{"id":15790,"date":"2024-03-04T11:38:56","date_gmt":"2024-03-04T11:38:56","guid":{"rendered":"https:\/\/ramsdata.com.pl\/opswat\/tecnologias\/avaliacao-de-vulnerabilidades-baseada-em-ficheiros\/"},"modified":"2024-03-16T11:58:37","modified_gmt":"2024-03-16T11:58:37","slug":"avaliacao-de-vulnerabilidades-baseada-em-ficheiros","status":"publish","type":"page","link":"https:\/\/ramsdata.com.pl\/pt-pt\/opswat\/tecnologias\/avaliacao-de-vulnerabilidades-baseada-em-ficheiros\/","title":{"rendered":"Avalia\u00e7\u00e3o de vulnerabilidades baseada em ficheiros"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"15790\" class=\"elementor elementor-15790 elementor-11619\" data-elementor-settings=\"{&quot;ha_cmc_init_switcher&quot;:&quot;no&quot;}\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-426a921f e-flex e-con-boxed e-con e-parent\" data-id=\"426a921f\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-63dc2dcc e-con-full e-flex e-con e-child\" data-id=\"63dc2dcc\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-629209cd elementor-widget elementor-widget-image\" data-id=\"629209cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"145\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp\" class=\"attachment-large size-large wp-image-13343\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1024x185.webp 1024w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-768x139.webp 768w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-1536x278.webp 1536w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/MetaDefender-Core-Logo-2048x371.webp 2048w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-28b0c147 elementor-invisible elementor-widget elementor-widget-heading\" data-id=\"28b0c147\" data-element_type=\"widget\" data-e-type=\"widget\" data-settings=\"{&quot;_animation&quot;:&quot;fadeInUp&quot;}\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h1 class=\"elementor-heading-title elementor-size-default\">Avalia\u00e7\u00e3o da vulnerabilidade<\/h1>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5dfe44ce e-flex e-con-boxed e-con e-parent\" data-id=\"5dfe44ce\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t<div class=\"elementor-element elementor-element-31e37442 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"31e37442\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-65094df0 elementor-widget elementor-widget-heading\" data-id=\"65094df0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h5 class=\"elementor-heading-title elementor-size-default\">Avalia\u00e7\u00e3o da vulnerabilidade<\/h5>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-320d63fe e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"320d63fe\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-4653d901 elementor-widget elementor-widget-heading\" data-id=\"4653d901\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Detetar lacunas na seguran\u00e7a das aplica\u00e7\u00f5es\nantes da sua instala\u00e7\u00e3o<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6af35814 elementor-widget elementor-widget-text-editor\" data-id=\"6af35814\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>A nossa tecnologia de avalia\u00e7\u00e3o de vulnerabilidades baseada em ficheiros detecta vulnerabilidades em aplica\u00e7\u00f5es e ficheiros antes de estes serem instalados. Utilizamos a nossa tecnologia patenteada (U.S. 9749349 B1) para correlacionar vulnerabilidades de seguran\u00e7a em componentes de software, instaladores de produtos, pacotes de firmware e muitos outros tipos de ficheiros bin\u00e1rios que s\u00e3o recolhidos de uma enorme comunidade de utilizadores e clientes empresariais.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-3ee9ab09 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"3ee9ab09\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-6bea4df4 elementor-widget elementor-widget-heading\" data-id=\"6bea4df4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Aumento das vulnerabilidades de seguran\u00e7a do software<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5b1b2833 elementor-widget elementor-widget-text-editor\" data-id=\"5b1b2833\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>\u00c0 medida que aumenta a complexidade do software, aumenta o n\u00famero de vulnerabilidades de seguran\u00e7a das aplica\u00e7\u00f5es. Todos os anos, \u00e9 estabelecido um novo recorde para o n\u00famero de vulnerabilidades de seguran\u00e7a conhecidas, incluindo n\u00e3o s\u00f3 vulnerabilidades do sistema operativo e das aplica\u00e7\u00f5es, mas tamb\u00e9m componentes bin\u00e1rios, firmware da Internet das Coisas (IoT) e outras vulnerabilidades baseadas em ficheiros.<\/p>\n<p>As vulnerabilidades de seguran\u00e7a do software est\u00e3o a aumentar. Desde 2002, o n\u00famero total de vulnerabilidades de software aumentou em m\u00e9dia 12% ao ano.