{"id":13758,"date":"2024-02-05T18:02:35","date_gmt":"2024-02-05T17:02:35","guid":{"rendered":"https:\/\/amcef.com\/?p=13758"},"modified":"2024-02-05T18:02:37","modified_gmt":"2024-02-05T17:02:37","slug":"virusy-v-pocitaci","status":"publish","type":"post","link":"https:\/\/amcef.com\/cz\/zaujimavosti\/virusy-v-pocitaci\/","title":{"rendered":"Viry v po\u010d\u00edta\u010di - jak\u00e9 jsou nej\u010dast\u011bj\u0161\u00ed?"},"content":{"rendered":"<p>Po\u010d\u00edta\u010dov\u00e9 viry jsou \u0161kodliv\u00e9 programy, kter\u00e9 jsou schopny infikovat po\u010d\u00edta\u010de a \u0161\u00ed\u0159it se prost\u0159ednictv\u00edm r\u016fzn\u00fdch m\u00e9di\u00ed. Tyto \u0161kodliv\u00e9 programy jsou navr\u017eeny tak, aby naru\u0161ovaly norm\u00e1ln\u00ed fungov\u00e1n\u00ed po\u010d\u00edta\u010d\u016f, shroma\u017e\u010fovaly citliv\u00e9 informace nebo zp\u016fsobovaly jin\u00e9 typy \u0161kod. Viry se mohou \u0161\u00ed\u0159it prost\u0159ednictv\u00edm soubor\u016f, e-mail\u016f, webov\u00fdch str\u00e1nek a dal\u0161\u00edch online zdroj\u016f.<\/p>\n\n\n\n<p>Charakteristick\u00fdm rysem po\u010d\u00edta\u010dov\u00fdch vir\u016f je jejich schopnost replikace a \u0161\u00ed\u0159en\u00ed do dal\u0161\u00edch \u010d\u00e1st\u00ed syst\u00e9mu nebo do jin\u00fdch po\u010d\u00edta\u010d\u016f v s\u00edti. Tento proces umo\u017e\u0148uje vir\u016fm rychl\u00e9 \u0161\u00ed\u0159en\u00ed a infikov\u00e1n\u00ed mnoha za\u0159\u00edzen\u00ed.<\/p>\n\n\n\n<p>Po\u010d\u00edta\u010dov\u00e9 viry mohou m\u00edt mnoho podob a \u00fa\u010del\u016f, od sledov\u00e1n\u00ed \u010dinnosti u\u017eivatele pomoc\u00ed spywaru p\u0159es blokov\u00e1n\u00ed p\u0159\u00edstupu k d\u016fle\u017eit\u00fdm soubor\u016fm pomoc\u00ed ransomwaru a\u017e po vytv\u00e1\u0159en\u00ed ne\u017e\u00e1douc\u00ed reklamy pomoc\u00ed adwaru. Pro u\u017eivatele po\u010d\u00edta\u010d\u016f je velmi d\u016fle\u017eit\u00e9, aby t\u011bmto hrozb\u00e1m rozum\u011bli a p\u0159ijali opat\u0159en\u00ed na ochranu sv\u00fdch za\u0159\u00edzen\u00ed.<\/p>\n\n\n\n<div style=\"height:34px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Jak se po\u010d\u00edta\u010dov\u00e9 viry \u0161\u00ed\u0159\u00ed?<\/h2>\n\n\n\n<p>Po\u010d\u00edta\u010dov\u00e9 viry se \u0161\u00ed\u0159\u00ed r\u016fzn\u00fdmi zp\u016fsoby s c\u00edlem co nej\u00fa\u010dinn\u011bji infikovat a naru\u0161it za\u0159\u00edzen\u00ed. N\u00ed\u017ee jsou uvedeny n\u011bkter\u00e9 zp\u016fsoby \u0161\u00ed\u0159en\u00ed vir\u016f a jejich vliv na napaden\u00e9 po\u010d\u00edta\u010de:<\/p>\n\n\n\n<p><strong>Odes\u00edl\u00e1n\u00ed prost\u0159ednictv\u00edm e-mail\u016f:<\/strong> Po\u010d\u00edta\u010dov\u00e9 viry \u010dasto vyu\u017e\u00edvaj\u00ed metodu odes\u00edl\u00e1n\u00ed prost\u0159ednictv\u00edm e-mail\u016f. U\u017eivatel\u00e9 mohou b\u00fdt nal\u00e1k\u00e1ni k otev\u0159en\u00ed podez\u0159el\u00fdch p\u0159\u00edloh e-mail\u016f nebo ke kliknut\u00ed na odkazy obsa\u017een\u00e9 v t\u011bchto zpr\u00e1v\u00e1ch.