{"id":4408,"date":"2020-10-30T21:01:22","date_gmt":"2020-10-30T20:01:22","guid":{"rendered":"https:\/\/webhosting.de\/?p=4408"},"modified":"2021-12-27T20:35:51","modified_gmt":"2021-12-27T19:35:51","slug":"menedzer-hasel-bring-order-ins-password-chaos","status":"publish","type":"post","link":"https:\/\/webhosting.de\/pl\/passwortmanager-bringen-ordnung-ins-passwortchaos\/","title":{"rendered":"Mened\u017cerowie hase\u0142 wprowadzaj\u0105 porz\u0105dek do chaosu hase\u0142"},"content":{"rendered":"<p>Aby zapewni\u0107 sta\u0142e bezpiecze\u0144stwo, nale\u017cy zawsze u\u017cywa\u0107 z\u0142o\u017conych i przede wszystkim regularnie zmienianych hase\u0142 do kont e-mail lub dost\u0119pu online. Jednak wiele os\u00f3b jest przyt\u0142oczonych zadaniem pami\u0119tania wszystkich hase\u0142. Mened\u017cer hase\u0142 powinien rozwi\u0105za\u0107 ten problem.<\/p>\n<h2>Co tak naprawd\u0119 robi\u0105 mened\u017cerowie hase\u0142?<\/h2>\n<p>Mened\u017cery hase\u0142 s\u0142u\u017c\u0105 do przechowywania i zarz\u0105dzania r\u00f3\u017cnymi has\u0142ami i danymi dost\u0119powymi (np. do kont e-mail lub dost\u0119pu do sklep\u00f3w internetowych). Przechowywanie odbywa si\u0119 w zaszyfrowanym <a href=\"https:\/\/webhosting.de\/pl\/datenbank-server\/\">Baza danych<\/a>w celu zapewnienia wystarczaj\u0105cego bezpiecze\u0144stwa. Bazy danych wykorzystuj\u0105 r\u00f3\u017cne algorytmy szyfrowania. Popularnym algorytmem szyfrowania jest \"Twofish\". Wiele mened\u017cer\u00f3w hase\u0142 dzia\u0142a w oparciu o ten algorytm. Ponadto, wiele innych program\u00f3w u\u017cywa podobnego lub takiego samego formatu bazy danych. Baza danych utworzona przez program jest przechowywana na dysku twardym komputera. Aby uzyska\u0107 dost\u0119p do bazy danych, musisz poda\u0107 has\u0142o g\u0142\u00f3wne, kt\u00f3re jest nazywane has\u0142em g\u0142\u00f3wnym. Zamiast wi\u0119c zapami\u0119tywa\u0107 mn\u00f3stwo hase\u0142, przy korzystaniu z mened\u017cera hase\u0142 wystarczy zapami\u0119ta\u0107 jedno has\u0142o. Po wprowadzeniu has\u0142a g\u0142\u00f3wnego uzyskujecie Pa\u0144stwo dost\u0119p do bazy danych z zapisanymi has\u0142ami dla poszczeg\u00f3lnych dost\u0119p\u00f3w u\u017cytkownik\u00f3w lub kont u\u017cytkownik\u00f3w.<\/p>\n<h2>Aby skorzysta\u0107 z mened\u017cera hase\u0142<\/h2>\n<p>Aby zachowa\u0107 przegl\u0105d, wpisy poszczeg\u00f3lnych kont u\u017cytkownik\u00f3w i ich dane dost\u0119powe mo\u017cna organizowa\u0107 wed\u0142ug r\u00f3\u017cnych kategorii. Na przyk\u0142ad, mo\u017cliwe jest sortowanie wpis\u00f3w wed\u0142ug kont e-mail, kont bankowo\u015bci internetowej i kont dla r\u00f3\u017cnych sklep\u00f3w internetowych i zapisywanie ich w bazie danych. Je\u015bli teraz chcesz zalogowa\u0107 si\u0119 na przyk\u0142ad na konto klienta w sklepie internetowym, najpierw otwierasz baz\u0119 danych z zapisanymi has\u0142ami za pomoc\u0105 has\u0142a g\u0142\u00f3wnego. Nast\u0119pnie nale\u017cy skopiowa\u0107 zapisane tam has\u0142o z bazy danych i wklei\u0107 je do odpowiedniego pola wprowadzania w dost\u0119pie do sklepu internetowego. W przypadku wielu program\u00f3w proces ten mo\u017cna nawet