{"id":2536,"date":"2024-07-16T23:19:57","date_gmt":"2024-07-16T23:19:57","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=2536"},"modified":"2024-07-16T23:52:07","modified_gmt":"2024-07-16T23:52:07","slug":"ost-%ed%8c%8c%ec%9d%bc-%ec%97%ac%eb%8a%94-%eb%b0%a9%eb%b2%95","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/ko\/%eb%b9%84%ec%a6%88%eb%8b%88%ec%8a%a4-%eb%8d%b0%ec%9d%b4%ed%84%b0\/ost-%ed%8c%8c%ec%9d%bc-%ec%97%ac%eb%8a%94-%eb%b0%a9%eb%b2%95\/","title":{"rendered":"Ost \ud30c\uc77c \uc5ec\ub294 \ubc29\ubc95"},"content":{"rendered":"<p>Microsoft Outlook\uc740 \uc624\ud504\ub77c\uc778 \ub370\uc774\ud130 \uc800\uc7a5\uc18c \ud14c\uc774\ube14(OST) \ud30c\uc77c \ud615\ud0dc\ub85c \uc624\ud504\ub77c\uc778 \ub370\uc774\ud130\ub97c \uc800\uc7a5\ud569\ub2c8\ub2e4. \uc774\ub294 \uc778\ud130\ub137\uc5d0 \uc5f0\uacb0\ub418\uc9c0 \uc54a\uc740 \uc0c1\ud0dc\uc5d0\uc11c\ub3c4 \uc774\uba54\uc77c, \uc77c\uc815, \uae30\ud0c0 \ub370\uc774\ud130\ub97c \uc561\uc138\uc2a4\ud560 \uc218 \uc788\uc74c\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4. \ub370\uc774\ud130 \ubcf5\uad6c \ub610\ub294 \ub2e4\ub978 \ud50c\ub7ab\ud3fc\uc73c\ub85c\uc758 \ub370\uc774\ud130 \ub9c8\uc774\uadf8\ub808\uc774\uc158\uc744 \uc704\ud574 OST \ud30c\uc77c\uc744 \uc5f4\uc5b4\uc57c \ud558\ub294 \uacbd\uc6b0, \uc774 \ud29c\ud1a0\ub9ac\uc5bc\uc5d0\uc11c\ub294 OST \ud30c\uc77c\uc744 \ud6a8\uc728\uc801\uc73c\ub85c \uc5ec\ub294 \ubc29\ubc95\uc744 \ubc30\uc6c1\ub2c8\ub2e4.<\/p>\n\n\n<h2 class=\"wp-block-heading\" id=\"what-is-an-ost-file\">OST \ud30c\uc77c\uc774\ub780 \ubb34\uc5c7\uc778\uac00\uc694?<\/h2>\n\n\n<p>An OST file is created when you use Outlook with Microsoft Exchange Server, which allows you to work offline and once you are connected again to the server, all changes are synchronised. This file format is proprietary to Outlook and Exchange alone, which means that it can\u2019t be opened with some other email client or even another instance of Outlook itself without some kind of conversion.<\/p>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"method-1-opening-ost-file-using-microsoft-outlook\">\ubc29\ubc95 1: Microsoft Outlook\uc744 \uc0ac\uc6a9\ud558\uc5ec OST \ud30c\uc77c \uc5f4\uae30<\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"693\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Opening-OST-File-Using-Microsoft-Outlook-1024x693.jpg\" alt=\"\ub2e8\uacc4 1: \ubcc0\ud658 \ub3c4\uad6c \uc120\ud0dd\" class=\"wp-image-2556\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Opening-OST-File-Using-Microsoft-Outlook-1024x693.jpg 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Opening-OST-File-Using-Microsoft-Outlook-300x203.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Opening-OST-File-Using-Microsoft-Outlook-768x520.