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Webov\u00e9 str\u00e1nky a soubory ke sta\u017een\u00ed:<\/strong> Po\u010d\u00edta\u010dov\u00e9 viry se mohou \u0161\u00ed\u0159it prost\u0159ednictv\u00edm neov\u011b\u0159en\u00fdch webov\u00fdch str\u00e1nek nebo neleg\u00e1ln\u00edch zdroj\u016f, odkud si u\u017eivatel\u00e9 nev\u011bdomky st\u00e1hnou \u0161kodliv\u00fd soubor.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Sd\u00edlen\u00ed infikovan\u00fdch soubor\u016f:<\/strong> Infikovan\u00e9 soubory se mohou \u0161\u00ed\u0159it sd\u00edlen\u00edm na r\u016fzn\u00fdch m\u00e9di\u00edch, jako jsou USB kl\u00ed\u010denky, extern\u00ed pevn\u00e9 disky a dal\u0161\u00ed za\u0159\u00edzen\u00ed. U\u017eivatel\u00e9, kte\u0159\u00ed sd\u00edlej\u00ed soubory, mohou ne\u00famysln\u011b p\u0159en\u00e9st viry do jin\u00fdch po\u010d\u00edta\u010d\u016f.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p><strong>Zneu\u017e\u00edv\u00e1n\u00ed softwarov\u00fdch chyb:<\/strong> V n\u011bkter\u00fdch p\u0159\u00edpadech viry vyu\u017e\u00edvaj\u00ed chyby v softwaru nebo opera\u010dn\u00edm syst\u00e9mu a infikuj\u00ed po\u010d\u00edta\u010d. Tyto chyby se mohou vyskytovat ve verz\u00edch softwaru, kter\u00e9 nebyly aktualizov\u00e1ny.<\/p>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Nej\u010dast\u011bj\u0161\u00ed typy vir\u016f v po\u010d\u00edta\u010di<\/h2>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Adware a spyware<\/h3>\n\n\n\n<p>Co je adware?<\/p>\n\n\n\n<p>Adware je typ po\u010d\u00edta\u010dov\u00e9ho viru, kter\u00fd se \u0161\u00ed\u0159\u00ed a zobrazuje na napaden\u00e9m po\u010d\u00edta\u010di ne\u017e\u00e1douc\u00ed reklamy. Do syst\u00e9mu se \u010dasto dost\u00e1v\u00e1 jako sou\u010d\u00e1st bezplatn\u00e9ho softwaru, kter\u00fd si u\u017eivatel\u00e9 stahuj\u00ed. Adware m\u016f\u017ee sledovat \u010dinnost u\u017eivatele a p\u0159izp\u016fsobovat zobrazovan\u00e9 reklamy podle jeho chov\u00e1n\u00ed.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Jak se spyware projevuje?<\/p>\n\n\n\n<p>Spyware je forma po\u010d\u00edta\u010dov\u00e9ho viru ur\u010den\u00e1 ke sledov\u00e1n\u00ed a shroma\u017e\u010fov\u00e1n\u00ed informac\u00ed o u\u017eivateli bez jeho v\u011bdom\u00ed nebo souhlasu. Tento typ \u0161kodliv\u00e9ho softwaru m\u016f\u017ee sledovat zvyky p\u0159i proch\u00e1zen\u00ed webu, zaznamen\u00e1vat kl\u00e1vesnici a dokonce odes\u00edlat citliv\u00e9 informace, jako jsou p\u0159ihla\u0161ovac\u00ed \u00fadaje k bankovn\u00edmu \u00fa\u010dtu. U\u017eivatel\u00e9 mohou b\u00fdt posti\u017eeni ne\u017e\u00e1douc\u00edm zpomalen\u00edm syst\u00e9mu a ohro\u017een\u00edm sv\u00e9ho soukrom\u00ed.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Ransomware<\/h3>\n\n\n\n<p>Jak ransomware funguje?<\/p>\n\n\n\n<p>Ransomware je nebezpe\u010dn\u00fd typ po\u010d\u00edta\u010dov\u00e9ho viru, kter\u00fd za\u0161ifruje data v napaden\u00e9m za\u0159\u00edzen\u00ed a za jejich obnoven\u00ed po\u017eaduje od u\u017eivatele v\u00fdkupn\u00e9. Tento typ \u00fatoku \u010dasto blokuje p\u0159\u00edstup k soubor\u016fm a m\u016f\u017ee posti\u017een\u00fdm zp\u016fsobit v\u00e1\u017en\u00e9 finan\u010dn\u00ed ztr\u00e1ty. Ransomware se \u010dasto \u0161\u00ed\u0159\u00ed prost\u0159ednictv\u00edm p\u0159\u00edloh e-mail\u016f nebo infikovan\u00fdch webov\u00fdch str\u00e1nek.