{"id":344,"date":"2019-12-02T05:01:51","date_gmt":"2019-12-02T05:01:51","guid":{"rendered":"https:\/\/blog.mylighthost.com\/bn\/?p=344"},"modified":"2019-12-02T05:01:51","modified_gmt":"2019-12-02T05:01:51","slug":"malware-%e0%a6%95%e0%a6%bf-%e0%a6%ac%e0%a6%bf%e0%a6%ad%e0%a6%bf%e0%a6%a8%e0%a7%8d%e0%a6%a8-%e0%a6%aa%e0%a7%8d%e0%a6%b0%e0%a6%95%e0%a6%be%e0%a6%b0-malware-%e0%a6%b8%e0%a6%ae%e0%a7%8d%e0%a6%aa","status":"publish","type":"post","link":"https:\/\/blog.mylighthost.com\/bn\/2019\/12\/02\/malware-%e0%a6%95%e0%a6%bf-%e0%a6%ac%e0%a6%bf%e0%a6%ad%e0%a6%bf%e0%a6%a8%e0%a7%8d%e0%a6%a8-%e0%a6%aa%e0%a7%8d%e0%a6%b0%e0%a6%95%e0%a6%be%e0%a6%b0-malware-%e0%a6%b8%e0%a6%ae%e0%a7%8d%e0%a6%aa\/","title":{"rendered":"Malware \u0995\u09bf? \u09ac\u09bf\u09ad\u09bf\u09a8\u09cd\u09a8 \u09aa\u09cd\u09b0\u0995\u09be\u09b0  Malware \u09b8\u09ae\u09cd\u09aa\u09b0\u09cd\u0995\u09c7 \u0986\u09b2\u09cb\u099a\u09a8\u09be-"},"content":{"rendered":"\n<p style=\"font-size:17px\" class=\"has-text-color has-black-color\">Malware \u09b9\u09b2 Malicious Software \u098f\u09b0 \u098f\u0995\u099f\u09bf&nbsp; \u09b8\u0982\u0995\u09cd\u09b7\u09bf\u09aa\u09cd\u09a4 \u09b0\u09c2\u09aa\u0964 \u098f\u0996\u09be\u09a8\u09c7 Malicious \u09ae\u09be\u09a8\u09c7 \u0995\u09cd\u09b7\u09a4\u09bf\u0995\u09be\u09b0\u0995 \u09b8\u09c1\u09a4\u09b0\u09be\u0982 Malware \u09ae\u09be\u09a8\u09c7 \u09b9\u09b2 \u09b8\u09c7\u0987 \u09aa\u09cd\u09b0\u09cb\u0997\u09cd\u09b0\u09be\u09ae ( \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0, \u09ae\u09cb\u09ac\u09be\u0987\u09b2 ) \u09af\u09be \u09ac\u09bf\u09ad\u09bf\u09a8\u09cd\u09a8 \u09a1\u09bf\u09ad\u09be\u0987\u09b8\u0997\u09c1\u09b2\u09cb\u09b0 \u099c\u09a8\u09cd\u09af \u0995\u09cd\u09b7\u09a4\u09bf\u0995\u09be\u09b0\u0995 \u098f\u0995 \u09a7\u09b0\u09a8\u09c7\u09b0 \u09aa\u09cd\u09b0\u09cb\u0997\u09cd\u09b0\u09be\u09ae\u0964 \u098f\u099f\u09bf&nbsp; \u0995\u09cb\u09a8 \u09ad\u09c1\u09b2\u09a4\u09cd\u09b0\u09c1\u099f\u09bf  \u0995\u09be\u09b0\u09a8\u09c7 \u0986\u09aa\u09a8\u09be\u09b0  \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u09c7 \u09aa\u09cd\u09b0\u09ac\u09c7\u09b6 \u0995\u09b0\u09c7 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u0995\u09c7 \u09b8\u09cd\u09b2\u09cb \u0995\u09b0\u09c7 \u09a6\u09c7\u09af\u09bc \u0995\u09b0\u09c7 \u09a6\u09c7\u09af\u09bc \u098f\u09ae\u09a8\u0995\u09bf  \u09b9\u09be\u09b0\u09cd\u09a1\u09a1\u09bf\u09b8\u09cd\u0995\u0995\u09c7 \u09a8\u09b7\u09cd\u099f \u0995\u09b0\u09c7 \u09a6\u09bf\u09a4\u09c7\u0993  \u09aa\u09be\u09b0\u09c7\u0964&nbsp;<br><\/p>\n\n\n\n<figure class=\"wp-container-2 