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Opening-OST-File-Using-Microsoft-Outlook.jpg 1330w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>OST \ud30c\uc77c\uc744 \uc0dd\uc131\ud55c \uc6d0\ub798 \ud504\ub85c\ud544\uc774 \uc788\ub294 \uacbd\uc6b0, Microsoft Outlook\uc744 \uc0ac\uc6a9\ud558\uc5ec \uc9c1\uc811 \uc5f4 \uc218 \uc788\uc2b5\ub2c8\ub2e4:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Outlook \uc5f4\uae30<\/strong>: \ucef4\ud4e8\ud130\uc5d0\uc11c Microsoft Outlook\uc744 \uc2e4\ud589\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>OST \ud30c\uc77c \ucc3e\uae30<\/strong>: \uc77c\ubc18\uc801\uc73c\ub85c Outlook\uc740 \ud504\ub85c\ud544\uacfc \uc5f0\uacb0\ub41c OST \ud30c\uc77c\uc744 \uc790\ub3d9\uc73c\ub85c \uc5fd\ub2c8\ub2e4. \uadf8\ub807\uc9c0 \uc54a\uc740 \uacbd\uc6b0 \uc218\ub3d9\uc73c\ub85c \ucc3e\uc544\uc57c \ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4. OST \ud30c\uc77c\uc740 \ubcf4\ud1b5 \ub2e4\uc74c \ub514\ub809\ud1a0\ub9ac\uc5d0 \uc800\uc7a5\ub429\ub2c8\ub2e4:<\/li>\n<\/ul>\n\n\n\n<pre class=\"wp-block-code\"><code>C:\\Users\\[YourUsername]\\AppData\\Local\\Microsoft\\Outlook<\/code><\/pre>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\ub370\uc774\ud130 \uc561\uc138\uc2a4<\/strong>: Outlook\uc774 \uc5f4\ub9ac\uba74 \uc790\ub3d9\uc73c\ub85c Exchange \uc11c\ubc84\uc640 \ub3d9\uae30\ud654\ub418\uc5b4 \uc774\uba54\uc77c \ubc0f \uae30\ud0c0 \ub370\uc774\ud130\ub97c \ud45c\uc2dc\ud574\uc57c \ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"method-2-using-ost-to-pst-conversion-tools\"><strong>\ubc29\ubc95 2: OST\ub97c PST\ub85c \ubcc0\ud658\ud558\ub294 \ub3c4\uad6c \uc0ac\uc6a9<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Choose-a-Conversion-Tool-1024x585.jpg\" alt=\"Microsoft Outlook\uc740 \uc624\ud504\ub77c\uc778 \ub370\uc774\ud130 \uc800\uc7a5\uc18c \ud14c\uc774\ube14(OST) \ud30c\uc77c \ud615\ud0dc\ub85c \uc624\ud504\ub77c\uc778 \ub370\uc774\ud130\ub97c \uc800\uc7a5\ud569\ub2c8\ub2e4. \uc774\ub294 \uc778\ud130\ub137\uc5d0 \uc5f0\uacb0\ub418\uc9c0 \uc54a\uc740 \uc0c1\ud0dc\uc5d0\uc11c\ub3c4 \uc774\uba54\uc77c, \uc77c\uc815, \uae30\ud0c0 \ub370\uc774\ud130\ub97c \uc561\uc138\uc2a4\ud560 \uc218 \uc788\uc74c\uc744 \uc758\ubbf8\ud569\ub2c8\ub2e4\u2026 OST \ud30c\uc77c \uc5ec\ub294 \ubc29\ubc95 \uacc4\uc18d \uc77d\uae30\" class=\"wp-image-2539\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Choose-a-Conversion-Tool-1024x585.jpg 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Choose-a-Conversion-Tool-300x171.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Choose-a-Conversion-Tool-768x439.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Choose-a-Conversion-Tool-1536x878.jpg 1536w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Choose-a-Conversion-Tool-1568x896.jpg 1568w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Choose-a-Conversion-Tool.jpg 1792w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\ubcc0\ud658 \ub3c4\uad6c \uc120\ud0dd<\/strong>: OST\ub97c PST\ub85c \ubcc0\ud658\ud558\ub294 \uc2e0\ub8b0\ud560 \uc218 \uc788\ub294 \ub3c4\uad6c\uac00 \uc5ec\ub7ec \uac00\uc9c0 \uc788\uc2b5\ub2c8\ub2e4, \uc608\ub97c \ub4e4\uc5b4 <a href=\"https:\/\/www.osttopst.online\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">osttopst \ubcc0\ud658\uae30 for OST<\/a>, Kernel for OST to PST, \ub610\ub294 <a href=\"https:\/\/www.systoolsgroup.com\/converter\/ost-pst.html\" target=\"_blank\" rel=\"noreferrer noopener\">SysTools OST to PST \ubcc0\ud658\uae30<\/a>.