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>P\u0159\u00edklady zn\u00e1m\u00fdch \u00fatok\u016f ransomwaru:<\/p>\n\n\n\n<p>Mezi zn\u00e1m\u00e9 p\u0159\u00edklady ransomwaru pat\u0159\u00ed WannaCry, NotPetya a Ryuk. Tyto \u00fatoky m\u011bly rozs\u00e1hl\u00fd dopad na r\u016fzn\u00e1 odv\u011btv\u00ed a zd\u016fraznily v\u00fdznam prevence a rychl\u00e9 reakce na tyto hrozby.<\/p>\n\n\n\n<div style=\"height:33px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Trojsk\u00fd k\u016f\u0148<\/h3>\n\n\n\n<p>Charakteristika trojsk\u00fdch kon\u00ed<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Trojsk\u00fd k\u016f\u0148 je typ po\u010d\u00edta\u010dov\u00e9ho viru, kter\u00fd se maskuje jako ne\u0161kodn\u00fd nebo u\u017eite\u010dn\u00fd program, ale ve skute\u010dnosti m\u00e1 \u0161kodliv\u00fd \u00fa\u010dinek. Trojsk\u00fd k\u016f\u0148 m\u016f\u017ee otev\u0159\u00edt br\u00e1nu pro dal\u0161\u00ed \u0161kodliv\u00fd software, shroma\u017e\u010fovat citliv\u00e9 informace nebo poskytovat vzd\u00e1len\u00fd p\u0159\u00edstup k napaden\u00e9mu za\u0159\u00edzen\u00ed.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>P\u0159\u00edklady \u00fatok\u016f trojsk\u00fdch kon\u00ed:<\/p>\n\n\n\n<p>Mezi p\u0159\u00edklady trojsk\u00fdch kon\u00ed pat\u0159\u00ed Zeus, kter\u00fd byl navr\u017een ke kr\u00e1de\u017ei bankovn\u00edch informac\u00ed, a Emotet, kter\u00fd byl pou\u017e\u00edv\u00e1n k \u0161\u00ed\u0159en\u00ed dal\u0161\u00edho malwaru a spamu.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Keyloggery<\/h3>\n\n\n\n<p>Keyloggery jsou programy, kter\u00e9 zaznamen\u00e1vaj\u00ed v\u0161echny kl\u00e1vesy stisknut\u00e9 na kl\u00e1vesnici. Pou\u017e\u00edvaj\u00ed se ke sledov\u00e1n\u00ed \u010dinnosti u\u017eivatele a \u010dasto slou\u017e\u00ed k z\u00edsk\u00e1n\u00ed p\u0159ihla\u0161ovac\u00edch \u00fadaj\u016f.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Rootkity<\/h3>\n\n\n\n<p>Rootkity jsou sofistikovan\u00fd malware, kter\u00fd skr\u00fdv\u00e1 p\u0159\u00edtomnost jin\u00e9ho malwaru nebo neopr\u00e1vn\u011bn\u00fd p\u0159\u00edstup do syst\u00e9mu. Dok\u00e1\u017eou skr\u00fdt svou existenci a manipulovat s opera\u010dn\u00edm syst\u00e9mem.<\/p>\n\n\n\n<div style=\"height:26px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Celkov\u011b tyto formy po\u010d\u00edta\u010dov\u00fdch vir\u016f p\u0159edstavuj\u00ed v\u00e1\u017en\u00e9 bezpe\u010dnostn\u00ed hrozby a je nutn\u00e9, aby u\u017eivatel\u00e9 p\u0159ijali proaktivn\u00ed opat\u0159en\u00ed na ochranu sv\u00fdch za\u0159\u00edzen\u00ed a citliv\u00fdch informac\u00ed. Ochrana zahrnuje pou\u017e\u00edv\u00e1n\u00ed aktualizovan\u00e9ho antivirov\u00e9ho softwaru, opatrnost p\u0159i stahov\u00e1n\u00ed soubor\u016f a pravideln\u00e9 z\u00e1lohov\u00e1n\u00ed dat.<\/p>\n\n\n\n<div style=\"height:31px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Jak se chr\u00e1nit p\u0159ed po\u010d\u00edta\u010dov\u00fdmi viry?