

{"id":87,"date":"2011-02-09T19:26:58","date_gmt":"2011-02-10T00:26:58","guid":{"rendered":"http:\/\/rud.is\/b\/?p=87"},"modified":"2018-03-10T07:53:37","modified_gmt":"2018-03-10T12:53:37","slug":"quick-hits-2011-02-09","status":"publish","type":"post","link":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/","title":{"rendered":"Quick Hits :: 2011-02-09"},"content":{"rendered":"<p><strong>Security<\/strong><\/p>\n<ul>\n<li>VSR uses some high-ish profile attacks from 2010 to provide fodder for the VAR community :: <span class=\"removed_link\" title=\"http:\/\/vsr.edgl.com\/home\">Security Risk: Top Hacker Attacks of 2010<\/span>. I include it as the examples they provide should make it easier for folks doing presentations where they need to show real-life attacks (without sifting through the individual entries at the various data breach web site databases).  [Vertical Systems Reseller]<\/li>\n<\/ul>\n<p><strong>Windows<\/strong><\/p>\n<ul>\n<li>Windows 7\/2008 SP1 looms large. OEMs, VLCs &#038; MSDN\/TechNet subscribers get it on February 16<sup>th<\/sup> and the rest of the masses can give it a go on February 22<sup>nd<\/sup>. It looks like it has a decidedly enterprise-y focus, but one can hope it continues Microsoft on the path to robust desktop &#038; server experiences :: <a href=\"http:\/\/www.bing.com\/search?q=windowsteamblog&amp;form=MSDTR1\">Announcing The Availability of Windows 7 and Windows Server R2 SP1<\/a> [Microsoft]<\/li>\n<li>Autoruns &#8211; the ability to automatically perform tasks when certain devices are made available to Window systems (e.g. USB sticks) &#8211; are a boon to malware writers. While Microsoft has somewhat mitigated the threat they pose in more modern versions of their operating systems, it can be tricky to make older systems safe. With the latest round of Patch Tuesday updates, they included a way to disable Autoruns in older systems. W00t! <a href=\"https:\/\/www.pcworld.com\/article\/219101\/microsoft_update_offers_an_easier_way_to_turn_off_autoruns.html\">Microsoft Update Offers an Easier Way to Turn off Autoruns<\/a> [PC World]<\/li>\n<li>Succinct and informative article by Chris Sanders on how to determine if your systems is being actively compromised. Chock full of screen shots and examples of what to look for. While not exactly aimed at the general Windows community, it does provide a solid introduction to core tools that technically-inclined users should make room for in their toolboxes :: <a href=\"http:\/\/techgenix.com\/Determining-You-Actively-Being-Compromised\/\">http:\/\/www.windowsecurity.com\/articles\/Determining-You-Actively-Being-Compromised.html<\/a> [WindowsSecurity.com]<\/li>\n<\/ul>\n<p><strong>Programming<\/strong><\/p>\n<ul>\n<li>Pageforest helps you ship complete web applications without having to write any server-side code. You can build your application using HTML[5], CSS &#038; javascript and the Pageforest service provides application hosting, user authentication &#038; data storage. You only use client-side javascript and are free to include jQuery, Prototype or any other frameworks that you need to include in your app. Hosting is currently free and the site includes a full IDE to help you get started coding :: <span class=\"removed_link\" title=\"http:\/\/www.pageforest.com\/\">A Pure JavaScript Web Application Platform<\/span> [pageforest.com]<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Security VSR uses some high-ish profile attacks from 2010 to provide fodder for the VAR community :: Security Risk: Top Hacker Attacks of 2010. I include it as the examples they provide should make it easier for folks doing presentations where they need to show real-life attacks (without sifting through the individual entries at the [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":true,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"activitypub_content_warning":"","activitypub_content_visibility":"","activitypub_max_image_attachments":3,"activitypub_interaction_policy_quote":"anyone","activitypub_status":"","footnotes":""},"categories":[36,3,15,9,7,6,11],"tags":[177,108,178,175,34,109,181,147,182,111,179,150,171,173,174,172,112,176,180],"class_list":["post-87","post","type-post","status-publish","format-standard","hentry","category-html5","category-information-security","category-javascript","category-operating-systems","category-programming","category-software","category-windows","tag-chris-sanders","tag-html","tag-http","tag-introduction-to-core-tools","tag-javascript-2","tag-javascript-programming-language","tag-jquery","tag-microsoft","tag-microsoft-virtual-server","tag-microsoft-windows","tag-online-help","tag-operating-systems-2","tag-pc-world","tag-ship-complete-web-applications","tag-web-application-platform","tag-web-site-databases","tag-windows-7","tag-windows-server","tag-windows-update"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Quick Hits :: 2011-02-09 - rud.is<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quick Hits :: 2011-02-09 - rud.is\" \/>\n<meta property=\"og:description\" content=\"Security VSR uses some high-ish profile attacks from 2010 to provide fodder for the VAR community :: Security Risk: Top Hacker Attacks of 2010. I include it as the examples they provide should make it easier for folks doing presentations where they need to show real-life attacks (without sifting through the individual entries at the [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/\" \/>\n<meta property=\"og:site_name\" content=\"rud.is\" \/>\n<meta property=\"article:published_time\" content=\"2011-02-10T00:26:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-10T12:53:37+00:00\" \/>\n<meta name=\"author\" content=\"hrbrmstr\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"hrbrmstr\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/09\\\/quick-hits-2011-02-09\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/09\\\/quick-hits-2011-02-09\\\/\"},\"author\":{\"name\":\"hrbrmstr\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"headline\":\"Quick Hits :: 2011-02-09\",\"datePublished\":\"2011-02-10T00:26:58+00:00\",\"dateModified\":\"2018-03-10T12:53:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/09\\\/quick-hits-2011-02-09\\\/\"},\"wordCount\":366,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"keywords\":[\"Chris Sanders\",\"HTML\",\"http\",\"introduction to core tools\",\"javascript\",\"JavaScript programming language\",\"JQuery\",\"Microsoft\",\"Microsoft Virtual Server\",\"Microsoft Windows\",\"Online help\",\"operating systems\",\"PC World\",\"ship complete web applications\",\"Web Application Platform\",\"web site databases\",\"Windows 7\",\"Windows Server\",\"Windows Update\"],\"articleSection\":[\"HTML5\",\"Information Security\",\"Javascript\",\"Operating Systems\",\"Programming\",\"Software\",\"Windows\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/09\\\/quick-hits-2011-02-09\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/09\\\/quick-hits-2011-02-09\\\/\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/09\\\/quick-hits-2011-02-09\\\/\",\"name\":\"Quick Hits :: 2011-02-09 - rud.is\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\"},\"datePublished\":\"2011-02-10T00:26:58+00:00\",\"dateModified\":\"2018-03-10T12:53:37+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/09\\\/quick-hits-2011-02-09\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/09\\\/quick-hits-2011-02-09\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/2011\\\/02\\\/09\\\/quick-hits-2011-02-09\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/rud.is\\\/b\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quick Hits :: 2011-02-09\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#website\",\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/\",\"name\":\"rud.is\",\"description\":\"&quot;In God we trust. All others must bring data&quot;\",\"publisher\":{\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/rud.is\\\/b\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/rud.is\\\/b\\\/#\\\/schema\\\/person\\\/d7cb7487ab0527447f7fda5c423ff886\",\"name\":\"hrbrmstr\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\",\"width\":460,\"height\":460,\"caption\":\"hrbrmstr\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/rud.is\\\/b\\\/wp-content\\\/uploads\\\/2023\\\/10\\\/ukr-shield.png?fit=460%2C460&ssl=1\"},\"description\":\"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7\",\"sameAs\":[\"http:\\\/\\\/rud.is\"],\"url\":\"https:\\\/\\\/rud.is\\\/b\\\/author\\\/hrbrmstr\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quick