{"id":136,"date":"2022-10-16T02:25:28","date_gmt":"2022-10-16T00:25:28","guid":{"rendered":"https:\/\/drupalpro.dk\/?p=136"},"modified":"2023-02-28T16:15:23","modified_gmt":"2023-02-28T15:15:23","slug":"saadan-kan-computere-programmeres-til-kriminelle-formaal","status":"publish","type":"post","link":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/","title":{"rendered":"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l"},"content":{"rendered":"<center><img decoding=\"async\" src=\"https:\/\/drupalpro.dk\/wp-content\/plugins\/Disclaimer\/disclaimer2.jpg\" style=\"margin-top: 20px; height: 60px; width: auto;\"><\/center><p><span style=\"font-weight: 400;\">Et botnet (forkortelse for &#8220;robotnetv\u00e6rk&#8221;) er et netv\u00e6rk af computere inficeret med malware, som er under kontrol af en part, kendt som &#8220;bot-herder&#8221;. Hver enkelt computer kaldes en bot.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fra \u00e9t centralt punkt kan den kontrollerende part f\u00e5 hver computer p\u00e5 botnettet til samtidig at udf\u00f8re en koordineret kriminel handling. Omfanget af et botnet, som ofte best\u00e5r af millioner af bots, g\u00f8r det muligt for bot-herderen at udf\u00f8re handlinger i en stor skala.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Da botnets forbliver under kontrol af en bot-herderen, kan inficerede enheder modtage opdateringer og \u00e6ndre deres adf\u00e6rd l\u00f8bende. Som et resultat heraf er andre parter ofte i stand til at leje adgang til dele af et botnet p\u00e5 the dark web.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">\u00a0<\/span><\/h2>\n<h2><span style=\"font-weight: 400;\">Almindelige botnet-handlinger<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Kriminelle handlinger udf\u00f8rt med botnets inkluderer:<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211;<\/span><span style=\"font-weight: 400;\"> \u00a0 <\/span> <b>E-mail-spam:<\/b><span style=\"font-weight: 400;\"> Selvom e-mail i dag ses som en \u00e6ldre vektor for angreb, er spam-botnet nogle af de st\u00f8rste i st\u00f8rrelse. De bruges prim\u00e6rt til at udsende spam-beskeder, ofte inklusive malware, i massevis fra hver bot. Et kendt botnet kaldet Cutwail-botnettet kan for eksempel sende op til 74 milliarder meddelelser om dagen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211;<\/span><span style=\"font-weight: 400;\"> \u00a0 <\/span> <b>DDoS-angreb:<\/b><span style=\"font-weight: 400;\"> Her bruges botnettets massive skala til at overbelaste et netv\u00e6rk eller server med anmodninger, hvilket g\u00f8r det utilg\u00e6ngeligt for dets tilsigtede brugere. DDoS-angreb retter sig ofte mod organisationer med politiske motiver eller mod store organisationer for at afpresse dem.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211;<\/span><span style=\"font-weight: 400;\"> \u00a0 <\/span> <b>Finansielle brud: <\/b><span style=\"font-weight: 400;\">De omfatter botnets, der er specielt designet til direkte tyveri af penge og kreditkortoplysninger fra virksomheder. Finansielle botnets, ligesom ZeuS botnettet, har v\u00e6ret ansvarlige for angreb, der involverer millioner af dollars stj\u00e5let direkte fra flere virksomheder over meget korte perioder.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">&#8211;<\/span><span style=\"font-weight: 400;\"> \u00a0 <\/span> <b>M\u00e5lrettet adgang:<\/b><span style=\"font-weight: 400;\"> Her anvendes mindre botnets designet til at kompromittere specifikke h\u00f8jv\u00e6rdisystemer i organisationer, hvorfra hackere kan tr\u00e6nge ind i netv\u00e6rket. Denne indtr\u00e6ngen er ekstremt farlig for organisationer, da hackere specifikt g\u00e5r efter deres mest v\u00e6rdifulde aktiver, herunder finansielle data, forskning, og kundeoplysninger.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">S\u00e5dan fungerer botnets<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Botnets oprettes, n\u00e5r bot-herderen sender botten fra sine kommando- og kontrolservere til en uvidende modtager ved hj\u00e6lp af fildeling, e-mail eller applikationsprotokoller til sociale medier eller andre bots som mellemmand.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">N\u00e5r modtageren \u00e5bner det ondsindede indhold p\u00e5 sin computer, rapporterer botten tilbage til kommandocentralen, hvor bot-herderen kan diktere kommandoer til den inficerede computer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">En r\u00e6kke unikke funktionelle tr\u00e6k ved bots og botnets g\u00f8r dem velegnede til langsigtede angreb. Bots kan opdateres af bot-herderen for at \u00e6ndre hele deres funktionalitet og tilpasse sig \u00e6ndringer og modforanstaltninger fra m\u00e5lsystemet. Bots kan ogs\u00e5 bruge andre inficerede computere p\u00e5 botnettet som kommunikationskanaler, hvilket giver bot-herderen et n\u00e6sten uendeligt antal kommunikationsveje til at tilpasse sig skiftende muligheder og levere opdateringer.