upro\u015bci\u0107, klikaj\u0105c odpowiednie \u0142\u0105cza w sklepie internetowym. Odpowiednie pola dla <a href=\"https:\/\/webhosting.de\/pl\/benutzernamen-in-wordpress-nachtraeglich-aendern\/\">Nazwy u\u017cytkownik\u00f3w<\/a> a tak\u017ce has\u0142o dost\u0119pu online mo\u017cna wprowadzi\u0107 nawet z niezb\u0119dnym <a href=\"https:\/\/webhosting.de\/pl\/personenbezogene-daten-sozialen-netzwerken\/\">Dane<\/a> zostan\u0105 wype\u0142nione automatycznie. W celu otwarcia dost\u0119pu do sklepu internetowego lub innej aplikacji chronionej has\u0142em, w przysz\u0142o\u015bci nale\u017cy najpierw otworzy\u0107 mened\u017cera hase\u0142 i wybra\u0107 odpowiedni dost\u0119p.<\/p>\n<h2>Kiedy potrzebne s\u0105 nowe has\u0142a<\/h2>\n<p>Nawet je\u015bli potrzebujesz nowych hase\u0142 dost\u0119pu online, mened\u017cer hase\u0142 mo\u017ce pom\u00f3c. Za pomoc\u0105 zintegrowanego w wielu programach generatora hase\u0142 mo\u017cna w ci\u0105gu kilku sekund wygenerowa\u0107 i zapisa\u0107 nowe, a przede wszystkim skomplikowane i tym samym bezpieczne has\u0142a. Has\u0142a, kt\u00f3re s\u0105 zbyt \u0142atwe do wyboru, a przez to niepewne, nale\u017c\u0105 ju\u017c do przesz\u0142o\u015bci. Przy okazji: obecnie dost\u0119pne s\u0105 r\u00f3wnie\u017c specjalne aplikacje dla smartfon\u00f3w, a nawet tablet\u00f3w, kt\u00f3re umo\u017cliwiaj\u0105 dost\u0119p do chronionych has\u0142em baz danych z miejsca zdarzenia.<\/p>\n<h2>Bezpieczne i \u0142atwe \u017cycie z mened\u017cerem hase\u0142<\/h2>\n<p>Cz\u0119sto nie tylko kwesti\u0105 wygody jest to, czy wybierane s\u0105 wystarczaj\u0105co bezpieczne has\u0142a i czy s\u0105 one zmieniane w regularnych odst\u0119pach czasu. Ludzie cz\u0119sto maj\u0105 tendencj\u0119 do u\u017cywania tego samego (prostego i niepewnego) has\u0142a przez lata. Dopiero gdy to nast\u0105pi i has\u0142o zostanie utracone przez odpowiedni atak hakera, u\u017cytkownik zdaje sobie spraw\u0119, jak trudna i pracoch\u0142onna jest zmiana wszystkich hase\u0142 dost\u0119pu online. Oczywi\u015bcie, korzystanie z mened\u017cera hase\u0142 jest na pocz\u0105tku nieco nieznane, ale stosunkowo szybko staje si\u0119 drug\u0105 natur\u0105. Dane przechowywane w bazie danych mened\u017cera hase\u0142 s\u0105 zawsze aktualne i przechowywane w formie zaszyfrowanej, niezale\u017cnie od tego, czy jest to mened\u017cer hase\u0142 na komputerze PC, na komputerze Mac, czy nawet aplikacja na smartfonie lub tablecie. Nawiasem m\u00f3wi\u0105c, bazy danych mog\u0105 by\u0107 pobierane i odszyfrowywane tylko za pomoc\u0105 urz\u0105dze\u0144, kt\u00f3re zosta\u0142y wcze\u015bniej upowa\u017cnione do dost\u0119pu do bazy danych. Szyfrowana transmisja danych zapewnia wysoki standard bezpiecze\u0144stwa zar\u00f3wno w domu, jak i w podr\u00f3\u017cy.