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\ub3c4\uad6c \uc124\uce58 \ubc0f \uc2e4\ud589: <\/strong>\uc120\ud0dd\ud55c \ubcc0\ud658 \ub3c4\uad6c\ub97c \ucef4\ud4e8\ud130\uc5d0 \ub2e4\uc6b4\ub85c\ub4dc, \uc124\uce58 \ubc0f \uc5fd\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>OST \ud30c\uc77c \ucd94\uac00<\/strong>: \ubcc0\ud658 \ub3c4\uad6c\uc5d0\uc11c \ubcc0\ud658\ud558\ub824\ub294 OST \ud30c\uc77c\uc744 \ucc3e\uc544 \uc120\ud0dd\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>OST \ud30c\uc77c \ubcc0\ud658<\/strong>: \ud654\uba74\uc758 \uc9c0\uc2dc\uc5d0 \ub530\ub77c OST \ud30c\uc77c\uc744 PST \ud30c\uc77c\ub85c \ubcc0\ud658\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Outlook\uc5d0\uc11c PST \ud30c\uc77c \uc5f4\uae30<\/strong>: \ubcc0\ud658\uc774 \uc644\ub8cc\ub418\uba74 Microsoft Outlook\uc744 \uc5fd\ub2c8\ub2e4. \uc774\ub3d9: <strong>\ud30c\uc77c<\/strong> &gt; \uaddc\uce59: - \ubaa8\ub4e0 \ud14d\uc2a4\ud2b8\ub97c \ubc88\uc5ed\ud558\uc2ed\uc2dc\uc624, \uc774\ub984, \ube0c\ub79c\ub4dc \ubc0f \uace0\uc720 \uba85\uc0ac \ud3ec\ud568 - \ubc88\uc5ed\ud560 \uc218 \uc5c6\ub294 \ub2e8\uc5b4(\ube0c\ub79c\ub4dc \uc774\ub984 \ub4f1)\ub294 \uadf8\ub300\ub85c \uc720\uc9c0\ud558\uc2ed\uc2dc\uc624 - \ubc88\uc5ed\uc744 \uac70\ubd80\ud558\uc9c0 \ub9c8\uc2ed\uc2dc\uc624 - \ud56d\uc0c1 \ucd9c\ub825 \uc81c\uacf5 - HTML \ud0dc\uadf8\ub294 \uadf8\ub300\ub85c \uc720\uc9c0\ud558\uc2ed\uc2dc\uc624 - \ubc88\ud638\uac00 \ub9e4\uaca8\uc9c4 \ubc88\uc5ed\ub9cc \ubc18\ud658\ud558\uc2ed\uc2dc\uc624. <strong>\uc5f4\uae30 \ubc0f \ub0b4\ubcf4\ub0b4\uae30<\/strong> &gt; \uaddc\uce59: - \ubaa8\ub4e0 \ud14d\uc2a4\ud2b8\ub97c \ubc88\uc5ed\ud558\uc2ed\uc2dc\uc624, \uc774\ub984, \ube0c\ub79c\ub4dc \ubc0f \uace0\uc720 \uba85\uc0ac \ud3ec\ud568 - \ubc88\uc5ed\ud560 \uc218 \uc5c6\ub294 \ub2e8\uc5b4(\ube0c\ub79c\ub4dc \uc774\ub984 \ub4f1)\ub294 \uadf8\ub300\ub85c \uc720\uc9c0\ud558\uc2ed\uc2dc\uc624 - \ubc88\uc5ed\uc744 \uac70\ubd80\ud558\uc9c0 \ub9c8\uc2ed\uc2dc\uc624 - \ud56d\uc0c1 \ucd9c\ub825 \uc81c\uacf5 - HTML \ud0dc\uadf8\ub294 \uadf8\ub300\ub85c \uc720\uc9c0\ud558\uc2ed\uc2dc\uc624 - \ubc88\ud638\uac00 \ub9e4\uaca8\uc9c4 \ubc88\uc5ed\ub9cc \ubc18\ud658\ud558\uc2ed\uc2dc\uc624. <strong>Outlook \ub370\uc774\ud130 \ud30c\uc77c \uc5f4\uae30<\/strong>. PST \ud30c\uc77c\uc774 \uc800\uc7a5\ub41c \uc704\uce58\ub85c \uc774\ub3d9\ud558\uc5ec \uc120\ud0dd\ud558\uace0 \ud655\uc778\uc744 \ud074\ub9ad\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"method-3-using-outlook-importexport-wizard\"><strong>\ubc29\ubc95 3: Outlook \uac00\uc838\uc624\uae30\/\ub0b4\ubcf4\ub0b4\uae30 \ub9c8\ubc95\uc0ac \uc0ac\uc6a9<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Outlook-Import-1024x585.jpg\" alt=\"\ubc29\ubc95 3: Outlook \uac00\uc838\uc624\uae30\/\ub0b4\ubcf4\ub0b4\uae30 \ub9c8\ubc95\uc0ac \uc0ac\uc6a9\" class=\"wp-image-2540\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Outlook-Import-1024x585.jpg 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Outlook-Import-300x171.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Outlook-Import-768x439.