{"version":"1.0","provider_name":"Siri Innovations","provider_url":"https:\/\/siriinnovations.com\/blog","author_name":"admin","author_url":"https:\/\/siriinnovations.com\/blog\/author\/admin\/","title":"History & Timeline of Hacking - Siri Innovations","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"trnfgP6Cx3\"><a href=\"https:\/\/siriinnovations.com\/blog\/history-of-hacking\/\">History &#038; Timeline of Hacking<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/siriinnovations.com\/blog\/history-of-hacking\/embed\/#?secret=trnfgP6Cx3\" width=\"600\" height=\"338\" title=\"&#8220;History &#038; Timeline of Hacking&#8221; &#8212; Siri Innovations\" data-secret=\"trnfgP6Cx3\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/siriinnovations.com\/blog\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/siriinnovations.com\/blog\/wp-content\/uploads\/2013\/07\/hacking2.png","thumbnail_width":640,"thumbnail_height":220,"description":"History of Hacking The whistleblower WikiLeaks is the hot fuzz goosing over the internet. So, how this anonymous site gained a sound alarm of the tech geeks around the globe, thanks to Hacking for lending an indirect impact on this. Let\u2019s see now what actually hacking is. Hacking is not limited to computers. The real [&hellip;]"}