<\/p>\n<p>&nbsp;<\/p>","protected":false},"excerpt":{"rendered":"<p>Um eine dauerhafte Sicherheit zu gew\u00e4hrleisten, sollten Sie stets komplexe und vor allem regelm\u00e4\u00dfig ver\u00e4nderte Passw\u00f6rter f\u00fcr E-Mail-Konten oder online Zug\u00e4nge verwenden. Viele Leute sind allerdings damit \u00fcberfordert, sich die Passw\u00f6rter alle zu merken. Ein Passwortmanager soll dieses Problem l\u00f6sen. Was machen Passwortmanager eigentlich? Passwortmanager dienen dazu, verschiedene Passw\u00f6rter und Zugangsdaten (beispielsweise f\u00fcr E-Mail-Konten oder [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1258,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_crdt_document":"","inline_featured_image":false,"footnotes":""},"categories":[673,794],"tags":[],"class_list":["post-4408","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer_und_internet","category-sicherheit-computer_und_internet"],"acf":[],"_wp_attached_file":null,"_wp_attachment_metadata":null,"litespeed-optimize-size":null,"litespeed-optimize-set":null,"_elementor_source_image_hash":null,"_wp_attachment_image_alt":null,"stockpack_author_name":null,"stockpack_author_url":null,"stockpack_provider":null,"stockpack_image_url":null,"stockpack_license":null,"stockpack_license_url":null,"stockpack_modification":null,"color":null,"original_id":null,"original_url":null,"original_link":null,"unsplash_location":null,"unsplash_sponsor":null,"unsplash_exif":null,"unsplash_attachment_metadata":null,"_elementor_is_screenshot":null,"surfer_file_name":null,"surfer_file_original_url":null,"envato_tk_source_kit":null,"envato_tk_source_index":null,"envato_tk_manifest":null,"envato_tk_folder_name":null,"envato_tk_builder":null,"envato_elements_download_event":null,"_menu_item_type":null,"_menu_item_menu_item_parent":null,"_menu_item_object_id":null,"_menu_item_object":null,"_menu_item_target":null,"_menu_item_classes":null,"_menu_item_xfn":null,"_menu_item_url":null,"_trp_menu_languages":null,"rank_math_primary_category":"0","rank_math_title":null,"inline_featured_image":null,"_yoast_wpseo_primary_category":null,"rank_math_schema_blogposting":null,"rank_math_schema_videoobject":null,"_oembed_049c719bc4a9f89deaead66a7da9fddc":null,"_oembed_time_049c719bc4a9f89deaead66a7da9fddc":null,"_yoast_wpseo_focuskw":"","_yoast_wpseo_linkdex":null,"_oembed_27e3473bf8bec795fbeb3a9d38489348":null,"_oembed_c3b0f6959478faf92a1f343d8f96b19e":null,"_trp_translated_slug_en_us":null,"_wp_desired_post_slug":null,"_yoast_wpseo_title":null,"tldname":null,"tldpreis":null,"tldrubrik":null,"tldpolicylink":null,"tldsize":null,"tldregistrierungsdauer":null,"tldtransfer":null,"tldwhoisprivacy":null,"tldregistrarchange":null,"tldregistrantchange":null,"tldwhoisupdate":null,"tldnameserverupdate":null,"tlddeletesofort":null,"tlddeleteexpire":null,"tldumlaute":null,"tldrestore":null,"tldsubcategory":null,"tldbildname":null,"tldbildurl":null,"tldclean":null,"tldcategory":null,"tldpolicy":null,"tldbesonderheiten":null,"tld_bedeutung":null,"_oembed_d167040d816d8f94c072940c8009f5f8":null,"_oembed_b0a0fa59ef14f8870da2c63f2027d064":null,"_oembed_4792fa4dfb2a8f09ab950a73b7f313ba":null,"_oembed_33ceb1fe54a8ab775d9410abf699878d":null,"_oembed_fd7014d14d919b45ec004937c0db9335":null,"_oembed_21a029d076783ec3e8042698c351bd7e":null,"_oembed_be5ea8a0c7b18e658f08cc571a909452":null,"_oembed_a9ca7a298b19f9b48ec5914e010294d2":null,"_oembed_f8db6b27d08a2bb1f920e7647808899a":null,"_oembed_168ebde5096e77d8a89326519af9e022":null,"_oembed_cdb76f1b345b42743edfe25481b6f98f":null,"_oembed