<\/h2>\n\n\n\n<p>Prevence po\u010d\u00edta\u010dov\u00fdch vir\u016f a ochrana p\u0159ed nimi je kl\u00ed\u010dem k zaji\u0161t\u011bn\u00ed bezpe\u010dnosti za\u0159\u00edzen\u00ed a citliv\u00fdch informac\u00ed u\u017eivatel\u016f. K minimalizaci rizika infekce a ochran\u011b p\u0159ed potenci\u00e1ln\u00edmi hrozbami jsou nezbytn\u00e1 n\u00e1sleduj\u00edc\u00ed opat\u0159en\u00ed:<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Aktualizace softwaru a opera\u010dn\u00edho syst\u00e9mu:<\/h3>\n\n\n\n<p>Aktualizace softwaru a opera\u010dn\u00edho syst\u00e9mu je jedn\u00edm z nejd\u016fle\u017eit\u011bj\u0161\u00edch opat\u0159en\u00ed pro zabezpe\u010den\u00ed po\u010d\u00edta\u010de. V\u00fdvoj\u00e1\u0159i pravideln\u011b vyd\u00e1vaj\u00ed aktualizace, kter\u00e9 obsahuj\u00ed z\u00e1platy zji\u0161t\u011bn\u00fdch bezpe\u010dnostn\u00edch chyb. Pokud syst\u00e9m nekontrolujete a neaktualizujete, m\u016f\u017ee b\u00fdt v\u00e1\u0161 po\u010d\u00edta\u010d vystaven zn\u00e1m\u00fdm bezpe\u010dnostn\u00edm hrozb\u00e1m. U\u017eivatel\u00e9 by m\u011bli povolit automatick\u00e9 aktualizace, aby byli v bezpe\u010d\u00ed p\u0159ed nejnov\u011bj\u0161\u00edmi hrozbami a zranitelnostmi.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Antivirov\u00fd software a br\u00e1na firewall:<\/h3>\n\n\n\n<p>Kl\u00ed\u010dem k zabezpe\u010den\u00ed je instalace spolehliv\u00e9ho antivirov\u00e9ho softwaru a spr\u00e1vn\u00e9 nastaven\u00ed br\u00e1ny firewall. Antivirov\u00fd program skenuje syst\u00e9m a odstra\u0148uje \u0161kodliv\u00fd software, \u010d\u00edm\u017e zaji\u0161\u0165uje ochranu p\u0159ed zn\u00e1m\u00fdmi i nezn\u00e1m\u00fdmi hrozbami. Br\u00e1na firewall funguje jako ochrann\u00fd \u0161t\u00edt, kter\u00fd kontroluje p\u0159\u00edstup k po\u010d\u00edta\u010di a monitoruje s\u00ed\u0165ovou komunikaci. U\u017eivatel\u00e9 by m\u011bli pravideln\u011b aktualizovat antivirov\u00fd software a sledovat nastaven\u00ed br\u00e1ny firewall pro dosa\u017een\u00ed maxim\u00e1ln\u00ed \u00fa\u010dinnosti.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading has-medium-font-size\">Pozor p\u0159i otev\u00edr\u00e1n\u00ed e-mail\u016f a stahov\u00e1n\u00ed soubor\u016f:<\/h3>\n\n\n\n<p>Mnoho po\u010d\u00edta\u010dov\u00fdch vir\u016f se \u0161\u00ed\u0159\u00ed prost\u0159ednictv\u00edm nezabezpe\u010den\u00fdch e-mail\u016f a soubor\u016f sta\u017een\u00fdch z podez\u0159el\u00fdch zdroj\u016f. U\u017eivatel\u00e9 by m\u011bli b\u00fdt opatrn\u00ed p\u0159i otev\u00edr\u00e1n\u00ed e-mail\u016f od nezn\u00e1m\u00fdch odes\u00edlatel\u016f a nem\u011bli by otev\u00edrat p\u0159\u00edlohy nebo klikat na odkazy, pokud nejsou ov\u011b\u0159eny. Software nebo soubory by se m\u011bly stahovat pouze z d\u016fv\u011bryhodn\u00fdch zdroj\u016f a ofici\u00e1ln\u00edch webov\u00fdch str\u00e1nek. K minimalizaci rizika m\u016f\u017ee p\u0159isp\u011bt tak\u00e9 pou\u017e\u00edv\u00e1n\u00ed zabezpe\u010den\u00fdch webov\u00fdch prohl\u00ed\u017ee\u010d\u016f s funkcemi kontroly \u0161kodliv\u00fdch str\u00e1nek.