{"version":"1.0","provider_name":"Les aventures de Jos\u00e9 ...","provider_url":"https:\/\/joselinformatique.obip.fr","author_name":"pierre","author_url":"https:\/\/joselinformatique.obip.fr\/index.php\/author\/pierre\/","title":"La faille est dans le journal - Les aventures de Jos\u00e9 ...","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"0jEDNMyoDa\"><a href=\"https:\/\/joselinformatique.obip.fr\/index.php\/2022\/01\/02\/la-faille-est-dans-le-journal\/\">La faille est dans le journal<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/joselinformatique.obip.fr\/index.php\/2022\/01\/02\/la-faille-est-dans-le-journal\/embed\/#?secret=0jEDNMyoDa\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0La faille est dans le journal\u00a0\u00bb &#8212; Les aventures de Jos\u00e9 ...\" data-secret=\"0jEDNMyoDa\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/joselinformatique.obip.fr\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/joselinformatique.obip.fr\/wp-content\/uploads\/2019\/11\/pexels-photo-261909.jpg","thumbnail_width":1820,"thumbnail_height":1300,"description":"Au d\u00e9part, cela commence toujours par un myst\u00e8re. Comment ont-ils fait pour obtenir des privil\u00e8ges que seul l\u2019administrateur peut accorder ? Le RSSI est confus. Aucun journal ne signale la moindre intrusion. Les derniers patches sont install\u00e9s. Les sites ne r\u00e9f\u00e9rencent aucune attaque. Il ne peut s\u2019agir que d\u2019une erreur d\u2019un coll\u00e8gue. Pourtant, cela intrigue. [&hellip;]"}