_87b0613611ae54e86e8864265404b0a1":null,"_oembed_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_oembed_time_27aa0e5cf3f1bb4bc416a4641a5ac273":null,"_tldname":null,"_tldclean":null,"_tldpreis":null,"_tldcategory":null,"_tldsubcategory":null,"_tldpolicy":null,"_tldpolicylink":null,"_tldsize":null,"_tldregistrierungsdauer":null,"_tldtransfer":null,"_tldwhoisprivacy":null,"_tldregistrarchange":null,"_tldregistrantchange":null,"_tldwhoisupdate":null,"_tldnameserverupdate":null,"_tlddeletesofort":null,"_tlddeleteexpire":null,"_tldumlaute":null,"_tldrestore":null,"_tldbildname":null,"_tldbildurl":null,"_tld_bedeutung":null,"_tldbesonderheiten":null,"_oembed_ad96e4112edb9f8ffa35731d4098bc6b":null,"_oembed_8357e2b8a2575c74ed5978f262a10126":null,"_oembed_3d5fea5103dd0d22ec5d6a33eff7f863":null,"_eael_widget_elements":null,"_oembed_0d8a206f09633e3d62b95a15a4dd0487":null,"_oembed_time_0d8a206f09633e3d62b95a15a4dd0487":null,"_aioseo_description":null,"_eb_attr":null,"_eb_data_table":null,"_oembed_819a879e7da16dd629cfd15a97334c8a":null,"_oembed_time_819a879e7da16dd629cfd15a97334c8a":null,"_acf_changed":null,"_wpcode_auto_insert":null,"_edit_last":"1","_edit_lock":"1640635868:1","_oembed_e7b913c6c84084ed9702cb4feb012ddd":"{{unknown}}","_oembed_bfde9e10f59a17b85fc8917fa7edf782":"<iframe title=\"Theming Nextcloud in 37 seconds\" width=\"368\" height=\"207\" src=\"https:\/\/www.youtube.com\/embed\/wqRgeFXYUys?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_bfde9e10f59a17b85fc8917fa7edf782":"1640633798","_oembed_03514b67990db061d7c4672de26dc514":"<iframe title=\"Gaia X\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/NhqLt_NJ6FA?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_03514b67990db061d7c4672de26dc514":"1640633788","rank_math_news_sitemap_robots":"index","rank_math_robots":["index"],"_eael_post_view_count":"4255","_trp_automatically_translated_slug_ru_ru":null,"_trp_automatically_translated_slug_et":"password-manager-bringing-order-into-password-chaos","_trp_automatically_translated_slug_lv":"password-manager-bringing-order-into-password-chaos","_trp_automatically_translated_slug_fr_fr":null,"_trp_automatically_translated_slug_en_us":null,"_wp_old_slug":null,"_trp_automatically_translated_slug_da_dk":null,"_trp_automatically_translated_slug_pl_pl":null,"_trp_automatically_translated_slug_es_es":null,"_trp_automatically_translated_slug_hu_hu":null,"_trp_automatically_translated_slug_fi":"password-manager-bringinging-order-into-password-chaos","_trp_automatically_translated_slug_ja":"%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e7%ae%a1%e7%90%86%e8%80%85%e5%91%bd%e4%bb%a4%e3%82%a4%e3%83%b3%e3%83%91%e3%82%b9%e3%83%af%e3%83%bc%e3%83%89%e3%82%ab%e3%82%aa%e3%82%b9","_trp_automatically_translated_slug_lt_lt":null,"_elementor_edit_mode":null,"_elementor_template_type":null,"_elementor_version":null,"_elementor_pro_version":null,"_wp_page_template":"default","_elementor_page_settings":null,"_elementor_data":null,"_elementor_css":null,"_elementor_conditions":null,"_happyaddons_elements_cache":null,"_oembed_75446120c39305f0da0ccd147f6de9cb":"{{unknown}}","_oembed_time_75446120c39305f0da0ccd147f6de9cb":null,"_oembed_3efb2c3e76a18143e7207993a2a6939a":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\"><a href=\"https:\/\/twitter.com\/hashtag\/BREAKING?src=hash&amp;ref_src=twsrc%5Etfw\">#BREAKING<\/a>: Texas takes the lead once more! Today, we\u2019re filing a lawsuit against <a href=\"https:\/\/twitter.com\/hashtag\/Google?src=hash&amp;ref_src=twsrc%5Etfw\">#Google<\/a> for anticompetitive conduct.