<\/p>\n\n\n\n<div style=\"height:15px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Z\u00e1v\u011br<\/h2>\n\n\n\n<p>V boji proti po\u010d\u00edta\u010dov\u00fdm vir\u016fm je d\u016fle\u017eit\u00e9 porozum\u011bt jejich r\u016fzn\u00fdm form\u00e1m a zav\u00e9st \u00fa\u010dinn\u00e1 preventivn\u00ed opat\u0159en\u00ed. Aktualizace softwaru, pou\u017e\u00edv\u00e1n\u00ed antivirov\u00e9ho softwaru a br\u00e1ny firewall a opatrnost p\u0159i pr\u00e1ci s e-maily a soubory jsou nezbytn\u00e9 pro minimalizaci rizika n\u00e1kazy. Modern\u00ed digit\u00e1ln\u00ed sv\u011bt p\u0159in\u00e1\u0161\u00ed nov\u00e9 hrozby, proto je d\u016fle\u017eit\u00e9 sledovat nejnov\u011bj\u0161\u00ed trendy v oblasti kybernetick\u00e9 bezpe\u010dnosti. Spolu s t\u00edm je d\u016fle\u017eit\u00e9 m\u00edt na pam\u011bti, \u017ee bezpe\u010dnost je kolektivn\u00ed zodpov\u011bdnost a ka\u017ed\u00fd u\u017eivatel m\u00e1 svou roli p\u0159i ochran\u011b nejen sv\u00e9ho za\u0159\u00edzen\u00ed, ale i cel\u00e9 online komunity. Neust\u00e1l\u00e9 zlep\u0161ov\u00e1n\u00ed opat\u0159en\u00ed a vzd\u011bl\u00e1v\u00e1n\u00ed jsou kl\u00ed\u010dem k bezpe\u010dn\u00e9mu digit\u00e1ln\u00edmu prost\u0159ed\u00ed.<\/p>\n\n\n\n<p>Pokud pot\u0159ebujete konzultaci nebo radu, obra\u0165te se na spole\u010dnost Amcef.<\/p>","protected":false},"excerpt":{"rendered":"<p>V\u00edrusy v po\u010d\u00edta\u010di predstavuj\u00fa \u0161kodliv\u00fd softv\u00e9r, ktor\u00fd je schopn\u00fd infikova\u0165 po\u010d\u00edta\u010de a \u0161\u00edri\u0165 sa prostredn\u00edctvom r\u00f4znych m\u00e9di\u00ed. Tieto malv\u00e9ry s\u00fa navrhnut\u00e9 s cie\u013eom naru\u0161i\u0165 norm\u00e1lne fungovanie po\u010d\u00edta\u010dov, zhroma\u017e\u010fova\u0165 citliv\u00e9 inform\u00e1cie alebo sp\u00f4sobi\u0165 in\u00fd druh \u0161kody. V\u00edrusy sa m\u00f4\u017eu \u0161\u00edri\u0165 prostredn\u00edctvom s\u00faborov, e-mailov, webov\u00fdch str\u00e1nok a \u010fal\u0161\u00edch online zdrojov. Charakteristick\u00fdm rysom po\u010d\u00edta\u010dov\u00fdch v\u00edrusov je ich schopnos\u0165 [&hellip;]<\/p>","protected":false},"author":13,"featured_media":13760,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[99],"tags":[],"class_list":["post-13758","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-zaujimavosti"],"acf":[],"_links":{"self":[{"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/posts\/13758","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/comments?post=13758"}],"version-history":[{"count":2,"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/posts\/13758\/revisions"}],"predecessor-version":[{"id":13761,"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/posts\/13758\/revisions\/13761"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/media\/13760"}],"wp:attachment":[{"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/media?parent=13758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/categories?post=13758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/amcef.com\/cz\/wp-json\/wp\/v2\/tags?post=13758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}