{"id":701,"date":"2023-04-26T14:59:34","date_gmt":"2023-04-26T11:59:34","guid":{"rendered":"https:\/\/cesrey.com\/blog\/?p=701"},"modified":"2023-04-26T15:00:44","modified_gmt":"2023-04-26T12:00:44","slug":"linux-guvenlik-araclari-ve-uygulamalari","status":"publish","type":"post","link":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/","title":{"rendered":"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131"},"content":{"rendered":"<p>Linux i\u015fletim sistemi, a\u00e7\u0131k kaynak kodlu bir yaz\u0131l\u0131m olarak bir\u00e7ok kullan\u0131c\u0131n\u0131n tercih etti\u011fi bir sistemdir. G\u00fcvenlik a\u00e7\u0131s\u0131ndan da olduk\u00e7a g\u00fc\u00e7l\u00fcd\u00fcr. Ancak, her ne kadar g\u00fcvenlik konusunda bir\u00e7ok \u00f6zelli\u011fi olsa da, baz\u0131 durumlarda ek g\u00fcvenlik ara\u00e7lar\u0131 ve uygulamalar\u0131 kullanmak gerekebilir.<\/p>\n<h2>G\u00fcvenlik Duvar\u0131 (Firewall)<\/h2>\n<p>Bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131nda, g\u00fcvenlik duvar\u0131 (firewall) varsay\u0131lan olarak kuruludur. G\u00fcvenlik duvar\u0131, a\u011fa gelen ve a\u011fdan \u00e7\u0131kan trafi\u011fi kontrol eder. Linux i\u00e7in en pop\u00fcler g\u00fcvenlik duvar\u0131 uygulamalar\u0131 aras\u0131nda iptables, ufw, firewalld ve nftables bulunur.<\/p>\n<h2>Sald\u0131r\u0131 Tespit Sistemi (IDS)<\/h2>\n<p>Sald\u0131r\u0131 Tespit Sistemi (IDS), a\u011fdaki sald\u0131r\u0131lar\u0131 tespit etmek i\u00e7in kullan\u0131l\u0131r. IDS, a\u011f trafi\u011fini analiz eder ve anormal aktiviteleri tespit eder. Linux i\u00e7in pop\u00fcler IDS uygulamalar\u0131 aras\u0131nda Snort, Suricata ve OSSEC bulunur.<\/p>\n<h2>Sald\u0131r\u0131 \u00d6nleme Sistemi (IPS)<\/h2>\n<p>Sald\u0131r\u0131 \u00d6nleme Sistemi (IPS), IDS ile benzer \u00e7al\u0131\u015f\u0131r. Ancak, IDS sadece sald\u0131r\u0131lar\u0131 tespit ederken, IPS sald\u0131r\u0131lar\u0131 engeller. Linux i\u00e7in pop\u00fcler IPS uygulamalar\u0131 aras\u0131nda Snort, Suricata ve OSSEC bulunur.<\/p>\n<h2>Antivir\u00fcs Yaz\u0131l\u0131m\u0131<\/h2>\n<p>Linux i\u00e7in antivir\u00fcs yaz\u0131l\u0131m\u0131, bilgisayar\u0131n\u0131z\u0131 zararl\u0131 yaz\u0131l\u0131mlardan korur. Linux i\u00e7in pop\u00fcler antivir\u00fcs yaz\u0131l\u0131mlar\u0131 aras\u0131nda ClamAV, Bitdefender ve F-Prot bulunur.<\/p>\n<h2>\u0130ki Fakt\u00f6rl\u00fc Kimlik Do\u011frulama (2FA)<\/h2>\n<p>\u0130ki fakt\u00f6rl\u00fc kimlik do\u011frulama, kullan\u0131c\u0131lar\u0131n hesaplar\u0131na ek bir g\u00fcvenlik katman\u0131 ekler. Kullan\u0131c\u0131 ad\u0131 ve \u015fifre kombinasyonuna ek olarak, kullan\u0131c\u0131lar\u0131n bir kimlik do\u011frulama uygulamas\u0131 veya SMS ile g\u00f6nderilen bir kod gibi bir \u015feyi de sa\u011flamalar\u0131 gerekir. Linux i\u00e7in pop\u00fcler 2FA uygulamalar\u0131 aras\u0131nda Google Authenticator, FreeOTP ve Authy bulunur.<\/p>\n<p>Linux, g\u00fcvenlik a\u00e7\u0131s\u0131ndan olduk\u00e7a g\u00fc\u00e7l\u00fc bir i\u015fletim sistemidir. Ancak, ek g\u00fcvenlik ara\u00e7lar\u0131 ve uygulamalar\u0131 kullanarak sisteminizi daha da g\u00fc\u00e7lendirebilirsiniz.