{"id":127,"date":"2002-10-17T22:05:53","date_gmt":"2002-10-18T02:05:53","guid":{"rendered":"http:\/\/wordpress.cephas.net\/?p=127"},"modified":"2002-10-17T22:05:53","modified_gmt":"2002-10-18T02:05:53","slug":"hardening-the-openhack-app","status":"publish","type":"post","link":"https:\/\/cephas.net\/blog\/2002\/10\/17\/hardening-the-openhack-app\/","title":{"rendered":"Hardening the OpenHack App"},"content":{"rendered":"<p>In <a href=\"http:\/\/www.eweek.com\/\">eWeek<\/a>, <a href=\"http:\/\/www.eweek.com\/article2\/0,3959,633777,00.asp\">Hardening the OpenHack App<\/a>, checkout the <a href=\"http:\/\/www.eweek.com\/article2\/0,3959,633780,00.asp\">Web Application Security Best Practices<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In eWeek, Hardening the OpenHack App, checkout the Web Application Security Best Practices.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[12],"tags":[],"_links":{"self":[{"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/posts\/127"}],"collection":[{"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/comments?post=127"}],"version-history":[{"count":0,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/posts\/127\/revisions"}],"wp:attachment":[{"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/media?parent=127"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/categories?post=127"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cephas.net\/blog\/wp-json\/wp\/v2\/tags?post=127"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}