{"version":"1.0","provider_name":"Tech masters","provider_url":"https:\/\/security-its.com","author_name":"admin","author_url":"https:\/\/security-its.com\/index.php\/author\/tarek\/","title":"Light Current - Tech masters","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"qO5bafZAmO\"><a href=\"https:\/\/security-its.com\/index.php\/light-current\/\">Light Current<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/security-its.com\/index.php\/light-current\/embed\/#?secret=qO5bafZAmO\" width=\"600\" height=\"338\" title=\"&#8220;Light Current&#8221; &#8212; Tech masters\" data-secret=\"qO5bafZAmO\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/*! This file is auto-generated *\/\n!function(c,d){\"use strict\";var e=!1,o=!1;if(d.querySelector)if(c.addEventListener)e=!0;if(c.wp=c.wp||{},c.wp.receiveEmbedMessage);else if(c.wp.receiveEmbedMessage=function(e){var t=e.data;if(!t);else if(!(t.secret||t.message||t.value));else if(\/[^a-zA-Z0-9]\/.test(t.secret));else{for(var r,s,a,i=d.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),n=d.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),o=new RegExp(\"^https?:$\",\"i\"),l=0;l<n.length;l++)n[l].style.display=\"none\";for(l=0;l<i.length;l++)if(r=i[l],e.source!==r.contentWindow);else{if(r.removeAttribute(\"style\"),\"height\"===t.message){if(1e3<(s=parseInt(t.value,10)))s=1e3;else if(~~s<200)s=200;r.height=s}if(\"link\"===t.message)if(s=d.createElement(\"a\"),a=d.createElement(\"a\"),s.href=r.getAttribute(\"src\"),a.href=t.value,!o.test(a.protocol));else if(a.host===s.host)if(d.activeElement===r)c.top.location.href=t.value}}},e)c.addEventListener(\"message\",c.wp.receiveEmbedMessage,!1),d.addEventListener(\"DOMContentLoaded\",t,!1),c.addEventListener(\"load\",t,!1);function t(){if(o);else{o=!0;for(var e,t,r,s=-1!==navigator.appVersion.indexOf(\"MSIE 10\"),a=!!navigator.userAgent.match(\/Trident.*rv:11\\.\/),i=d.querySelectorAll(\"iframe.wp-embedded-content\"),n=0;n<i.length;n++){if(!(r=(t=i[n]).getAttribute(\"data-secret\")))r=Math.random().toString(36).substr(2,10),t.src+=\"#?secret=\"+r,t.setAttribute(\"data-secret\",r);if(s||a)(e=t.cloneNode(!0)).removeAttribute(\"security\"),t.parentNode.replaceChild(e,t);t.contentWindow.postMessage({message:\"ready\",secret:r},\"*\")}}}}(window,document);\n<\/script>\n","thumbnail_url":"https:\/\/security-its.com\/wp-content\/uploads\/2021\/10\/102943056_114174670326216_1675393304959584604_n.jpg","thumbnail_width":952,"thumbnail_height":342,"description":"Access Control Access control is a fundamental component of data security that dictates who\u2019s allowed to access and use company information and resources. Fire Alarm A fire alarm is a standalone device or a complete network of devices, installed in a building or an area, which gives audible and\/or visible warning of an outbreak of fire in that building or area. CCTV &amp; IP Cam An Internet Protocol camera, or IP camera, is a type of digital video camera that receives control data and sends image data via an IP network. Intrusion system An intrusion detection system (IDS) is a device or software application that monitors a network for malicious activity or policy violations. Sound System A sound system is a set of equipment for playing recorded music, or for making a band&#8217;s music able to be heard by everyone at a concert. Solar Energy Solar power is energy from&hellip;  Read more"}