{"id":136,"date":"2010-01-26T06:15:29","date_gmt":"2010-01-26T11:15:29","guid":{"rendered":"http:\/\/zitstif.no-ip.org\/?p=136"},"modified":"2010-01-26T06:15:29","modified_gmt":"2010-01-26T11:15:29","slug":"136","status":"publish","type":"post","link":"http:\/\/zitstif.no-ip.org\/?p=136","title":{"rendered":""},"content":{"rendered":"<p><object width=\"400\" height=\"300\" data=\"http:\/\/media.ccc.de\/js\/flowplayer-3.1.3.swf\" type=\"application\/x-shockwave-flash\"><param name=\"movie\" value=\"http:\/\/media.ccc.de\/js\/flowplayer-3.1.3.swf\" \/><param name=\"allowfullscreen\" value=\"true\" \/><param name=\"allowscriptaccess\" value=\"always\" \/><param name=\"flashvars\" value=\"config={'playlist':[{'url':'http:\/\/media.ccc.de\/media\/congress\/2009\/26c3-3596-de-cat_procsysnetipv4fuckups_preview.jpg'},{'autoPlay':false,'autoBuffering':false,'accelerated':true,'scaling':'fit','provider':'pseudo','url':'http:\/\/ftp.ccc.de\/congress\/2009\/mp4\/26c3-3596-de-cat_procsysnetipv4fuckups.mp4'}],'plugins':{'pseudo':{'url':'flowplayer.pseudostreaming-3.1.3.swf'},'controls':{'url':'flowplayer.controls-3.1.3.swf','bottom':0,'height':24,'zIndex':1,'timeFontColor':'#ffffff','progressColor':'0x619ab2','bufferColor':'0x17446e','backgroundColor':'transparent','autoHide':'always','mute':false}},'clip':{}}\" \/><\/object><\/p>\n<p>A very informal video that sheds new light on network architecture weaknesses that can be exploited.<\/p>\n<p><a title=\"ftp:\/\/ftp.ccc.de\/congress\/26c3\/mp4\/26c3-3596-de-cat_procsysnetipv4fuckups.mp4\" href=\"ftp:\/\/ftp.ccc.de\/congress\/26c3\/mp4\/26c3-3596-de-cat_procsysnetipv4fuckups.mp4\" target=\"_blank\"><br \/>\n<\/a><\/p>\n<p>You can download the whole file here:<\/p>\n<p><a title=\"ftp:\/\/ftp.ccc.de\/congress\/26c3\/mp4\/26c3-3596-de-cat_procsysnetipv4fuckups.mp4\" href=\"ftp:\/\/ftp.ccc.de\/congress\/26c3\/mp4\/26c3-3596-de-cat_procsysnetipv4fuckups.mp4\" target=\"_blank\">ftp:\/\/ftp.ccc.de\/congress\/26c3\/mp4\/26c3-3596-de-cat_procsysnetipv4fuckups.mp4<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A very informal video that sheds new light on network architecture weaknesses that can be exploited. You can download the whole file here: ftp:\/\/ftp.ccc.de\/congress\/26c3\/mp4\/26c3-3596-de-cat_procsysnetipv4fuckups.mp4<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,16],"tags":[22],"class_list":["post-136","post","type-post","status-publish","format-standard","hentry","category-posts","category-videos","tag-cat-procsysnetipv4fkups"],"_links":{"self":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=136"}],"version-history":[{"count":6,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/136\/revisions"}],"predecessor-version":[{"id":142,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=\/wp\/v2\/posts\/136\/revisions\/142"}],"wp:attachment":[{"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=136"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/zitstif.no-ip.org\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}