Hits :: 2011-02-09 - rud.is","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/","og_locale":"en_US","og_type":"article","og_title":"Quick Hits :: 2011-02-09 - rud.is","og_description":"Security VSR uses some high-ish profile attacks from 2010 to provide fodder for the VAR community :: Security Risk: Top Hacker Attacks of 2010. I include it as the examples they provide should make it easier for folks doing presentations where they need to show real-life attacks (without sifting through the individual entries at the [&hellip;]","og_url":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/","og_site_name":"rud.is","article_published_time":"2011-02-10T00:26:58+00:00","article_modified_time":"2018-03-10T12:53:37+00:00","author":"hrbrmstr","twitter_card":"summary_large_image","twitter_misc":{"Written by":"hrbrmstr","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/#article","isPartOf":{"@id":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/"},"author":{"name":"hrbrmstr","@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"headline":"Quick Hits :: 2011-02-09","datePublished":"2011-02-10T00:26:58+00:00","dateModified":"2018-03-10T12:53:37+00:00","mainEntityOfPage":{"@id":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/"},"wordCount":366,"commentCount":0,"publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"keywords":["Chris Sanders","HTML","http","introduction to core tools","javascript","JavaScript programming language","JQuery","Microsoft","Microsoft Virtual Server","Microsoft Windows","Online help","operating systems","PC World","ship complete web applications","Web Application Platform","web site databases","Windows 7","Windows Server","Windows Update"],"articleSection":["HTML5","Information Security","Javascript","Operating Systems","Programming","Software","Windows"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/","url":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/","name":"Quick Hits :: 2011-02-09 - rud.is","isPartOf":{"@id":"https:\/\/rud.is\/b\/#website"},"datePublished":"2011-02-10T00:26:58+00:00","dateModified":"2018-03-10T12:53:37+00:00","breadcrumb":{"@id":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/rud.is\/b\/2011\/02\/09\/quick-hits-2011-02-09\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rud.is\/b\/"},{"@type":"ListItem","position":2,"name":"Quick Hits :: 2011-02-09"}]},{"@type":"WebSite","@id":"https:\/\/rud.is\/b\/#website","url":"https:\/\/rud.is\/b\/","name":"rud.is","description":"&quot;In God we trust. All others must bring data&quot;","publisher":{"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rud.is\/b\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/rud.is\/b\/#\/schema\/person\/d7cb7487ab0527447f7fda5c423ff886","name":"hrbrmstr","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","url":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","contentUrl":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1","width":460,"height":460,"caption":"hrbrmstr"},"logo":{"@id":"https:\/\/i0.wp.com\/rud.is\/b\/wp-content\/uploads\/2023\/10\/ukr-shield.png?fit=460%2C460&ssl=1"},"description":"Don't look at me\u2026I do what he does \u2014 just slower. #rstats avuncular \u2022 ?Resistance Fighter \u2022 Cook \u2022 Christian \u2022 [Master] Chef des Donn\u00e9es de S\u00e9curit\u00e9 @ @rapid7","sameAs":["http:\/\/rud.is"],"url":"https:\/\/rud.is\/b\/author\/hrbrmstr\/"}]}},"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p23idr-1p","jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":30,"url":"https:\/\/rud.is\/b\/2011\/02\/03\/awesomechartjs-meets-microsoft-security-bulletins\/","url_meta":{"origin":87,"position":0},"title":"AwesomeChartJS Meets Microsoft Security Bulletins","author":"hrbrmstr","date":"2011-02-03","format":false,"excerpt":"I wanted to play with the AwesomeChartJS library and figured an interesting way to do that was to use it to track Microsoft Security Bulletins this year. While I was drawn in by just how simple it is to craft basic charts, that simplicity really only makes it useful for\u2026","rel":"","context":"In &quot;Charts &amp; Graphs&quot;","block_context":{"text":"Charts &amp; Graphs","link":"https:\/\/rud.is\/b\/category\/charts-graphs\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":362,"url":"https:\/\/rud.is\/b\/2011\/03\/12\/remote-assistanceinformation-gathering-aid-supportdetails\/","url_meta":{"origin":87,"position":1},"title":"Remote Assistance\/Information Gathering Aid &#8211; SupportDetails","author":"hrbrmstr","date":"2011-03-12","format":false,"excerpt":"I'm putting together a computer & online safety presentation for an upcoming talk at a senior center in Portsmouth (NH) and came across Support Details in my information hunting trek. This site makes it dirt simple to get basic information from whomever you are providing remote support to (a task\u2026","rel":"","context":"In &quot;Operating Systems&quot;","block_context":{"text":"Operating Systems","link":"https:\/\/rud.is\/b\/category\/operating-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3,"url":"https:\/\/rud.is\/b\/2011\/02\/07\/quick-hits-2011-01-07\/","url_meta":{"origin":87,"position":2},"title":"Quick Hits :: 2011-01-07","author":"hrbrmstr","date":"2011-02-07","format":false,"excerpt":"Security Smart Servers spot & block botnet attacks [NewScientist] Passwords are *so* 2010 - Building the ultimate bad arse CUDA cracking server\u2026 [SecManiac] Programming Interesting points\/counterpoints on the efficacy of Node.js being tied so closely to the V8 javascript engine: NodeJS: To V8 or not to V8 [bruno fernandez-ruiz] On\u2026","rel":"","context":"In &quot;HTML5&quot;","block_context":{"text":"HTML5","link":"https:\/\/rud.is\/b\/category\/html5\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":249,"url":"https:\/\/rud.is\/b\/2011\/02\/26\/never-a-better-time-to-baseline\/","url_meta":{"origin":87,"position":3},"title":"Never A Better Time To Baseline","author":"hrbrmstr","date":"2011-02-26","format":false,"excerpt":"If you're preparing to install Windows 7 or Windows Server 2008 R2 Service Pack 1, now would be a good time to give Microsoft's Attack Surface Analyzer a spin. ASA takes a baseline snapshot of your system state and then lets you take another snapshot after any configuration change or\u2026","rel":"","context":"In &quot;Drivers&quot;","block_context":{"text":"Drivers","link":"https:\/\/rud.is\/b\/category\/drivers\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":49,"url":"https:\/\/rud.is\/b\/2011\/02\/05\/spaces-for-windows\/","url_meta":{"origin":87,"position":4},"title":"&#8216;Spaces&#8217; for Windows","author":"hrbrmstr","date":"2011-02-05","format":false,"excerpt":"UPDATE [2011-02-05] Added VirtuaWin to the list thanks to a tip by @ken5m1th. I've been setting up a relatively new 64-bit Windows 7 Ultimate machine and decided to see if the virtual desktops landscape had changed much in the recent past. It's amazing that with all of the feature duplication\u2026","rel":"","context":"In &quot;Operating Systems&quot;","block_context":{"text":"Operating Systems","link":"https:\/\/rud.is\/b\/category\/operating-systems\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":11,"url":"https:\/\/rud.is\/b\/2011\/02\/02\/11hdmi-overscan-tweak-for-wimpy-windows-font-display\/","url_meta":{"origin":87,"position":5},"title":"HDMI Overscan Tweak For Wimpy Windows Font Display","author":"hrbrmstr","date":"2011-02-02","format":false,"excerpt":"I recently hooked up a Windows 7 box to my Dell ST2310 monitor and was surprised at just how horrid the fonts looked, especially since my MacBook Pro looks fantastic using both DVI and HDMI with the display. I even tried all the ClearType tweaks to no avail. Then, it\u2026","rel":"","context":"In &quot;Displays&quot;","block_context":{"text":"Displays","link":"https:\/\/rud.is\/b\/category\/displays\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/87","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/comments?post=87"}],"version-history":[{"count":0,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/posts\/87\/revisions"}],"wp:attachment":[{"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/media?parent=87"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/categories?post=87"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rud.is\/b\/wp-json\/wp\/v2\/tags?post=87"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}