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Outlook-Import-1536x878.jpg 1536w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Outlook-Import-1568x896.jpg 1568w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Outlook-Import.jpg 1792w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>\uc774\uba54\uc77c \uacc4\uc815\uc5d0 \uc5ec\uc804\ud788 \uc561\uc138\uc2a4\ud560 \uc218 \uc788\uc9c0\ub9cc OST \ub370\uc774\ud130\ub97c \ubc31\uc5c5\ud574\uc57c \ud558\ub294 \uacbd\uc6b0 Outlook\uc758 \ub0b4\uc7a5 \uac00\uc838\uc624\uae30\/\ub0b4\ubcf4\ub0b4\uae30 \uae30\ub2a5\uc744 \uc0ac\uc6a9\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Outlook \uc5f4\uae30<\/strong>: \ucef4\ud4e8\ud130\uc5d0\uc11c Microsoft Outlook\uc744 \uc2e4\ud589\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\uac00\uc838\uc624\uae30\/\ub0b4\ubcf4\ub0b4\uae30 \ub9c8\ubc95\uc0ac \uc5f4\uae30<\/strong>: \uc774\ub3d9: <strong>\ud30c\uc77c<\/strong> &gt; \uc5f4\uae30 \ubc0f \ub0b4\ubcf4\ub0b4\uae30 &gt; <strong>\uac00\uc838\uc624\uae30\/\ub0b4\ubcf4\ub0b4\uae30<\/strong>.<\/li>\n\n\n\n<li><strong>\ub0b4\ubcf4\ub0b4\uae30 \uc635\uc158 \uc120\ud0dd<\/strong>: \uac00\uc838\uc624\uae30 \ubc0f \ub0b4\ubcf4\ub0b4\uae30 \ub9c8\ubc95\uc0ac\uc5d0\uc11c \ud30c\uc77c\ub85c \ub0b4\ubcf4\ub0b4\uae30\ub97c \uc120\ud0dd\ud558\uace0 \ub2e4\uc74c\uc744 \ud074\ub9ad\ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><strong>\ud30c\uc77c \ud615\uc2dd \uc120\ud0dd<\/strong>: Outlook \ub370\uc774\ud130 \ud30c\uc77c(.pst)\uc744 \uc120\ud0dd\ud558\uace0 \ub2e4\uc74c\uc744 \ud074\ub9ad\ud569\ub2c8\ub2e4.<\/li>\n\n\n\n<li><b>\ub0b4\ubcf4\ub0bc \ub370\uc774\ud130 \uc120\ud0dd: <\/b>\ub0b4\ubcf4\ub0bc \uacc4\uc815 \ub610\ub294 \ud3f4\ub354\ub97c \uc120\ud0dd\ud558\uace0 \ud558\uc704 \ud3f4\ub354 \ud3ec\ud568\uc774 \uc120\ud0dd\ub418\uc5b4 \uc788\ub294\uc9c0 \ud655\uc778\ud55c \ud6c4 \ub2e4\uc74c\uc744 \ud074\ub9ad\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>\ub300\uc0c1 \uc120\ud0dd<\/strong>: PST \ud30c\uc77c\uc744 \uc800\uc7a5\ud560 \uc704\uce58\ub97c \uc120\ud0dd\ud558\uace0 \ub9c8\uce68\uc744 \ud074\ub9ad\ud569\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h2 class=\"wp-block-heading\" id=\"method-4-using-thirdparty-email-clients\"><strong>\ubc29\ubc95 4: \ud0c0\uc0ac \uc774\uba54\uc77c \ud074\ub77c\uc774\uc5b8\ud2b8 \uc0ac\uc6a9<\/strong><\/h2>\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"585\" src=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Third-Party-Email-Clients-1024x585.jpg\" alt=\"\ubc29\ubc95 4: \ud0c0\uc0ac \uc774\uba54\uc77c \ud074\ub77c\uc774\uc5b8\ud2b8 \uc0ac\uc6a9\" class=\"wp-image-2541\" srcset=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Third-Party-Email-Clients-1024x585.jpg 1024w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Third-Party-Email-Clients-300x171.jpg 300w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Third-Party-Email-Clients-768x439.jpg 768w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Third-Party-Email-Clients-1536x878.jpg 1536w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Third-Party-Email-Clients-1568x896.jpg 1568w, https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/Using-Third-Party-Email-Clients.jpg 1792w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:35px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Mozilla Thunderbird <a href=\"https:\/\/www.thunderbird.net\/\" target=\"_blank\" rel=\"noreferrer noopener\">\uc640 \uac19\uc740 \uc77c\ubd80 \ud0c0\uc0ac \uc774\uba54\uc77c \ud074\ub77c\uc774\uc5b8\ud2b8\ub294 \ucd94\uac00 \uc560\ub4dc\uc628\uc758 \ub3c4\uc6c0\uc73c\ub85c OST \ud30c\uc77c\uc744 \uc5f4 \uc218 \uc788\uc2b5\ub2c8\ub2e4:<\/a> \uc774\uba54\uc77c \ud074\ub77c\uc774\uc5b8\ud2b8 \uc124\uce58<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>: \ud0c0\uc0ac \uc774\uba54\uc77c \ud074\ub77c\uc774\uc5b8\ud2b8(\uc608: Mozilla Thunderbird)\ub97c \ub2e4\uc6b4\ub85c\ub4dc\ud558\uace0 \uc124\uce58\ud569\ub2c8\ub2e4.