{"version":"1.0","provider_name":"Blog KoDDoS","provider_url":"https:\/\/fr.koddos.net\/blog","author_name":"cvssgrpkqsptqz","author_url":"https:\/\/fr.koddos.net\/blog\/author\/cvssgrpkqsptqz\/","title":"Les attaques DDoS expliqu\u00e9es! - Blog KoDDoS","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"aNzjMtV5v1\"><a href=\"https:\/\/fr.koddos.net\/blog\/attaques-ddos-expliquees\/\">Les attaques DDoS expliqu\u00e9es!<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/fr.koddos.net\/blog\/attaques-ddos-expliquees\/embed\/#?secret=aNzjMtV5v1\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Les attaques DDoS expliqu\u00e9es!\u00a0\u00bb &#8212; Blog KoDDoS\" data-secret=\"aNzjMtV5v1\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/fr.koddos.net\/blog\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/i2.wp.com\/fr.koddos.net\/blog\/wp-content\/uploads\/2018\/02\/DDOS-features-image-e1503057270501.png?fit=600%2C400&ssl=1","thumbnail_width":600,"thumbnail_height":400,"description":"Les attaques DDoS expliqu\u00e9es! Je suis s\u00fbr que vous devez avoir entendu le terme attaques DDoS au moins une centaine de fois auparavant, mais peu de gens savent ce que cela signifie r\u00e9ellement. Ici, dans cet article, nous avons essay\u00e9 d&rsquo;expliquer chacun et tout ce qu&rsquo;il y a \u00e0 des attaques DDoS. Alors, commen\u00e7ons. L&rsquo;attaque &hellip; Continue reading"}