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-16e13239 e-con-full e-flex elementor-invisible e-con e-child\" data-id=\"16e13239\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;animation&quot;:&quot;fadeInLeft&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t<div class=\"elementor-element elementor-element-71fc5a4c elementor-widget elementor-widget-heading\" data-id=\"71fc5a4c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Crescimento r\u00e1pido das vulnerabilidades de seguran\u00e7a baseadas em ficheiros<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-276fdc1e elementor-widget elementor-widget-text-editor\" data-id=\"276fdc1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>As vulnerabilidades baseadas em ficheiros s\u00e3o uma das categorias de tipos de vulnerabilidade com crescimento mais r\u00e1pido nos \u00faltimos anos.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5bcea219 e-flex e-con-boxed e-con e-child\" data-id=\"5bcea219\" data-element_type=\"container\" data-e-type=\"container\" data-settings=\"{&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-303504d elementor-widget elementor-widget-image\" data-id=\"303504d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"360\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/New-Project-22.png\" class=\"attachment-large size-large wp-image-14468\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/New-Project-22.png 1000w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/New-Project-22-300x135.png 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/New-Project-22-768x346.png 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-20a2341b elementor-section-full_width elementor-section-stretched elementor-section-height-default elementor-section-height-default\" data-id=\"20a2341b\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;stretch_section&quot;:&quot;section-stretched&quot;,&quot;background_background&quot;:&quot;classic&quot;,&quot;_ha_eqh_enable&quot;:false}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-1e7d5c95\" data-id=\"1e7d5c95\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-28662b59 elementor-widget elementor-widget-image\" data-id=\"28662b59\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"300\" height=\"54\" src=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png-300x54.webp\" class=\"attachment-medium size-medium wp-image-13023\" alt=\"\" srcset=\"https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png-300x54.webp 300w, https:\/\/ramsdata.com.pl\/wp-content\/uploads\/2024\/03\/OPSWAT_Logo_CMYKwhite-768x139.png.webp 768w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10cb9385 elementor-widget elementor-widget-heading\" data-id=\"10cb9385\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<p class=\"elementor-heading-title elementor-size-default\">Demonstra\u00e7\u00e3o da tecnologia - avalia\u00e7\u00e3o da vulnerabilidade baseada em aplica\u00e7\u00f5es e ficheiros<\/p>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-e5da0cf elementor-widget elementor-widget-eael-adv-tabs\" data-id=\"e5da0cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"eael-adv-tabs.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t        <div data-scroll-on-click=\"no\" data-scroll-speed=\"300\" id=\"eael-advance-tabs-e5da0cf\" class=\"eael-advance-tabs eael-tabs-vertical eael-tab-auto-active  active-caret-on responsive-vertical-layout\" data-tabid=\"e5da0cf\">\n            <div class=\"eael-tabs-nav \">\n                <ul class=\"\" role=\"tablist\">\n                                            <li id=\"deteo-de-instaladores-vulnerveis\" class=\"active-default eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"true\" data-tab=\"1\" role=\"tab\" tabindex=\"0\" aria-controls=\"deteo-de-instaladores-vulnerveis-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Dete\u00e7\u00e3o de instaladores vulner\u00e1veis<\/span>                                                    <\/li>\n                                            <li id=\"mais-de-mil-milhes-de-pontos-de-dados\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"2\" role=\"tab\" tabindex=\"-1\" aria-controls=\"mais-de-mil-milhes-de-pontos-de-dados-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Mais de mil milh\u00f5es de pontos de dados<\/span>                                                    <\/li>\n                                            <li id=\"vulnerabilidades-de-software-e-firmware-da-iot\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"3\" role=\"tab\" tabindex=\"-1\" aria-controls=\"vulnerabilidades-de-software-e-firmware-da-iot-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Vulnerabilidades de software e firmware da IoT<\/span>                                                    <\/li>\n                                            <li id=\"avaliar-as-vulnerabilidades-antes-de-serem-implementadas\" class=\"inactive eael-tab-item-trigger eael-tab-nav-item\" aria-selected=\"false\" data-tab=\"4\" role=\"tab\" tabindex=\"-1\" aria-controls=\"avaliar-as-vulnerabilidades-antes-de-serem-implementadas-tab\" aria-expanded=\"false\">\n                            \n                            \n                            \n                                                            <span class=\"eael-tab-title title-after-icon\" >Avaliar as vulnerabilidades antes de serem implementadas<\/span>                                                    <\/li>\n                    \n                                  <\/ul>\n            <\/div>\n            \n            <div class=\"eael-tabs-content\">\n\t\t        \n                    <div id=\"deteo-de-instaladores-vulnerveis-tab\" class=\"clearfix eael-tab-content-item active-default\" data-title-link=\"deteo-de-instaladores-vulnerveis-tab\">\n\t\t\t\t        <p>Milh\u00f5es de utilizadores est\u00e3o vulner\u00e1veis a ataques que exploram vulnerabilidades de seguran\u00e7a. Detetar e impedir que os instaladores entrem nas redes e as utilizem para disseminar vulnerabilidades \u00e9 uma das melhores pr\u00e1ticas de ciberseguran\u00e7a.