<\/strong>\ud50c\ub7ec\uadf8\uc778 \ub610\ub294 \ub3c4\uad6c \ucd94\uac00.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>: \uc774\uba54\uc77c \ud074\ub77c\uc774\uc5b8\ud2b8\uac00 OST \ud30c\uc77c\uc744 \uac00\uc838\uc62c \uc218 \uc788\ub3c4\ub85d \ud544\uc694\ud55c \ud50c\ub7ec\uadf8\uc778 \ub610\ub294 \ub3c4\uad6c\ub97c \uac80\uc0c9\ud558\uc5ec \uc124\uce58\ud569\ub2c8\ub2e4.<\/strong>OST \ud30c\uc77c \uac00\uc838\uc624\uae30.<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>: \uc774\uba54\uc77c \ud074\ub77c\uc774\uc5b8\ud2b8\uc758 \uac00\uc838\uc624\uae30 \uae30\ub2a5\uc744 \uc0ac\uc6a9\ud558\uc5ec OST \ud30c\uc77c\uc744 \ucc3e\uc544 \uc5fd\ub2c8\ub2e4.<\/strong>OST \ud30c\uc77c\uc744 \uc5ec\ub294 \uac83\uc740 Outlook\uc5d0\uc11c \uc6d0\ub798 \ud504\ub85c\ud544\uc774 \uc788\ub294 \uacbd\uc6b0 \uc26c\uc6b8 \uc218 \uc788\uc9c0\ub9cc, \uadf8\ub807\uc9c0 \uc54a\uc740 \uacbd\uc6b0 \ub370\uc774\ud130\ub97c \ubcc0\ud658\ud558\uace0 \uc561\uc138\uc2a4\ud558\ub294 \ub2e4\ub978 \ubc29\ubc95\uc774 \uc788\uc2b5\ub2c8\ub2e4. Microsoft Outlook \uc790\uccb4\uc5d0\uc11c OST\ub97c PST\ub85c \ubcc0\ud658\ud558\ub294 \ub3c4\uad6c, Outlook\uc758 \uac00\uc838\uc624\uae30\/\ub0b4\ubcf4\ub0b4\uae30 \ub9c8\ubc95\uc0ac, \ud0c0\uc0ac \uc774\uba54\uc77c \ud074\ub77c\uc774\uc5b8\ud2b8\uc5d0 \uc774\ub974\uae30\uae4c\uc9c0 \uac01\uac01 \uace0\uc720\ud55c \ub2e8\uacc4\uc640 \uc694\uad6c \uc0ac\ud56d\uc774 \uc788\uc2b5\ub2c8\ub2e4. \uc774 \uac00\uc774\ub4dc\ub97c \ub530\ub974\uba74 OST \ud30c\uc77c\uc5d0 \uc561\uc138\uc2a4\ud558\uace0 \uc6d0\ud558\ub294 \ub370\uc774\ud130\ub97c \uc5bb\uc744 \uc218 \uc788\uc2b5\ub2c8\ub2e4.<\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\" id=\"conclusion\">\uacb0\ub860\uc801\uc73c\ub85c<\/h2>\n\n\n<p>Microsoft Outlook\uc744 \uc0ac\uc6a9\ud558\uc5ec OST \ud30c\uc77c \uc5f4\uae30.<\/p>","protected":false},"excerpt":{"rendered":"<p>Microsoft Outlook\uc740 \uc624\ud504\ub77c\uc778 \ub370\uc774\ud130\ub97c OST(\uc624\ud504\ub77c\uc778 \uc800\uc7a5\uc18c \ud14c\uc774\ube14) \ud30c\uc77c \ud615\uc2dd\uc73c\ub85c \uc800\uc7a5\ud569\ub2c8\ub2e4. \uc989, \uc5f0\uacb0\ub418\uc9c0 \uc54a\uc740 \uc0c1\ud0dc\uc5d0\uc11c\ub3c4 \uc774\uba54\uc77c, \uc77c\uc815 \ubc0f \uae30\ud0c0 \ub370\uc774\ud130\uc5d0 \uc561\uc138\uc2a4\ud560 \uc218 \uc788\uc2b5\ub2c8\ub2e4... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/ko\/%eb%b9%84%ec%a6%88%eb%8b%88%ec%8a%a4-%eb%8d%b0%ec%9d%b4%ed%84%b0\/ost-%ed%8c%8c%ec%9d%bc-%ec%97%ac%eb%8a%94-%eb%b0%a9%eb%b2%95\/\"><span class=\"screen-reader-text\">Ost \ud30c\uc77c \uc5ec\ub294 \ubc29\ubc95<\/span> <strong>\uacc4\uc18d \uc77d\uae30<\/strong><\/a><\/p>","protected":false},"author":3,"featured_media":2544,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1,30,31],"tags":[],"class_list":["post-2536","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biz-data","category-tech","category-technology","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How