{"id":3643,"date":"2021-10-27T22:23:23","date_gmt":"2021-10-27T15:53:23","guid":{"rendered":"https:\/\/iatmm.com\/?p=3643"},"modified":"2021-12-17T09:16:02","modified_gmt":"2021-12-17T02:46:02","slug":"1-4-ict-skills-and-working-in-linux-encryption-tls","status":"publish","type":"post","link":"https:\/\/iat.edu.mm\/1-4-ict-skills-and-working-in-linux-encryption-tls\/","title":{"rendered":"1.4 ICT Skills and Working in Linux: Encryption \u2013 TLS"},"content":{"rendered":"\n<p><strong><span style=\"color:#b41d8d\" class=\"has-inline-color\">Encryption<\/span><\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u1000\u102d\u102f \u101e\u102d\u1019\u103a\u1038\u1010\u102c (\u101e\u102d\u102f\u1037) \u101c\u103d\u103e\u1032\u1015\u103c\u1031\u102c\u1004\u103a\u1038\u1010\u102c\u1010\u103d\u1031 \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1010\u1032\u1037\u1021\u1001\u103b\u102d\u1014\u103a\u1010\u102d\u102f\u1004\u103a\u1038\u1019\u103e\u102c Third Parties \u1010\u103d\u1031\u1000 \u1000\u103c\u102c\u1038\u1016\u103c\u1010\u103a\u1019\u101a\u1030\u1014\u102d\u102f\u1004\u103a\u1016\u102d\u102f\u1037 \u1019\u101e\u102d\u1014\u102d\u102f\u1004\u103a \u1019\u1000\u103c\u100a\u1037\u103a\u1014\u102d\u102f\u1004\u103a\u1016\u102d\u102f\u1037\u1021\u1010\u103d\u1000\u103a \u1000\u103c\u102d\u102f\u1010\u1004\u103a\u101e\u1010\u102d\u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1006\u1031\u102c\u1004\u103a\u1016\u102d\u102f\u1037\u1010\u103d\u1031\u101c\u102d\u102f\u1015\u102b\u1010\u101a\u103a\u104b Internet \u1015\u1031\u102b\u103a\u1019\u103e\u102c \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u1016\u103c\u1010\u103a\u101e\u1014\u103a\u1038\u101e\u103d\u102c\u1038\u101c\u102c\u1000\u103c\u1010\u1032\u1037\u1021\u1001\u102b Routers \u1014\u103e\u1004\u1037\u103a Networks \u1021\u1010\u1031\u102c\u103a\u1019\u103b\u102c\u1038\u1019\u103b\u102c\u1038\u1000\u102d\u102f \u1016\u103c\u1010\u103a\u101e\u103d\u102c\u1038\u1000\u103c\u101b\u1010\u102c\u1019\u102d\u102f\u1037 Network Traffic \u1010\u103d\u1031\u1000\u102d\u102f <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Third Parties<\/span><\/em> \u1010\u103d\u1031\u1000 Access \u101b\u101a\u1030\u1010\u102c\u1019\u103b\u102d\u102f\u1038 \u1001\u1036\u101b\u1014\u102d\u102f\u1004\u103a\u1015\u102b\u1010\u101a\u103a\u104b \u1021\u101c\u102c\u1038\u1010\u1030\u1015\u102b\u1015\u1032 CD, DVD, Flash Drives \u1005\u1010\u1032\u1037 Physical Media \u1010\u103d\u1031\u1015\u1031\u102b\u103a\u1019\u103e\u102c \u101e\u102d\u1019\u103a\u1038\u1011\u102c\u1038\u1010\u1032\u1037 \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u101f\u102c\u101c\u100a\u103a\u1038 \u1010\u1005\u102f\u1036\u1010\u101a\u1031\u102c\u1000\u103a\u101c\u1000\u103a\u1011\u1032\u101b\u1031\u102c\u1000\u103a\u101b\u103e\u102d\u101e\u103d\u102c\u1038\u1010\u102c \u1016\u1010\u103a\u1014\u102d\u102f\u1004\u103a\u1000\u103c\u100a\u1037\u103a\u1014\u102d\u102f\u1004\u103a \u101e\u102d\u1014\u102d\u102f\u1004\u103a\u101e\u103d\u102c\u1038\u1010\u102c\u1019\u103b\u102d\u102f\u1038 \u1001\u1036\u101b\u1014\u102d\u102f\u1004\u103a\u1015\u102b\u1010\u101a\u103a\u104b \u1021\u1032\u1037\u1012\u102e\u101c\u102d\u102f \u1019\u101b\u100a\u103a\u101b\u103d\u101a\u103a\u1018\u1032 (\u101e\u102d\u102f\u1037) \u101b\u100a\u103a\u101b\u103d\u101a\u103a\u1001\u103b\u1000\u103a\u101b\u103e\u102d\u101b\u103e\u102d Access \u101c\u102f\u1015\u103a\u1001\u1036\u101b\u1010\u102c\u1019\u103b\u102d\u102f\u1038\u1010\u103d\u1031 \u101b\u103e\u1031\u102c\u1004\u103a\u101b\u103e\u102c\u1038\u1014\u102d\u102f\u1004\u103a\u1016\u102d\u102f\u1037\u1021\u1010\u103d\u1000\u103a \u1021\u101b\u1031\u1038\u1000\u103c\u102e\u1038\u1010\u1032\u1037 \u101c\u103b\u103e\u102d\u102f\u1037\u101d\u103e\u1000\u103a\u101b\u1019\u101a\u1037\u103a Information \u1010\u103d\u1031\u1000\u102d\u102f \u1015\u102f\u1036\u1005\u1036\u1015\u103c\u1031\u102c\u1004\u103a\u1038\u1011\u102c\u1038\u101e\u1004\u1037\u103a <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Encrypt <\/span><\/em>\u101c\u102f\u1015\u103a\u1011\u102c\u1038\u101e\u1004\u1037\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<p><strong><span style=\"color:#b41d8d\" class=\"has-inline-color\">TLS<\/span><\/strong><\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Transport Layer Security (TLS)<\/span><\/em> \u1006\u102d\u102f\u1010\u102c \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u1005\u103a\u1001\u102f\u1000\u102d\u102f \u1015\u1031\u1038\u1015\u102d\u102f\u1037\u101e\u1030\u1014\u103e\u1004\u1037\u103a \u101b\u100a\u103a\u101b\u103d\u101a\u103a\u1010\u1032\u1037\u101c\u1000\u103a\u1001\u1036\u101e\u1030\u1019\u103e\u101c\u103d\u1032\u1015\u103c\u102e\u1038 \u1021\u1001\u103c\u102c\u1038\u101e\u1030\u1019\u103b\u102c\u1038\u1019\u101e\u102d\u1014\u102d\u102f\u1004\u103a\u1021\u1031\u102c\u1004\u103a \u1014\u102c\u1038\u1019\u101c\u100a\u103a\u1014\u102d\u102f\u1004\u103a\u1021\u1031\u102c\u1004\u103a \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1005\u102d\u1010\u103a\u1001\u103b\u101b\u1019\u101a\u1037\u103a \u1005\u1000\u102c\u1038\u101d\u103e\u1000\u103a\u1015\u102f\u1036\u1005\u1036\u1021\u1016\u103c\u1005\u103a <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Cryptography<\/span><\/em> \u1014\u100a\u103a\u1038\u101c\u1019\u103a\u1038\u1010\u1005\u103a\u1001\u102f\u1001\u102f\u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1015\u103c\u102e\u1038 Network Connections \u1010\u103d\u1031\u1015\u1031\u102b\u103a\u1019\u103e\u102c \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1019\u103e\u102f\u1015\u1031\u1038\u1010\u1032\u1037 Protocol \u1010\u1005\u103a\u1001\u102f\u1015\u102b\u104b \u101c\u102f\u1036\u1001\u103c\u102f\u1036\u101b\u1031\u1038\u1006\u102d\u102f\u1004\u103a\u101b\u102c \u1001\u103b\u102d\u102f\u1037\u101a\u103d\u1004\u103a\u1038\u1021\u102c\u1038\u1014\u100a\u103a\u1038\u1001\u103b\u1000\u103a\u1010\u103d\u1031\u1000\u103c\u1031\u102c\u1004\u1037\u103a \u1019\u101e\u102f\u1036\u1038\u1016\u103c\u1005\u103a\u1000\u103c\u1010\u1031\u102c\u1037\u1010\u1032\u1037 <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Secure Sockets Layer (SSL)<\/span><\/em> \u101b\u1032\u1037 \u1014\u1031\u102c\u1000\u103a\u1019\u103e\u1015\u1031\u102b\u103a\u1011\u103d\u1000\u103a\u101c\u102c\u1010\u1032\u1037 Protocol \u1010\u1005\u103a\u1001\u102f\u101c\u100a\u103a\u1038\u1016\u103c\u1005\u103a\u1015\u102b\u1010\u101a\u103a\u104b \u1015\u102d\u102f\u1019\u102d\u102f\u101c\u102f\u1036\u1001\u103c\u102f\u1036\u1019\u103e\u102f\u1015\u1031\u1038\u1014\u102d\u102f\u1004\u103a\u1016\u102d\u102f\u1037 \u1015\u103c\u1031\u102c\u1004\u103a\u1038\u101c\u1032\u1019\u103c\u103e\u1004\u1037\u103a\u1010\u1004\u103a\u101b\u1004\u103a\u1038\u1014\u103e\u1004\u1037\u103a\u1015\u1032 \u1021\u1001\u102f\u1010\u1031\u102c\u1037 Version 1.3 \u101b\u1031\u102c\u1000\u103a\u1014\u1031\u1015\u102b\u1015\u103c\u102e\u104b \u1010\u1014\u1031\u101b\u102c\u1019\u103e \u1010\u1014\u1031\u101b\u102c\u101e\u102d\u102f\u1037 \u1015\u1031\u1038\u1015\u102d\u102f\u1037\u1019\u101a\u1037\u103a \u1019\u1030\u101b\u1004\u103a\u1038\u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a Message (<em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Plain Text<\/span><\/em>) \u1000\u102d\u102f \u1005\u1000\u102c\u1038\u101d\u103e\u1000\u103a\u1015\u102f\u1036\u1005\u1036 \u1015\u103c\u1031\u102c\u1004\u103a\u1038\u101c\u1032 Encrypt \u101c\u102f\u1015\u103a\u1015\u103c\u102e\u1038\u1014\u1031\u102c\u1000\u103a \u101b\u101c\u102c\u1010\u1032\u1037 <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Cipher Text<\/span><\/em> \u1000\u102d\u102f \u1015\u1031\u1038\u1015\u102d\u102f\u1037\u101c\u102d\u102f\u1000\u103a\u1015\u103c\u102e\u1038 \u101c\u1000\u103a\u1001\u1036\u101e\u1030\u1006\u102e\u101b\u1031\u102c\u1000\u103a\u1010\u1032\u1037\u1021\u1001\u102b\u1019\u103e \u1019\u1030\u101b\u1004\u103a\u1038\u1015\u102f\u1036\u1005\u1036 Plain Text \u1021\u1016\u103c\u1005\u103a \u1015\u103c\u1014\u103a\u1016\u103c\u100a\u103a Decrypt \u101c\u102f\u1015\u103a\u1015\u103c\u102e\u1038 \u1015\u103c\u1014\u103a\u101c\u100a\u103a\u1015\u102f\u1036\u1016\u1031\u102c\u103a\u101a\u1030\u1010\u102c\u1010\u103d\u1031\u1019\u103e\u102c \u1010\u1030\u100a\u102e\u1010\u1032\u1037 \u101c\u103b\u103e\u102d\u102f\u1037\u101d\u103e\u1000\u103a\u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a Same Key \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1010\u1032\u1037 <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Symmetric Cryptography <\/span><\/em>\u1014\u103e\u1004\u1037\u103a \u1019\u1010\u1030\u100a\u102e\u1010\u1032\u1037 Different Key \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1010\u1032\u1037 <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Asymmetric (Public-key) Cryptography<\/span><\/em> \u1014\u100a\u103a\u1038\u101c\u1019\u103a\u1038\u1019\u103b\u102c\u1038\u1016\u103c\u1004\u1037\u103a \u1000\u102d\u102f\u101a\u103a\u1015\u102d\u102f\u1004\u103a \u101c\u103b\u103e\u102d\u102f\u1037\u101d\u103e\u1000\u103a\u1014\u102d\u102f\u1004\u103a\u1019\u103e\u102f Privacy \u1014\u103e\u1004\u1037\u103a \u1019\u1030\u101b\u1004\u103a\u1038\u1016\u103c\u1005\u103a\u1010\u100a\u103a\u1019\u103e\u102f \u1005\u1005\u103a\u1019\u103e\u1014\u103a\u1019\u103e\u102f Authenticity \u1010\u102d\u102f\u1037\u1000\u102d\u102f \u1015\u1031\u1038\u1014\u102d\u102f\u1004\u103a\u1015\u102b\u1010\u101a\u103a\u104b \u1006\u102d\u102f\u101c\u102d\u102f\u1010\u102c\u1000\u1010\u1031\u102c\u1037 \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u1005\u103a\u1001\u102f \u1015\u1031\u1038\u1015\u102d\u102f\u1037\u101b\u101a\u1030\u1005\u1025\u103a Session \u1010\u1005\u103a\u1001\u102f\u1021\u1010\u103d\u1004\u103a\u1038\u1019\u103e\u102c Server \u1014\u103e\u1004\u1037\u103a Client \u1021\u1000\u103c\u102c\u1038 \u1015\u1031\u1038\u1015\u102d\u102f\u1037\u101e\u1030\u1014\u103e\u1004\u1037\u103a \u101c\u1000\u103a\u1001\u1036\u101e\u1030\u1000\u103c\u102c\u1038\u1000 Communication \u1000\u102d\u102f \u1019\u100a\u103a\u101e\u1030\u1019\u103e \u1001\u102d\u102f\u1038\u1014\u102c\u1038\u1011\u1031\u102c\u1004\u103a\u1010\u102c (\u101e\u102d\u102f\u1037) \u1015\u103c\u1031\u102c\u1004\u103a\u1038\u101c\u1032\u1010\u102c\u1010\u103d\u1031 \u101c\u102f\u1015\u103a\u1014\u102d\u102f\u1004\u103a\u1019\u103e\u102c\u1019\u101f\u102f\u1010\u103a\u1010\u1031\u102c\u1037\u1015\u102b\u1018\u1030\u1038\u104b<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"https:\/\/medium.com\/hackernoon\/symmetric-and-asymmetric-encryption-5122f9ec65b1\"><img decoding=\"async\" src=\"https:\/\/iatmm.com\/wp-content\/uploads\/2021\/10\/oct27a.png\" alt=\"\" class=\"wp-image-3645\"\/><\/a><\/figure><\/div>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><a href=\"https:\/\/medium.com\/hackernoon\/symmetric-and-asymmetric-encryption-5122f9ec65b1\"><img decoding=\"async\" src=\"https:\/\/iatmm.com\/wp-content\/uploads\/2021\/10\/oct27b.png\" alt=\"\" class=\"wp-image-3646\"\/><\/a><\/figure><\/div>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \u1012\u102e\u1019\u103e\u102c \u1021\u101b\u1031\u1038\u1021\u1000\u103c\u102e\u1038\u1006\u102f\u1036\u1038 \u1019\u103e\u1010\u103a\u101e\u102c\u1038\u1016\u102d\u102f\u1037\u1000\u1010\u1031\u102c\u1037 Website \u1010\u1001\u102f\u101f\u102c \u101a\u102f\u1036\u1000\u103c\u100a\u103a\u1011\u102d\u102f\u1000\u103a\u101c\u102c\u1038\u1006\u102d\u102f\u1010\u102c \u1006\u1014\u103a\u1038\u1005\u1005\u103a\u1016\u102d\u102f\u1037\u1015\u102b\u1015\u1032\u104b Web Browser \u101b\u1032\u1037 \u101c\u102d\u1015\u103a\u1005\u102c\u1011\u100a\u1037\u103a\u101b\u102c\u1014\u1031\u101b\u102c Address Bar \u1019\u103e\u102c \u101e\u1031\u102c\u1037\u1001\u101c\u1031\u102c\u1000\u103a <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">\u201cLock\u201d Symbol<\/span><\/em> \u101e\u1004\u103a\u1039\u1000\u1031\u1010\u101c\u1031\u1038\u1000\u102d\u102f \u101b\u103e\u102c\u1000\u103c\u100a\u1037\u103a\u1016\u102d\u102f\u1037\u1015\u102b\u104b \u1021\u1032\u1037\u1012\u102e Symbol \u101c\u1031\u1038\u1000\u102d\u102f \u1014\u103e\u102d\u1015\u103a\u1015\u103c\u102e\u1038\u1010\u1031\u102c\u1037\u101c\u100a\u103a\u1038 HTTPS Protocol \u101b\u1032\u1037 \u1021\u1013\u102d\u1000\u1000\u103b\u1010\u1032\u1037 \u1021\u1015\u102d\u102f\u1004\u103a\u1038\u1016\u103c\u1005\u103a\u1010\u1032\u1037 Certificate \u1000\u102d\u102f \u101c\u1031\u1037\u101c\u102c\u1006\u1014\u103a\u1038\u1005\u1005\u103a\u1014\u102d\u102f\u1004\u103a\u1015\u102b\u1010\u101a\u103a\u104b<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img decoding=\"async\" src=\"https:\/\/iatmm.com\/wp-content\/uploads\/2021\/10\/Screen-Shot-2021-10-27-at-22.05.02-1024x390.png\" alt=\"\" class=\"wp-image-3647\"\/><\/figure>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/iatmm.com\/wp-content\/uploads\/2021\/10\/Screen-Shot-2021-10-27-at-21.58.09.png\" alt=\"\" class=\"wp-image-3648\"\/><\/figure><\/div>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;TLS \u101f\u102c <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">HTTPS Protocol (HTTP over TLS) <\/span><\/em>\u1015\u1031\u102b\u103a\u1019\u103e\u102c Web \u1015\u1031\u102b\u103a\u1000\u1014\u1031 Credit Card Number \u101c\u102d\u102f\u1019\u103b\u102d\u102f\u1038 \u1021\u1019\u103e\u102c\u1038\u1019\u1001\u1036\u1010\u1032\u1037 \u1006\u102f\u1036\u1038\u101b\u103e\u102f\u1036\u1038\u101c\u103d\u1032\u1019\u103e\u102c\u1038\u1010\u102c \u1019\u1001\u1036\u1014\u102d\u102f\u1004\u103a\u1010\u1032\u1037 \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a <em><span style=\"color:#b41d8d\" class=\"has-inline-color\">Sensitive Data<\/span><\/em> \u1010\u103d\u1031\u1015\u102d\u102f\u1037\u1014\u102d\u102f\u1004\u103a\u1016\u102d\u102f\u1037 \u1021\u101e\u102f\u1036\u1038\u1015\u103c\u102f\u1010\u1032\u1037 Protocol \u1015\u102b\u1015\u1032\u104b TLS \u101b\u1032\u1037 \u1021\u101c\u102f\u1015\u103a\u101c\u102f\u1015\u103a\u1015\u102f\u1036\u1010\u103d\u1031\u1000\u102d\u102f \u1021\u101e\u1031\u1038\u1005\u102d\u1010\u103a\u101e\u102d\u101b\u103e\u102d\u1014\u102d\u102f\u1004\u103a\u1016\u102d\u102f\u1037\u1021\u1010\u103d\u1000\u103a <a href=\"https:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security\">Wikipedia<\/a> \u1014\u103e\u1004\u1037\u103a <a href=\"https:\/\/wiki.mozilla.org\/Security\/Server_Side_TLS\">Mozilla wiki <\/a>\u1010\u102d\u102f\u1037\u1019\u103e\u102c \u1011\u1015\u103a\u1019\u1036\u101b\u103e\u102c\u1016\u103d\u1031\u101c\u1031\u1037\u101c\u102c\u1014\u102d\u102f\u1004\u103a\u1015\u102b\u1010\u101a\u103a\u1014\u1031\u102c\u103a\u104b<\/p>\n\n\n\n<p><strong><span class=\"has-inline-color has-vivid-cyan-blue-color\">Ref.