<\/p>\n                    <\/div>\n\t\t        \n                    <div id=\"mais-de-mil-milhes-de-pontos-de-dados-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"mais-de-mil-milhes-de-pontos-de-dados-tab\">\n\t\t\t\t        <p>As vulnerabilidades associadas a componentes bin\u00e1rios espec\u00edficos s\u00e3o dif\u00edceis de detetar utilizando a tecnologia tradicional de dete\u00e7\u00e3o de vulnerabilidades. A nossa tecnologia inovadora recolheu e analisou mais de mil milh\u00f5es (e est\u00e1 a aumentar) de pontos de dados de software sens\u00edveis de dispositivos em estado selvagem e utiliza estes dados como base para avalia\u00e7\u00f5es de vulnerabilidade baseadas em componentes de software.<\/p>\n                    <\/div>\n\t\t        \n                    <div id=\"vulnerabilidades-de-software-e-firmware-da-iot-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"vulnerabilidades-de-software-e-firmware-da-iot-tab\">\n\t\t\t\t        <p>As vulnerabilidades de seguran\u00e7a no software e firmware da IoT est\u00e3o a tornar-se cada vez mais importantes. Os dispositivos IoT s\u00e3o normalmente concebidos para fun\u00e7\u00f5es espec\u00edficas e n\u00e3o t\u00eam quaisquer precau\u00e7\u00f5es. Impedir a implanta\u00e7\u00e3o de firmware vulner\u00e1vel em dispositivos IoT \u00e9 uma medida de seguran\u00e7a cr\u00edtica, dado o r\u00e1pido crescimento dos dispositivos IoT. A nossa tecnologia de dete\u00e7\u00e3o de vulnerabilidades \u00e9 capaz de detetar vulnerabilidades de software antes da instala\u00e7\u00e3o e da implanta\u00e7\u00e3o.<\/p>\n                    <\/div>\n\t\t        \n                    <div id=\"avaliar-as-vulnerabilidades-antes-de-serem-implementadas-tab\" class=\"clearfix eael-tab-content-item inactive\" data-title-link=\"avaliar-as-vulnerabilidades-antes-de-serem-implementadas-tab\">\n\t\t\t\t        <p>A maioria das solu\u00e7\u00f5es de verifica\u00e7\u00e3o de vulnerabilidades identifica as vulnerabilidades quando a aplica\u00e7\u00e3o \u00e9 instalada, o que cria uma janela de dete\u00e7\u00e3o que pode ser explorada. A tecnologia patenteada de avalia\u00e7\u00e3o de vulnerabilidades baseada em ficheiros de seguran\u00e7a inform\u00e1tica da OPSWAT (U.S. 9749349 B1) avalia e identifica vulnerabilidades utilizando bin\u00e1rios que est\u00e3o associados a componentes vulner\u00e1veis ou a vers\u00f5es espec\u00edficas de uma aplica\u00e7\u00e3o. D\u00e1 aos administradores de TI a oportunidade de:<\/p>\n<ul>\n<li>Antes da instala\u00e7\u00e3o, verifique se determinados tipos de software apresentam vulnerabilidades de seguran\u00e7a conhecidas<\/li>\n<li>Analisar os sistemas para detetar vulnerabilidades de seguran\u00e7a conhecidas quando os dispositivos est\u00e3o em repouso<\/li>\n<li>Verificar rapidamente as aplica\u00e7\u00f5es em execu\u00e7\u00e3o e as bibliotecas carregadas nelas para detetar vulnerabilidades de seguran\u00e7a<\/li>\n<\/ul>\n                    <\/div>\n\t\t                    <\/div>\n        <\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Avalia\u00e7\u00e3o da vulnerabilidade Avalia\u00e7\u00e3o da vulnerabilidade Detetar lacunas na seguran\u00e7a das aplica\u00e7\u00f5es antes da sua instala\u00e7\u00e3o A nossa tecnologia de avalia\u00e7\u00e3o de vulnerabilidades baseada em ficheiros detecta vulnerabilidades em aplica\u00e7\u00f5es e ficheiros antes de estes serem instalados. Utilizamos a nossa tecnologia patenteada (U.S. 9749349 B1) para correlacionar vulnerabilidades de seguran\u00e7a em componentes de software, instaladores [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":15645,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"class_list":["post-15790","page","type-page","status-publish","hentry"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15790","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/comments?post=15790"}],"version-history":[{"count":1,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15790\/revisions"}],"predecessor-version":[{"id":15792,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15790\/revisions\/15792"}],"up":[{"embeddable":true,"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/pages\/15645"}],"wp:attachment":[{"href":"https:\/\/ramsdata.com.pl\/pt-pt\/wp-json\/wp\/v2\/media?parent=15790"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}