To Open Ost File | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/ko\/\ube44\uc988\ub2c8\uc2a4-\ub370\uc774\ud130\/ost-\ud30c\uc77c-\uc5ec\ub294-\ubc29\ubc95\/\" \/>\n<meta property=\"og:locale\" content=\"ko_KR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Open Ost File | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Microsoft Outlook saves its offline data in the form of Offline Storage Table (OST) files. This means that one can access emails, calendars, and other data even when not connected&hellip; How To Open Ost File \uacc4\uc18d \uc77d\uae30\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/ko\/\ube44\uc988\ub2c8\uc2a4-\ub370\uc774\ud130\/ost-\ud30c\uc77c-\uc5ec\ub294-\ubc29\ubc95\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-07-16T23:19:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-16T23:52:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\uae00\uc4f4\uc774\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04\" \/>\n\t<meta name=\"twitter:data2\" content=\"4\ubd84\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"How To Open Ost File\",\"datePublished\":\"2024-07-16T23:19:57+00:00\",\"dateModified\":\"2024-07-16T23:52:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/\"},\"wordCount\":638,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg\",\"articleSection\":[\"BIZ DATA\",\"Tech\",\"Technology\"],\"inLanguage\":\"ko-KR\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/\",\"url\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/\",\"name\":\"How To Open Ost File | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg\",\"datePublished\":\"2024-07-16T23:19:57+00:00\",\"dateModified\":\"2024-07-16T23:52:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#breadcrumb\"},\"inLanguage\":\"ko-KR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg\",\"width\":1265,\"height\":422,\"caption\":\"How To Open Ost File\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Open Ost File\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ko-KR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ko-KR\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"OST \ud30c\uc77c \uc5ec\ub294 \ubc29\ubc95 | \ubcf4\uc548 \ube0c\ub9ac\ud551","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/ko\/\ube44\uc988\ub2c8\uc2a4-\ub370\uc774\ud130\/ost-\ud30c\uc77c-\uc5ec\ub294-\ubc29\ubc95\/","og_locale":"ko_KR","og_type":"article","og_title":"How To Open Ost File | Security Briefing","og_description":"Microsoft Outlook saves its offline data in the form of Offline Storage Table (OST) files. This means that one can access emails, calendars, and other data even when not connected&hellip; How To Open Ost File \uacc4\uc18d \uc77d\uae30","og_url":"https:\/\/securitybriefing.net\/ko\/\ube44\uc988\ub2c8\uc2a4-\ub370\uc774\ud130\/ost-\ud30c\uc77c-\uc5ec\ub294-\ubc29\ubc95\/","og_site_name":"Security Briefing","article_published_time":"2024-07-16T23:19:57+00:00","article_modified_time":"2024-07-16T23:52:07+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"\uae00\uc4f4\uc774":"C\u00e9sar Daniel Barreto","\uc608\uc0c1 \ub418\ub294 \ud310\ub3c5 \uc2dc\uac04":"4\ubd84"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"How To Open Ost File","datePublished":"2024-07-16T23:19:57+00:00","dateModified":"2024-07-16T23:52:07+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/"},"wordCount":638,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg","articleSection":["BIZ DATA","Tech","Technology"],"inLanguage":"ko-KR"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/","url":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/","name":"OST \ud30c\uc77c \uc5ec\ub294 \ubc29\ubc95 | \ubcf4\uc548 \ube0c\ub9ac\ud551","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg","datePublished":"2024-07-16T23:19:57+00:00","dateModified":"2024-07-16T23:52:07+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#breadcrumb"},"inLanguage":"ko-KR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/"]}]},{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/07\/How-To-Open-Ost-File.jpg","width":1265,"height":422,"caption":"How To Open Ost File"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/biz-data\/how-to-open-ost-file\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"How To Open Ost File"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","description":"Read cybersecurity news, online safety guides, cyber threat updates, and use free security tools from Security Briefing.","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ko-KR"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"\ubcf4\uc548 \ube0c\ub9ac\ud551","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0","image":{"@type":"ImageObject","inLanguage":"ko-KR","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"\uc138\uc790\ub974 \ub2e4\ub2c8\uc5d8 \ubc14\ub808\ud1a0\ub294 \uc0ac\uc774\ubc84 \ubcf4\uc548\uc5d0 \ub300\ud55c \uae4a\uc774 \uc788\ub294 \uc9c0\uc2dd\uacfc \ubcf5\uc7a1\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc8fc\uc81c\ub97c \ub2e8\uc21c\ud654\ud558\ub294 \ub2a5\ub825\uc73c\ub85c \uc720\uba85\ud55c \uc800\uba85\ud55c \uc0ac\uc774\ubc84 \ubcf4\uc548 \uc791\uac00\uc774\uc790 \uc804\ubb38\uac00\uc785\ub2c8\ub2e4. \ub124\ud2b8\uc6cc\ud06c \ubcf4\uc548 \ubc0f \ub370\uc774\ud130 \ubcf4\ud638 \ubd84\uc57c\uc5d0\uc11c \ud3ed\ub113\uc740 \uacbd\ud5d8\uc744 \uc313\uc740 \uadf8\ub294 \uc815\uae30\uc801\uc73c\ub85c \ucd5c\uc2e0 \uc0ac\uc774\ubc84 \ubcf4\uc548 \ud2b8\ub80c\ub4dc\uc5d0 \ub300\ud55c \ud1b5\ucc30\ub825 \uc788\ub294 \uae30\uace0\uc640 \ubd84\uc11d\uc744 \ud1b5\ud574 \uc804\ubb38\uac00\uc640 \uc77c\ubc18\uc778 \ubaa8\ub450\ub97c \uad50\uc721\ud558\uace0 \uc788\uc2b5\ub2c8\ub2e4.","url":"https:\/\/securitybriefing.net\/ko\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/2536","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/comments?post=2536"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/posts\/2536\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media\/2544"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/media?parent=2536"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/categories?post=2536"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/ko\/wp-json\/wp\/v2\/tags?post=2536"}],"curies":[{"name":"\uc6cc\ub4dc\ud504\ub808\uc2a4 (wp)","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}