wp-block-gallery-1 wp-block-gallery columns-1 is-cropped\"><ul class=\"blocks-gallery-grid\"><li class=\"blocks-gallery-item\"><figure><img loading=\"lazy\" width=\"1024\" height=\"731\" src=\"https:\/\/blog.mylighthost.com\/bn\/wp-content\/uploads\/2019\/12\/what-is-malour-1-1-1024x731.jpeg\" alt=\"\" data-id=\"346\" data-full-url=\"https:\/\/blog.mylighthost.com\/bn\/wp-content\/uploads\/2019\/12\/what-is-malour-1-1.jpeg\" data-link=\"https:\/\/blog.mylighthost.com\/bn\/?attachment_id=346\" class=\"wp-image-346\" srcset=\"https:\/\/blog.mylighthost.com\/bn\/wp-content\/uploads\/2019\/12\/what-is-malour-1-1-1024x731.jpeg 1024w, https:\/\/blog.mylighthost.com\/bn\/wp-content\/uploads\/2019\/12\/what-is-malour-1-1-300x214.jpeg 300w, https:\/\/blog.mylighthost.com\/bn\/wp-content\/uploads\/2019\/12\/what-is-malour-1-1-768x549.jpeg 768w, https:\/\/blog.mylighthost.com\/bn\/wp-content\/uploads\/2019\/12\/what-is-malour-1-1-600x429.jpeg 600w, https:\/\/blog.mylighthost.com\/bn\/wp-content\/uploads\/2019\/12\/what-is-malour-1-1.jpeg 1050w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure><\/li><\/ul><\/figure>\n\n\n\n<p style=\"font-size:17px\" class=\"has-text-color has-black-color\">Malware \u098f\u09b0 \u0986\u0995\u09be\u09b0 \u09ac\u09bf\u09ad\u09bf\u09a8\u09cd\u09a8 \u09aa\u09cd\u09b0\u0995\u09be\u09b0\u09c7\u09b0 \u09af\u09c7\u09ae\u09a8 &#8211; \u099f\u09cd\u09b0\u09cb\u099c\u09be\u09a8(Trojans), \u09ad\u09be\u0987\u09b0\u09be\u09b8(Virus), \u0993\u09af\u09bc\u09be\u09b0\u09cd\u09ae (Worms), \u098f\u09a1\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 (Adware) \u098f\u09ac\u0982 \u09b8\u09cd\u09aa\u09be\u0987\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 (Spyware) \u098f\u09b0 \u09b9\u09af\u09bc\u09c7 \u09a5\u09be\u0995\u09c7 \u09a8\u09bf\u099a\u09c7 \u0986\u09b2\u09cb\u099a\u09a8\u09be \u0995\u09b0\u09be&nbsp; \u09b9\u09b2\u0983<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>\u099f\u09cd\u09b0\u09cb\u099c\u09be\u09a8(Trojans)-<\/strong><\/p>\n\n\n\n<p style=\"font-size:17px\" class=\"has-text-color has-black-color\">\u099f\u09cd\u09b0\u09cb\u099c\u09be\u09a8(Trojans)- \u09ae\u09cd\u09af\u09be\u09b2\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0&nbsp; \u09a8\u09be\u09ae\u0995\u09b0\u09a8 \u0995\u09b0\u09be \u09b9\u09af\u09bc Trojan Horse \u09a5\u09c7\u0995\u09c7 \u0964 \u099f\u09cd\u09b0\u09cb\u099c\u09be\u09a8(Trojans) \u098f\u09ae\u09a8 \u098f\u0995\u099f\u09bf malicious Computer Program \u09ac\u09be \u09ae\u09cd\u09af\u09be\u09b2\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 (malware) \u09af\u09be \u09a6\u09c7\u0996\u09a4\u09c7 \u0985\u09a8\u09c7\u0995\u099f\u09be \u09b8\u09cd\u09ab\u099f\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0\u09c7\u09b0 \u09ae\u09a4 \u0964 \u098f\u099f\u09bf malicious Computer Program \u09af\u09be &nbsp; \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u09c7  \u09b2\u09c1\u0995\u09bf\u09af\u09bc\u09c7 \u09a5\u09c7\u0995\u09c7 \u09ac\u09cd\u09af\u09ac\u09b9\u09be\u09b0\u0995\u09be\u09b0\u09c0\u0995\u09c7 \u0987\u09a8\u09cd\u09b8\u099f\u09b2 \u0995\u09b0\u09be\u09a4\u09c7 \u09ac\u09be\u09a7\u09cd\u09af \u0995\u09b0\u09c7 \u0964&nbsp;&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>\u09b8\u09cd\u09aa\u09be\u0987\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 (Spyware)-<\/strong><\/p>\n\n\n\n<p style=\"font-size:17px\" class=\"has-text-color has-black-color\">\u09b8\u09cd\u09aa\u09be\u0987\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 (Spyware) \u098f\u0995\u099f\u09bf \u09ae\u09cd\u09af\u09be\u09b2\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0\u0964 \u098f\u0996\u09be\u09a8\u09c7 Spy \u09ae\u09be\u09a8\u09c7 \u0997\u09c1\u09aa\u09cd\u09a4\u099a\u09b0 \u09af\u09be \u09ac\u09cd\u09af\u09ac\u09b9\u09be\u09b0\u0995\u09be\u09b0\u09c0\u0995\u09c7 \u09a8\u09be \u099c\u09be\u09a8\u09bf\u09af\u09bc\u09c7 \u09b2\u09c1\u0995\u09bf\u09af\u09bc\u09c7 \u09a4\u09be\u09b0 \u09b8\u0995\u09b2 \u0987\u09a8\u09ab\u09b0\u09ae\u09c7\u09b6\u09a8&nbsp; \u09b8\u0982\u0997\u09cd\u09b0\u09b9 \u0995\u09b0\u09c7 \u09b9\u09cd\u09af\u09be\u0995\u09be\u09b0\u09c7\u09b0 \u0995\u09be\u099b\u09c7 \u09a4\u09c1\u09b2\u09c7 \u09a6\u09c7\u09af\u09bc \u0964 \u09af\u09a6\u09bf\u0993 \u0995\u09bf\u099b\u09c1 \u09b8\u09cd\u09aa\u09be\u0987\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 (Spyware) \u09ac\u09c7\u09b6\u09bf \u0995\u09cd\u09b7\u09a4\u09bf\u0995\u09be\u09b0\u0995 \u09a8\u09be \u09b9\u09b2\u09c7\u0993 \u0995\u09bf\u099b\u09c1 \u0995\u09bf\u099b\u09c1 \u09b8\u09cd\u09aa\u09be\u0987\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 (Spyware) \u0986\u099b\u09c7 \u09af\u09be \u099f\u09cd\u09b0\u09cb\u099c\u09be\u09a8(Trojans) \u098f\u09b0 \u099a\u09c7\u09af\u09bc\u09c7\u0993 \u09ac\u09c7\u09b6 \u0995\u09cd\u09b7\u09a4\u09bf\u0995\u09be\u09b0\u0995 \u09b9\u09af\u09bc\u09c7 \u09af\u09be\u09af\u09bc \u09af\u0996\u09a8 \u098f\u099f\u09bf \u0986\u09aa\u09a8\u09be\u09b0 \u09b8\u0995\u09b2 \u0987\u09ae\u09c7\u099c, \u09ab\u09be\u0987\u09b2 \u09a1\u09be\u099f\u09be \u0985\u09a8\u09cd\u09af \u09ac\u09cd\u09af\u09ac\u09b9\u09be\u09b0\u0995\u09be\u09b0\u09bf\u09b0 \u0995\u09be\u099b\u09c7 \u09a6\u09bf\u09af\u09bc\u09c7 \u09a6\u09c7\u09af\u09bc \u0964&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>\u0993\u09af\u09bc\u09be\u09b0\u09cd\u09ae ( Worms)-<\/strong><\/p>\n\n\n\n<p style=\"font-size:17px\" class=\"has-text-color has-black-color\">Worms \u09b9\u09b2\u09cb \u09ae\u09cd\u09af\u09be\u09b2\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 \u0997\u09c1\u09b2\u09cb\u09b0 \u09ae\u09a7\u09cd\u09af\u09c7 \u09b8\u09ac\u099a\u09c7\u09af\u09bc\u09c7 \u09ac\u09c7\u09b6\u09bf \u09ae\u09be\u09b0\u09be\u0995\u09cd\u09a4\u0995 \u0964 Worms \u09a6\u09cd\u09ac\u09be\u09b0\u09be \u0986\u0995\u09cd\u09b0\u09be\u09a8\u09cd\u09a4 \u0995\u09cb\u09a8&nbsp; \u0995\u09cb\u09a8 \u09ab\u09be\u0987\u09b2 \u0987\u09a8\u09cd\u099f\u09be\u09b0\u09a8\u09c7\u099f\u09c7\u09b0 \u09ae\u09be\u09a7\u09cd\u09af\u09ae\u09c7 \u0985\u09a8\u09cd\u09af \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u09c7 \u09b8\u09cd\u09a5\u09be\u09a8\u09be\u09a8\u09cd\u09a4\u09b0 \u0995\u09b0\u09be \u09b9\u09b2\u09c7  \u09a4\u09be\u09b9\u09b2\u09c7 \u09b8\u09c7\u0987 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u09c7\u09b0 \u09aa\u09be\u09b6\u09be\u09aa\u09be\u09b6\u09bf \u09a4\u09be\u09b0 \u09a8\u09c7\u099f\u0993\u09af\u09bc\u09be\u09b0\u09cd\u0995 \u09b8\u09bf\u09b8\u09cd\u099f\u09c7\u09ae\u09c7\u0993 \u09b8\u09bf\u0995\u09bf\u0989\u09b0\u09bf\u099f\u09bf\u09b0 \u09b8\u09ae\u09b8\u09cd\u09af \u09b8\u09c3\u09b7\u09cd\u099f\u09bf \u0995\u09b0\u09c7 , \u09af\u09be \u0986\u09aa\u09a8\u09be\u09b0 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u0995\u09c7&nbsp; \u09b8\u09cd\u09b2\u09cb \u0995\u09b0\u09c7 \u09a6\u09c7\u09af\u09bc, \u098f\u09ae\u09a8\u0995\u09bf \u09b9\u09be\u09b0\u09cd\u09a1\u09a1\u09bf\u09b8\u09cd\u0995 \u09aa\u09b0\u09cd\u09af\u09a8\u09cd\u09a4 \u09a8\u09b7\u09cd\u099f \u0995\u09b0\u09c7 \u09a6\u09bf\u09a4\u09c7 \u09aa\u09be\u09b0\u09c7 \u0964&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>\u09ad\u09be\u0987\u09b0\u09be\u09b8(Virus)-&nbsp;<\/strong><\/p>\n\n\n\n<p style=\"font-size:17px\" class=\"has-text-color has-black-color\">\u09ad\u09be\u0987\u09b0\u09be\u09b8 \u098f\u09ae\u09a8 \u098f\u0995\u099f\u09bf \u0995\u09cd\u09b7\u09a4\u09bf\u0995\u09be\u09b0\u0995 Program \u09af\u09be&nbsp; \u0985\u09a8\u09cd\u09af \u0995\u09cb\u09a8 \u09b8\u09cd\u09ab\u099f\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0\u09c7\u09b0 \u09ae\u09be\u09a7\u09cd\u09af\u09ae\u09c7 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u09c7 \u09aa\u09cd\u09b0\u09ac\u09c7\u09b6 \u0995\u09b0\u09c7 \u098f\u09ac\u0982&nbsp; \u0995\u09ae\u09cd\u09aa\u09bf\u099f\u09be\u09b0\u09c7\u09b0 \u09b8\u0995\u09b2 \u0997\u09c1\u09b0\u09c1\u09a4\u09cd\u09a4\u09aa\u09c1\u09b0\u09cd\u09a8 \u09a4\u09a5\u09cd\u09af \u09ab\u09be\u0987\u09b2 \u09a8\u09b7\u09cd\u099f \u0995\u09b0\u09c7 \u09a6\u09c7\u09af\u09bc\u0964 \u09af\u09be\u09b0 \u09ab\u09b2\u09c7 \u09ab\u09be\u0987\u09b2\u0997\u09c1\u09b2\u09cb \u09aa\u09b0\u09ac\u09b0\u09cd\u09a4\u09bf\u09a4\u09c7 \u09ac\u09cd\u09af\u09ac\u09b9\u09be\u09b0\u09c7\u09b0 \u099c\u09a8\u09cd\u09af \u0986\u0995\u09c7\u099c\u09cb \u09b9\u09af\u09bc\u09c7 \u09af\u09be\u09af\u09bc\u0964&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>\u098f\u09a1\u0993\u09af\u09bc\u09cd\u09af\u09be\u09b0 (Adware)-<\/strong><\/p>\n\n\n\n<p style=\"font-size:17px\" class=\"has-text-color has-black-color\">\u098f\u099f\u09bf&nbsp; \u09b8\u09be\u09a7\u09be\u09b0\u09a8\u09a4 \u0987\u09a8\u09cd\u099f\u09be\u09b0\u09a8\u09c7\u099f \u09a5\u09c7\u0995\u09c7 \u0995\u09cb\u09a8 \u0995\u09bf\u099b\u09c1 \u09a1\u09be\u0989\u09a8\u09b2\u09cb\u09a1 \u0995\u09b0\u09be\u09b0 \u09ae\u09be\u09a7\u09cd\u09af\u09ae\u09c7 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u09c7 \u09aa\u09cd\u09b0\u09ac\u09c7\u09b6 \u0995\u09b0\u09c7 \u0964 \u09af\u09be\u09b0 \u09ab\u09b2\u09c7 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u0995\u09c7&nbsp; \u09b8\u09cd\u09b2\u09cb \u0995\u09b0\u09c7 \u09a6\u09c7\u09af\u09bc, \u098f\u09ae\u09a8\u0995\u09bf \u09b9\u09be\u09b0\u09cd\u09a1\u09a1\u09bf\u09b8\u09cd\u0995 \u09aa\u09b0\u09cd\u09af\u09a8\u09cd\u09a4 \u09a8\u09b7\u09cd\u099f \u0995\u09b0\u09c7 \u09a6\u09bf\u09a4\u09c7 \u09aa\u09be\u09b0\u09c7 \u0964&nbsp;<br><\/p>\n\n\n\n<p style=\"font-size:17px\" class=\"has-text-color has-black-color\">\u09aa\u09b0\u09bf\u09b6\u09c7\u09b7\u09c7 \u09ac\u09b2\u09be \u09af\u09be\u09af\u09bc \u09af\u09c7, \u098f\u0987 \u0986\u09b0\u09cd\u099f\u09bf\u0995\u09c7\u09b2\u09c7 \u0986\u09ae\u09b0\u09be Malware \u0995\u09bf \u098f\u09ac\u0982&nbsp; Malware \u098f\u09b0 \u0986\u0995\u09be\u09b0 \u09ac\u09bf\u09ad\u09bf\u09a8\u09cd\u09a8 \u09aa\u09cd\u09b0\u0995\u09be\u09b0\u09c7\u09b0 \u09b8\u09c7 \u09b8\u09ae\u09cd\u09aa\u09b0\u09cd\u0995\u09c7 \u0986\u09b2\u09cb\u099a\u09a8\u09be \u0995\u09b0\u09c7\u099b\u09bf\u0964 &nbsp;\u09a4\u09be\u0987 \u0986\u09aa\u09a8\u09be\u09b0 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u0995\u09c7 malware \u09ae\u09c1\u0995\u09cd\u09a4 \u09b0\u09be\u0996\u09a4\u09c7 \u099a\u09be\u0987\u09b2\u09c7 \u098f\u0995\u099f\u09bf <a href=\"https:\/\/blog.mylighthost.com\/bn\/\">\u09ad\u09be\u09b2\u09cb\u09ae\u09be\u09a8\u09c7\u09b0 