<br><br>This internet Goliath used its power to manipulate the market, destroy competition, and harm YOU, the consumer. Stay tuned\u2026 <a href=\"https:\/\/t.co\/fdEVEWQb0e\">pic.twitter.com\/fdEVEWQb0e<\/a><\/p>&mdash; Texas Attorney General (@TXAG) <a href=\"https:\/\/twitter.com\/TXAG\/status\/1339283520099856384?ref_src=twsrc%5Etfw\">December 16, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_3efb2c3e76a18143e7207993a2a6939a":"1640633778","_oembed_59808117857ddf57e478a31d79f76e4d":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"en\" dir=\"ltr\">Happy to follow-on report that a huge chunk of <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute just successfully made the transition to Graviton2 <a href=\"https:\/\/twitter.com\/Arm?ref_src=twsrc%5Etfw\">@ARM<\/a> in <a href=\"https:\/\/twitter.com\/awscloud?ref_src=twsrc%5Etfw\">@awscloud<\/a> this afternoon. More services coming shortly. My aim is to get to 100% of non-GPU <a href=\"https:\/\/twitter.com\/SmugMug?ref_src=twsrc%5Etfw\">@SmugMug<\/a> and <a href=\"https:\/\/twitter.com\/Flickr?ref_src=twsrc%5Etfw\">@Flickr<\/a> compute on ARM within the year. <a href=\"https:\/\/t.co\/fwXWdg06xx\">https:\/\/t.co\/fwXWdg06xx<\/a><\/p>&mdash; Don MacAskill (@DonMacAskill) <a href=\"https:\/\/twitter.com\/DonMacAskill\/status\/1314050996486561792?ref_src=twsrc%5Etfw\">October 8, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_59808117857ddf57e478a31d79f76e4d":"1640633780","_oembed_965c5b49aa8d22ce37dfb3bde0268600":"<blockquote class=\"twitter-tweet\" data-width=\"550\" data-dnt=\"true\"><p lang=\"de\" dir=\"ltr\">Der <a href=\"https:\/\/twitter.com\/hashtag\/Finanzausschuss?src=hash&amp;ref_src=twsrc%5Etfw\">#Finanzausschuss<\/a> im <a href=\"https:\/\/twitter.com\/hashtag\/Bundestag?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundestag<\/a> hat das <a href=\"https:\/\/twitter.com\/hashtag\/Jahressteuergesetz?src=hash&amp;ref_src=twsrc%5Etfw\">#Jahressteuergesetz<\/a> beschlossen. Damit wurde auch die <a href=\"https:\/\/twitter.com\/hashtag\/Gemeinn%C3%BCtzigkeit?src=hash&amp;ref_src=twsrc%5Etfw\">#Gemeinn\u00fctzigkeit<\/a> f\u00fcr <a href=\"https:\/\/twitter.com\/hashtag\/Freifunk?src=hash&amp;ref_src=twsrc%5Etfw\">#Freifunk<\/a> Initiativen beschlossen. Das ganze geht jetzt in der kommenden Woche ins Plenum zur Abstimmung und direkt in den <a href=\"https:\/\/twitter.com\/hashtag\/Bundesrat?src=hash&amp;ref_src=twsrc%5Etfw\">#Bundesrat<\/a><\/p>&mdash; Jens Zimmermann (@JensZSPD) <a href=\"https:\/\/twitter.com\/JensZSPD\/status\/1336581821706989568?ref_src=twsrc%5Etfw\">December 9, 2020<\/a><\/blockquote><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script>","_oembed_time_965c5b49aa8d22ce37dfb3bde0268600":"1640633781","_oembed_81002f7ee3604f645db4ebcfd1912acf":"<iframe title=\"Netzetag bei der Telekom: Antennen, Breitband, Glasfaser\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/6_NTa3VCRFo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_81002f7ee3604f645db4ebcfd1912acf":"1640633781","_elementor_screenshot":null,"_oembed_7ea3429961cf98fa85da9747683af827":"<iframe title=\"Firewall: Wie du die Web Application Firewall im Plesk Men\u00fc verwendest und deine Website sch\u00fctzt.