{"id":161,"date":"2007-04-01T20:45:22","date_gmt":"2007-04-01T19:45:22","guid":{"rendered":"http:\/\/security-planet.de\/2007\/04\/01\/sonderbare-wege-der-e-mails\/"},"modified":"2007-04-01T20:45:22","modified_gmt":"2007-04-01T19:45:22","slug":"sonderbare-wege-der-e-mails","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2007\/04\/01\/sonderbare-wege-der-e-mails\/","title":{"rendered":"Sonderbare Wege der E-Mails"},"content":{"rendered":"<p>Heute in der &#8220;Welt am Sonntag&#8221; unter der <a href=\"http:\/\/epaper.welt.de\/download.php?zone=archiv&amp;etag=2007-04-01&amp;pages[]=59\">Rubrik &#8220;Wissen&#8221; (Seite 85)<\/a>:<\/p>\n<blockquote><p><strong>DNS-Server<\/strong><br \/>\n&#8230; Dreizehn Zentralcomputer, sogenannte DNS-Server (Domain-Name-System-Server), sind das R\u00fcckgrat des Internets. Jede E-Mail, die von einem Nutzer irgendwo auf dem Planeten zu einem anderen Teilnehmer geschickt wird, l\u00e4uft durch mindestens einen dieser Knotenpunkte.<\/p><\/blockquote>\n<p>Ah ja &#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Heute in der &#8220;Welt am Sonntag&#8221; unter der Rubrik &#8220;Wissen&#8221; (Seite 85): DNS-Server &#8230; Dreizehn Zentralcomputer, sogenannte DNS-Server (Domain-Name-System-Server), sind das R\u00fcckgrat des Internets. Jede E-Mail, die von einem Nutzer irgendwo auf dem Planeten zu einem anderen Teilnehmer geschickt wird, l\u00e4uft durch mindestens einen dieser Knotenpunkte. Ah ja &#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[2],"tags":[196,209,651],"class_list":["post-161","post","type-post","status-publish","format-standard","hentry","category-allgemeines","tag-dns","tag-e-mail","tag-wams"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/161","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=161"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/161\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=161"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=161"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=161"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}