{"version":"1.0","provider_name":"LACNIC Blog","provider_url":"https:\/\/blog.lacnic.net\/en\/","title":"LACNIC Blog | OpenNetaudit \u2013 Frida 2020 \u00a0","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"VwArI3T4IN\"><a href=\"https:\/\/blog.lacnic.net\/en\/opennetaudit-frida-2020\/\">OpenNetaudit \u2013 Frida 2020 \u00a0<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/blog.lacnic.net\/en\/opennetaudit-frida-2020\/embed\/#?secret=VwArI3T4IN\" width=\"600\" height=\"338\" title=\"&#8220;OpenNetaudit \u2013 Frida 2020 \u00a0&#8221; &#8212; LACNIC Blog\" data-secret=\"VwArI3T4IN\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/blog.lacnic.net\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","thumbnail_url":"https:\/\/blog.lacnic.net\/wp-content\/uploads\/2022\/03\/frida-imagen-2022.png","thumbnail_width":680,"thumbnail_height":330,"description":"By Guilherme Ladvocat It is in the day to day of network, security and IT teams, tasks like configuring network devices in a reliable and secure manner. Generally, each organization or team has its own templates to use when configuring new devices. As technicians think differently and have differences in skills and knowledge, many times [&hellip;]"}