\" width=\"800\" height=\"450\" src=\"https:\/\/www.youtube.com\/embed\/CzAjqyJtEaw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>","_oembed_time_7ea3429961cf98fa85da9747683af827":"1640633757","_elementor_controls_usage":null,"_elementor_page_assets":[],"_elementor_screenshot_failed":null,"theplus_transient_widgets":["tp-video-player"],"_eael_custom_js":null,"_wp_old_date":null,"_trp_automatically_translated_slug_it_it":null,"_trp_automatically_translated_slug_pt_pt":null,"_trp_automatically_translated_slug_zh_cn":null,"_trp_automatically_translated_slug_nl_nl":null,"_trp_automatically_translated_slug_pt_br":null,"_trp_automatically_translated_slug_sv_se":null,"rank_math_analytic_object_id":"950","rank_math_internal_links_processed":null,"_trp_automatically_translated_slug_ro_ro":null,"_trp_automatically_translated_slug_sk_sk":null,"_trp_automatically_translated_slug_bg_bg":null,"_trp_automatically_translated_slug_sl_si":null,"litespeed_vpi_list":["webhostinglogo.png"],"litespeed_vpi_list_mobile":["webhostinglogo.png"],"rank_math_seo_score":"7","rank_math_contentai_score":null,"ilj_limitincominglinks":"","ilj_maxincominglinks":"1","ilj_limitoutgoinglinks":null,"ilj_maxoutgoinglinks":null,"ilj_limitlinksperparagraph":"","ilj_linksperparagraph":"1","ilj_blacklistdefinition":[],"ilj_linkdefinition":["passwortmanager bringen ordnung ins passwortchaos"],"_eb_reusable_block_ids":null,"rank_math_focus_keyword":null,"rank_math_og_content_image":null,"_yoast_wpseo_metadesc":"","_yoast_wpseo_content_score":null,"_yoast_wpseo_focuskeywords":null,"_yoast_wpseo_keywordsynonyms":null,"_yoast_wpseo_estimated-reading-time-minutes":null,"rank_math_description":null,"surfer_last_post_update":null,"surfer_last_post_update_direction":null,"surfer_keywords":null,"surfer_location":null,"surfer_draft_id":null,"surfer_permalink_hash":null,"surfer_scrape_ready":null,"_thumbnail_id":"1258","footnotes":null,"_links":{"self":[{"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/posts\/4408","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/comments?post=4408"}],"version-history":[{"count":1,"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/posts\/4408\/revisions"}],"predecessor-version":[{"id":8115,"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/posts\/4408\/revisions\/8115"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/media\/1258"}],"wp:attachment":[{"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/media?parent=4408"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/categories?post=4408"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webhosting.de\/pl\/wp-json\/wp\/v2\/tags?post=4408"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}