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Som en af \u200b\u200bde mest sofistikerede typer af moderne malware er botnets et enormt cybersikkerhedsproblem for regeringer, virksomheder og enkeltpersoner. Hvor tidligere malware var en sv\u00e6rm af uafh\u00e6ngige agenter, der p\u00e5 simpel vis inficerede og replikerede sig selv, er botnets centralt koordinerede netv\u00e6rksapplikationer, der udnytter netv\u00e6rk til at skabe kraft. Da de inficerede computere er under kontrol af den eksterne bot-herder, er et botnet som at have en hacker inde i dit netv\u00e6rk i mods\u00e6tning til blot et ondsindet eksekverbart program.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Afsluttende tanker<\/span><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Vil du beskytte din organisation mod botnets og andre cybertrusler? Anvend <\/span><a href=\"https:\/\/moxso.com\/da-dk\/training\"><span style=\"font-weight: 400;\">effektiv awareness-tr\u00e6ning til alle ansatte<\/span><\/a><span style=\"font-weight: 400;\"> og skab en st\u00e6rk cybersikkehedskultur.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Et botnet (forkortelse for &#8220;robotnetv\u00e6rk&#8221;) er et netv\u00e6rk af computere inficeret med malware, som er under kontrol af en part, kendt som &#8220;bot-herder&#8221;. Hver enkelt&hellip;<\/p>\n","protected":false},"author":1,"featured_media":137,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-136","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-artikler"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>S\u00e5dan kan computere programmeres til kriminelle form\u00e5l - Drupalpro.dk<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/\" \/>\n<meta property=\"og:locale\" content=\"da_DK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l - Drupalpro.dk\" \/>\n<meta property=\"og:description\" content=\"Et botnet (forkortelse for &#8220;robotnetv\u00e6rk&#8221;) er et netv\u00e6rk af computere inficeret med malware, som er under kontrol af en part, kendt som &#8220;bot-herder&#8221;. Hver enkelt&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/\" \/>\n<meta property=\"og:site_name\" content=\"Drupalpro.dk\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-16T00:25:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-02-28T15:15:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/drupalpro.dk\/wp-content\/uploads\/2022\/09\/pexels-tima-miroshnichenko-5380792.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"ad-mi-nist\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Skrevet af\" \/>\n\t<meta name=\"twitter:data1\" content=\"ad-mi-nist\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimeret l\u00e6setid\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutter\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/\"},\"author\":{\"name\":\"ad-mi-nist\",\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/#\\\/schema\\\/person\\\/ba8a819091b77c86f313d0945a0db62b\"},\"headline\":\"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l\",\"datePublished\":\"2022-10-16T00:25:28+00:00\",\"dateModified\":\"2023-02-28T15:15:23+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/\"},\"wordCount\":575,\"image\":{\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drupalpro.dk\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/pexels-tima-miroshnichenko-5380792.jpg\",\"articleSection\":[\"Artikler\"],\"inLanguage\":\"da-DK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/\",\"url\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/\",\"name\":\"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l - Drupalpro.dk\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/drupalpro.dk\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/pexels-tima-miroshnichenko-5380792.jpg\",\"datePublished\":\"2022-10-16T00:25:28+00:00\",\"dateModified\":\"2023-02-28T15:15:23+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/#\\\/schema\\\/person\\\/ba8a819091b77c86f313d0945a0db62b\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/#breadcrumb\"},\"inLanguage\":\"da-DK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/#primaryimage\",\"url\":\"https:\\\/\\\/drupalpro.dk\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/pexels-tima-miroshnichenko-5380792.jpg\",\"contentUrl\":\"https:\\\/\\\/drupalpro.dk\\\/wp-content\\\/uploads\\\/2022\\\/09\\\/pexels-tima-miroshnichenko-5380792.jpg\",\"width\":1280,\"height\":853},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/2022\\\/10\\\/16\\\/saadan-kan-computere-programmeres-til-kriminelle-formaal\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Hjem\",\"item\":\"https:\\\/\\\/drupalpro.dk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/#website\",\"url\":\"https:\\\/\\\/drupalpro.dk\\\/\",\"name\":\"Drupalpro.dk\",\"description\":\"Artikler om tech, business og programmering\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/drupalpro.dk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"da-DK\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/drupalpro.dk\\\/#\\\/schema\\\/person\\\/ba8a819091b77c86f313d0945a0db62b\",\"name\":\"ad-mi-nist\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"da-DK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/23ebca78386d3eb9ba9b8e7cd445035f2d8398ba87d93e01e4cc8e85b5bd1aef?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/23ebca78386d3eb9ba9b8e7cd445035f2d8398ba87d93e01e4cc8e85b5bd1aef?