sqlite-web 0.7.2
jinse.db
lives
Create
Query
lives
sqlite_sequence
Toggle helper tables
Structure
Content
Query
Insert
Drop
Import
Export
Update row 329449 in lives
id
Primary key.
INTEGER
live_id
169118
TEXT NOT NULL
title
黑客组织BlueMockingBird在数千台企业电脑中非法开采门罗币
TEXT
content
【黑客组织BlueMockingBird在数千台企业电脑中非法开采门罗币】安全公司红Red Canary最近发现,黑客组织BlueMockingBird瞄准了数千台企业电脑,非法开采加密货币。据悉,黑客特别针对运行ASP的面向公众的服务器,在获得访问服务器的权限后,黑客下载并安装门罗币挖掘应用程序XMRRig。(FinanceMagnates)
TEXT
content_prefix
黑客组织BlueMockingBird在数千台企业电脑中非法开采门罗币
TEXT
published_date
2020-05-26
TEXT
link_name
TEXT
link
TEXT
grade
INTEGER
created_at
2020-05-26 17:41:08
TEXT
created_at_unix
INTEGER
created_at_zh
2020-05-26
TEXT
updated_at
TEXT
source
TEXT
category
INTEGER
reading
INTEGER (default 0
flag
TEXT
attribute
TEXT
up_counts
INTEGER
down_counts
INTEGER
comment_count
INTEGER
highlight_color
TEXT
images
[]
TEXT
extra_type
INTEGER
extra
null
TEXT
is_show_comment
INTEGER
is_forbid_comment
INTEGER
show_source_name
TEXT
vote_id
INTEGER
vote
null
TEXT
zan_status
TEXT
readings
[]
TEXT
word_blocks
[]
TEXT
raw_data
{"id": 169118, "content": "【黑客组织BlueMockingBird在数千台企业电脑中非法开采门罗币】安全公司红Red Canary最近发现,黑客组织BlueMockingBird瞄准了数千台企业电脑,非法开采加密货币。据悉,黑客特别针对运行ASP的面向公众的服务器,在获得访问服务器的权限后,黑客下载并安装门罗币挖掘应用程序XMRRig。(FinanceMagnates)", "content_prefix": "黑客组织BlueMockingBird在数千台企业电脑中非法开采门罗币", "link_name": "", "link": "", "grade": 4, "sort": "", "category": 0, "highlight_color": "", "images": [], "created_at": 1590486068, "created_at_zh": "2020-05-26", "attribute": "", "up_counts": 168, "down_counts": 289, "zan_status": "", "readings": [], "extra_type": 0, "extra": null, "prev": null, "next": null, "word_blocks": [], "is_show_comment": 1, "is_forbid_comment": 0, "comment_count": 0, "analyst_user": null, "show_source_name": "", "vote_id": 0, "vote": null, "date": "2020-05-26"}
TEXT
saved_at
TIMESTAMP (default CURRENT_TIMESTAMP
Update
Cancel