{"id":4230,"date":"2001-05-03T17:38:32","date_gmt":"2001-05-03T21:38:32","guid":{"rendered":"http:\/\/www.ezrasf.com\/wplog\/?p=4230"},"modified":"2011-01-26T00:25:35","modified_gmt":"2011-01-26T04:25:35","slug":"defacements","status":"publish","type":"post","link":"https:\/\/www.ezrasf.com\/wplog\/2001\/05\/03\/defacements\/","title":{"rendered":"Defacements"},"content":{"rendered":"<p>Hmmmmmmmmmm&#8230; guess it is time to clean up my space in the office, huh?<\/p>\n<hr \/>\n<p>It seems that the large amount of hacking and an innability to stop it has resulted in vigilantes attacking perceived threats.\u00c2\u00a0See article<\/p>\n<hr \/>\n<p>Hmmmmmmm&#8230;\u00c2\u00a0<a href=\"http:\/\/news.cnet.com\/news\/0-1003-200-5773288.html\">Defacements rise in China\/U.S. hacker war<\/a>. Kind of like gangs tagging streets. You go into the other&#8217;s territory and leave a message to your friends that you did this.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hmmmmmmmmmm&#8230; guess it is time to clean up my space in the office, huh? It seems that the large amount of hacking and an innability to stop it has resulted in vigilantes attacking perceived threats.\u00c2\u00a0See article Hmmmmmmm&#8230;\u00c2\u00a0Defacements rise in China\/U.S. hacker war. Kind of like gangs tagging streets. You go into the other&#8217;s territory and [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":4,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[1198,1213],"tags":[],"class_list":["post-4230","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","category-from-pitas"],"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p1rUBW-16e","jetpack-related-posts":[],"jetpack_likes_enabled":true,"_links":{"self":[{"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/posts\/4230","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/comments?post=4230"}],"version-history":[{"count":0,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/posts\/4230\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/media?parent=4230"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/categories?post=4230"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.ezrasf.com\/wplog\/wp-json\/wp\/v2\/tags?post=4230"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}