<\/span><\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/medium.com\/hackernoon\/symmetric-and-asymmetric-encryption-5122f9ec65b1\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">https:\/\/medium.com\/hackernoon\/symmetric-and-asymmetric-encryption-5122f9ec65b1<\/span><\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">https:\/\/en.wikipedia.org\/wiki\/Transport_Layer_Security<\/span><\/a><\/p>\n\n\n\n<p><a href=\"https:\/\/wiki.mozilla.org\/Security\/Server_Side_TLS\"><span class=\"has-inline-color has-vivid-cyan-blue-color\">https:\/\/wiki.mozilla.org\/Security\/Server_Side_TLS<\/span><\/a><\/p>\n\n\n\n<p> &nbsp;&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u1000\u102d\u102f \u101e\u102d\u1019\u103a\u1038\u1010\u102c (\u101e\u102d\u102f\u1037) \u101c\u103d\u103e\u1032\u1015\u103c\u1031\u102c\u1004\u103a\u1038\u1010\u102c\u1010\u103d\u1031 \u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1010\u1032\u1037\u1021\u1001\u103b\u102d\u1014\u103a\u1010\u102d\u102f\u1004\u103a\u1038\u1019\u103e\u102c Third Parties \u1010\u103d\u1031\u1000 \u1000\u103c\u102c\u1038\u1016\u103c\u1010\u103a\u1019\u101a\u1030\u1014\u102d\u102f\u1004\u103a\u1016\u102d\u102f\u1037 \u1019\u101e\u102d\u1014\u102d\u102f\u1004\u103a \u1019\u1000\u103c\u100a\u1037\u103a\u1014\u102d\u102f\u1004\u103a\u1016\u102d\u102f\u1037\u1021\u1010\u103d\u1000\u103a \u1000\u103c\u102d\u102f\u1010\u1004\u103a\u101e\u1010\u102d\u1015\u103c\u102f\u101c\u102f\u1015\u103a\u1006\u1031\u102c\u1004\u103a\u1016\u102d\u102f\u1037\u1010\u103d\u1031\u101c\u102d\u102f\u1015\u102b\u1010\u101a\u103a\u104b Internet \u1015\u1031\u102b\u103a\u1019\u103e\u102c \u1021\u1001\u103b\u1000\u103a\u1021\u101c\u1000\u103a\u1010\u103d\u1031\u1016\u103c\u1010\u103a\u101e\u1014\u103a\u1038\u101e\u103d\u102c\u1038\u101c\u102c\u1000\u103c\u1010\u1032\u1037\u1021\u1001\u102b Routers \u1014\u103e\u1004\u1037\u103a Networks [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4042,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[64,18,65],"tags":[],"class_list":["post-3643","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iat-courses","category-knowledge-sharing","category-linux"],"_links":{"self":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts\/3643","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/comments?post=3643"}],"version-history":[{"count":7,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts\/3643\/revisions"}],"predecessor-version":[{"id":3658,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/posts\/3643\/revisions\/3658"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/media\/4042"}],"wp:attachment":[{"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/media?parent=3643"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/categories?post=3643"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/iat.edu.mm\/api\/wp\/v2\/tags?post=3643"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}