama de ferramentas maliciosas, que permitem que os cibercriminosos [...]"}