{"id":376,"date":"2018-01-22T13:30:22","date_gmt":"2018-01-22T13:30:22","guid":{"rendered":"http:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png"},"modified":"2018-01-22T13:30:38","modified_gmt":"2018-01-22T13:30:38","slug":"virus-network-vulnerabilities","status":"inherit","type":"attachment","link":"https:\/\/learnlearn.uk\/gcsecs\/gcse-computer-science-theory\/virus-network-vulnerabilities\/","title":{"rendered":"virus network vulnerabilities"},"author":1,"comment_status":"open","ping_status":"closed","template":"","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>virus network vulnerabilities - GCSE Computer Science Theory<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"virus network vulnerabilities - GCSE Computer Science Theory\" \/>\n<meta property=\"og:description\" content=\"Topic 10 Network Threats\" \/>\n<meta property=\"og:url\" content=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png\" \/>\n<meta property=\"og:site_name\" content=\"GCSE Computer Science Theory\" \/>\n<meta property=\"article:modified_time\" content=\"2018-01-22T13:30:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png\" \/>\n\t<meta property=\"og:image:width\" content=\"356\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png\",\"name\":\"virus network vulnerabilities - GCSE Computer Science Theory\",\"isPartOf\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\"},\"datePublished\":\"2018-01-22T13:30:22+00:00\",\"dateModified\":\"2018-01-22T13:30:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"OCR GCSE Computer Science Home\",\"item\":\"https:\/\/learnlearn.uk\/gcsecs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"GCSE Computer Science Theory\",\"item\":\"https:\/\/learnlearn.uk\/gcsecs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"virus network vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#website\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"name\":\"GCSE Computer Science Theory\",\"description\":\"Just another My Blog site\",\"publisher\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#organization\",\"name\":\"GCSE Computer Science Theory\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"contentUrl\":\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png\",\"width\":710,\"height\":98,\"caption\":\"GCSE Computer Science Theory\"},\"image\":{\"@id\":\"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"virus network vulnerabilities - GCSE Computer Science Theory","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png","og_locale":"en_GB","og_type":"article","og_title":"virus network vulnerabilities - GCSE Computer Science Theory","og_description":"Topic 10 Network Threats","og_url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png","og_site_name":"GCSE Computer Science Theory","article_modified_time":"2018-01-22T13:30:38+00:00","og_image":[{"width":356,"height":300,"url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png","type":"image\/png"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png","url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png","name":"virus network vulnerabilities - GCSE Computer Science Theory","isPartOf":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#website"},"datePublished":"2018-01-22T13:30:22+00:00","dateModified":"2018-01-22T13:30:38+00:00","breadcrumb":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"OCR GCSE Computer Science Home","item":"https:\/\/learnlearn.uk\/gcsecs\/"},{"@type":"ListItem","position":2,"name":"GCSE Computer Science Theory","item":"https:\/\/learnlearn.uk\/gcsecs\/"},{"@type":"ListItem","position":3,"name":"virus network vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/learnlearn.uk\/gcsecs\/#website","url":"https:\/\/learnlearn.uk\/gcsecs\/","name":"GCSE Computer Science Theory","description":"Just another My Blog site","publisher":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/learnlearn.uk\/gcsecs\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/learnlearn.uk\/gcsecs\/#organization","name":"GCSE Computer Science Theory","url":"https:\/\/learnlearn.uk\/gcsecs\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/","url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","contentUrl":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2019\/02\/LearnLearnLogowhite.png","width":710,"height":98,"caption":"GCSE Computer Science Theory"},"image":{"@id":"https:\/\/learnlearn.uk\/gcsecs\/#\/schema\/logo\/image\/"}}]}},"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png'><img width=\"300\" height=\"253\" src=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities-300x253.png\" class=\"attachment-medium size-medium\" alt=\"\" decoding=\"async\" loading=\"lazy\" srcset=\"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities-300x253.png 300w, https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png 356w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n"},"caption":{"rendered":"<p>Topic 10<br \/>\nNetwork Threats<\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/png","media_details":{"width":356,"height":300,"file":"2017\/01\/virus-network-vulnerabilities.png","sizes":{"thumbnail":{"file":"virus-network-vulnerabilities-150x150.png","width":150,"height":150,"mime_type":"image\/png","source_url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities-150x150.png"},"medium":{"file":"virus-network-vulnerabilities-300x253.png","width":300,"height":253,"mime_type":"image\/png","source_url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities-300x253.png"},"post-thumbnail":{"file":"virus-network-vulnerabilities-300x300.png","width":300,"height":300,"mime_type":"image\/png","source_url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities-300x300.png"},"full":{"file":"virus-network-vulnerabilities.png","width":356,"height":300,"mime_type":"image\/png","source_url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png"}},"image_meta":{"aperture":"0","credit":"","camera":"","caption":"","created_timestamp":"0","copyright":"","focal_length":"0","iso":"0","shutter_speed":"0","title":"","orientation":"0","keywords":[]}},"post":227,"source_url":"https:\/\/learnlearn.uk\/gcsecs\/wp-content\/uploads\/sites\/8\/2017\/01\/virus-network-vulnerabilities.png","_links":{"self":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/media\/376"}],"collection":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/learnlearn.uk\/gcsecs\/wp-json\/wp\/v2\/users\/1"}]}}