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/23ebca78386d3eb9ba9b8e7cd445035f2d8398ba87d93e01e4cc8e85b5bd1aef?s=96&d=mm&r=g\",\"caption\":\"ad-mi-nist\"},\"sameAs\":[\"https:\\\/\\\/drupalpro.dk\"],\"url\":\"https:\\\/\\\/drupalpro.dk\\\/index.php\\\/author\\\/ad-mi-nist\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l - Drupalpro.dk","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/","og_locale":"da_DK","og_type":"article","og_title":"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l - Drupalpro.dk","og_description":"Et botnet (forkortelse for &#8220;robotnetv\u00e6rk&#8221;) er et netv\u00e6rk af computere inficeret med malware, som er under kontrol af en part, kendt som &#8220;bot-herder&#8221;. Hver enkelt&hellip;","og_url":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/","og_site_name":"Drupalpro.dk","article_published_time":"2022-10-16T00:25:28+00:00","article_modified_time":"2023-02-28T15:15:23+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/drupalpro.dk\/wp-content\/uploads\/2022\/09\/pexels-tima-miroshnichenko-5380792.jpg","type":"image\/jpeg"}],"author":"ad-mi-nist","twitter_card":"summary_large_image","twitter_misc":{"Skrevet af":"ad-mi-nist","Estimeret l\u00e6setid":"3 minutter"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/#article","isPartOf":{"@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/"},"author":{"name":"ad-mi-nist","@id":"https:\/\/drupalpro.dk\/#\/schema\/person\/ba8a819091b77c86f313d0945a0db62b"},"headline":"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l","datePublished":"2022-10-16T00:25:28+00:00","dateModified":"2023-02-28T15:15:23+00:00","mainEntityOfPage":{"@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/"},"wordCount":575,"image":{"@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/#primaryimage"},"thumbnailUrl":"https:\/\/drupalpro.dk\/wp-content\/uploads\/2022\/09\/pexels-tima-miroshnichenko-5380792.jpg","articleSection":["Artikler"],"inLanguage":"da-DK"},{"@type":"WebPage","@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/","url":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/","name":"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l - Drupalpro.dk","isPartOf":{"@id":"https:\/\/drupalpro.dk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/#primaryimage"},"image":{"@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/#primaryimage"},"thumbnailUrl":"https:\/\/drupalpro.dk\/wp-content\/uploads\/2022\/09\/pexels-tima-miroshnichenko-5380792.jpg","datePublished":"2022-10-16T00:25:28+00:00","dateModified":"2023-02-28T15:15:23+00:00","author":{"@id":"https:\/\/drupalpro.dk\/#\/schema\/person\/ba8a819091b77c86f313d0945a0db62b"},"breadcrumb":{"@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/#breadcrumb"},"inLanguage":"da-DK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/"]}]},{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/#primaryimage","url":"https:\/\/drupalpro.dk\/wp-content\/uploads\/2022\/09\/pexels-tima-miroshnichenko-5380792.jpg","contentUrl":"https:\/\/drupalpro.dk\/wp-content\/uploads\/2022\/09\/pexels-tima-miroshnichenko-5380792.jpg","width":1280,"height":853},{"@type":"BreadcrumbList","@id":"https:\/\/drupalpro.dk\/index.php\/2022\/10\/16\/saadan-kan-computere-programmeres-til-kriminelle-formaal\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Hjem","item":"https:\/\/drupalpro.dk\/"},{"@type":"ListItem","position":2,"name":"S\u00e5dan kan computere programmeres til kriminelle form\u00e5l"}]},{"@type":"WebSite","@id":"https:\/\/drupalpro.dk\/#website","url":"https:\/\/drupalpro.dk\/","name":"Drupalpro.dk","description":"Artikler om tech, business og programmering","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/drupalpro.dk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"da-DK"},{"@type":"Person","@id":"https:\/\/drupalpro.dk\/#\/schema\/person\/ba8a819091b77c86f313d0945a0db62b","name":"ad-mi-nist","image":{"@type":"ImageObject","inLanguage":"da-DK","@id":"https:\/\/secure.gravatar.com\/avatar\/23ebca78386d3eb9ba9b8e7cd445035f2d8398ba87d93e01e4cc8e85b5bd1aef?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/23ebca78386d3eb9ba9b8e7cd445035f2d8398ba87d93e01e4cc8e85b5bd1aef?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/23ebca78386d3eb9ba9b8e7cd445035f2d8398ba87d93e01e4cc8e85b5bd1aef?s=96&d=mm&r=g","caption":"ad-mi-nist"},"sameAs":["https:\/\/drupalpro.dk"],"url":"https:\/\/drupalpro.dk\/index.php\/author\/ad-mi-nist\/"}]}},"_links":{"self":[{"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/posts\/136","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/comments?post=136"}],"version-history":[{"count":1,"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/posts\/136\/revisions"}],"predecessor-version":[{"id":138,"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/posts\/136\/revisions\/138"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/media\/137"}],"wp:attachment":[{"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/media?parent=136"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/categories?post=136"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/drupalpro.dk\/index.php\/wp-json\/wp\/v2\/tags?post=136"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}