{"id":305,"date":"2008-03-11T11:25:10","date_gmt":"2008-03-11T09:25:10","guid":{"rendered":"http:\/\/security-planet.de\/2008\/03\/11\/bloginfoseccom\/"},"modified":"2008-03-11T11:25:10","modified_gmt":"2008-03-11T09:25:10","slug":"bloginfoseccom","status":"publish","type":"post","link":"https:\/\/cyber-fi.net\/index.php\/2008\/03\/11\/bloginfoseccom\/","title":{"rendered":"BlogInfoSec.com"},"content":{"rendered":"<p>Es gibt ein neues Magazin f\u00fcr Informationssicherheit: <a href=\"http:\/\/BlogInfoSec.com\">BlogInfoSec.com<\/a> &#8211; An Information Security Magazine in a Blog Format<\/p>\n<p>Klingt interessant und ist sicher wert, mal reinzuschauen.<\/p>\n<p>Gefunden bei: <a href=\"http:\/\/www.stillsecureafteralltheseyears.com\/ashimmy\/\">StillSecure, After All These Years<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Es gibt ein neues Magazin f\u00fcr Informationssicherheit: BlogInfoSec.com &#8211; An Information Security Magazine in a Blog Format Klingt interessant und ist sicher wert, mal reinzuschauen. Gefunden bei: StillSecure, After All These Years<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[2,15],"tags":[95,394,585],"class_list":["post-305","post","type-post","status-publish","format-standard","hentry","category-allgemeines","category-security","tag-bloginfosec-com","tag-magazin","tag-stillsecure"],"_links":{"self":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/305","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/comments?post=305"}],"version-history":[{"count":0,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/posts\/305\/revisions"}],"wp:attachment":[{"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/media?parent=305"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/categories?post=305"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyber-fi.net\/index.php\/wp-json\/wp\/v2\/tags?post=305"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}