{"id":2555,"date":"2022-12-12T12:31:55","date_gmt":"2022-12-12T04:31:55","guid":{"rendered":"http:\/\/infosec.usm.my\/v1\/?p=2555"},"modified":"2022-12-12T13:47:28","modified_gmt":"2022-12-12T05:47:28","slug":"dont-have-antivirus","status":"publish","type":"post","link":"https:\/\/infosec.usm.my\/v1\/dont-have-antivirus\/","title":{"rendered":"Remove the malicious software using MRT"},"content":{"rendered":"","protected":false},"excerpt":{"rendered":"","protected":false},"author":4,"featured_media":2564,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-2555","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tutorial"],"_links":{"self":[{"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/posts\/2555","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/comments?post=2555"}],"version-history":[{"count":3,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/posts\/2555\/revisions"}],"predecessor-version":[{"id":2558,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/posts\/2555\/revisions\/2558"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/media\/2564"}],"wp:attachment":[{"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/media?parent=2555"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/categories?post=2555"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/infosec.usm.my\/v1\/wp-json\/wp\/v2\/tags?post=2555"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}