anti-malware <\/a>\u09ac\u09cd\u09af\u09ac\u09b9\u09be\u09b0 \u0995\u09b0\u09a4\u09c7 \u09b9\u09ac\u09c7 \u0964 &nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Malware \u09b9\u09b2 Malicious Software \u098f\u09b0 \u098f\u0995\u099f\u09bf&nbsp; \u09b8\u0982\u0995\u09cd\u09b7\u09bf\u09aa\u09cd\u09a4 \u09b0\u09c2\u09aa\u0964 \u098f\u0996\u09be\u09a8\u09c7 Malicious \u09ae\u09be\u09a8\u09c7 \u0995\u09cd\u09b7\u09a4\u09bf\u0995\u09be\u09b0\u0995 \u09b8\u09c1\u09a4\u09b0\u09be\u0982 Malware \u09ae\u09be\u09a8\u09c7 \u09b9\u09b2 \u09b8\u09c7\u0987 \u09aa\u09cd\u09b0\u09cb\u0997\u09cd\u09b0\u09be\u09ae ( \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0, \u09ae\u09cb\u09ac\u09be\u0987\u09b2 ) \u09af\u09be \u09ac\u09bf\u09ad\u09bf\u09a8\u09cd\u09a8 \u09a1\u09bf\u09ad\u09be\u0987\u09b8\u0997\u09c1\u09b2\u09cb\u09b0 \u099c\u09a8\u09cd\u09af \u0995\u09cd\u09b7\u09a4\u09bf\u0995\u09be\u09b0\u0995 \u098f\u0995 \u09a7\u09b0\u09a8\u09c7\u09b0 \u09aa\u09cd\u09b0\u09cb\u0997\u09cd\u09b0\u09be\u09ae\u0964 \u098f\u099f\u09bf&nbsp; \u0995\u09cb\u09a8 \u09ad\u09c1\u09b2\u09a4\u09cd\u09b0\u09c1\u099f\u09bf \u0995\u09be\u09b0\u09a8\u09c7 \u0986\u09aa\u09a8\u09be\u09b0 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u09c7 \u09aa\u09cd\u09b0\u09ac\u09c7\u09b6 \u0995\u09b0\u09c7 \u0995\u09ae\u09cd\u09aa\u09bf\u0989\u099f\u09be\u09b0\u0995\u09c7 \u09b8\u09cd\u09b2\u09cb \u0995\u09b0\u09c7 \u09a6\u09c7\u09af\u09bc \u0995\u09b0\u09c7 \u09a6\u09c7\u09af\u09bc \u098f\u09ae\u09a8\u0995\u09bf \u09b9\u09be\u09b0\u09cd\u09a1\u09a1\u09bf\u09b8\u09cd\u0995\u0995\u09c7 \u09a8\u09b7\u09cd\u099f \u0995\u09b0\u09c7 \u09a6\u09bf\u09a4\u09c7\u0993 \u09aa\u09be\u09b0\u09c7\u0964&nbsp; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":345,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[5],"tags":[],"_links":{"self":[{"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/posts\/344"}],"collection":[{"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/comments?post=344"}],"version-history":[{"count":1,"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/posts\/344\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/posts\/344\/revisions\/347"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/media\/345"}],"wp:attachment":[{"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/media?parent=344"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/categories?post=344"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mylighthost.com\/bn\/wp-json\/wp\/v2\/tags?post=344"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}