<\/p>\n<div class=\"newspaper-x-tags\"><strong>TAGS: <\/strong><span><a href=\"https:\/\/cesrey.com\/blog\/tag\/araclari\/\" rel=\"tag\">ara\u00e7lar\u0131<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/guvenlik\/\" rel=\"tag\">g\u00fcvenlik<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/linux\/\" rel=\"tag\">linux<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/uygulamalari\/\" rel=\"tag\">uygulamalar\u0131<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/ve\/\" rel=\"tag\">ve<\/a> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Linux i\u015fletim sistemi, a\u00e7\u0131k kaynak kodlu bir yaz\u0131l\u0131m olarak bir\u00e7ok kullan\u0131c\u0131n\u0131n tercih etti\u011fi bir sistemdir. G\u00fcvenlik a\u00e7\u0131s\u0131ndan da olduk\u00e7a g\u00fc\u00e7l\u00fcd\u00fcr. Ancak, her ne kadar g\u00fcvenlik konusunda bir\u00e7ok \u00f6zelli\u011fi olsa da, baz\u0131 durumlarda ek g\u00fcvenlik ara\u00e7lar\u0131 ve uygulamalar\u0131 kullanmak gerekebilir. G\u00fcvenlik Duvar\u0131 (Firewall) Bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131nda, g\u00fcvenlik duvar\u0131 (firewall) varsay\u0131lan olarak kuruludur. G\u00fcvenlik duvar\u0131, a\u011fa gelen [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":545,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[333,91,292,208,167],"class_list":["post-701","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-linux","tag-araclari","tag-guvenlik","tag-linux","tag-uygulamalari","tag-ve"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog\" \/>\n<meta property=\"og:description\" content=\"Linux i\u015fletim sistemi, a\u00e7\u0131k kaynak kodlu bir yaz\u0131l\u0131m olarak bir\u00e7ok kullan\u0131c\u0131n\u0131n tercih etti\u011fi bir sistemdir. G\u00fcvenlik a\u00e7\u0131s\u0131ndan da olduk\u00e7a g\u00fc\u00e7l\u00fcd\u00fcr. Ancak, her ne kadar g\u00fcvenlik konusunda bir\u00e7ok \u00f6zelli\u011fi olsa da, baz\u0131 durumlarda ek g\u00fcvenlik ara\u00e7lar\u0131 ve uygulamalar\u0131 kullanmak gerekebilir. G\u00fcvenlik Duvar\u0131 (Firewall) Bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131nda, g\u00fcvenlik duvar\u0131 (firewall) varsay\u0131lan olarak kuruludur. G\u00fcvenlik duvar\u0131, a\u011fa gelen [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/\" \/>\n<meta property=\"og:site_name\" content=\"Cesrey Web Hosting Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-26T11:59:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-26T12:00:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/linux-nedir.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Kader Kele\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kader Kele\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/\"},\"author\":{\"name\":\"Kader Kele\u015f\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\"},\"headline\":\"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131\",\"datePublished\":\"2023-04-26T11:59:34+00:00\",\"dateModified\":\"2023-04-26T12:00:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/\"},\"wordCount\":344,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"keywords\":[\"ara\u00e7lar\u0131\",\"g\u00fcvenlik\",\"linux\",\"uygulamalar\u0131\",\"ve\"],\"articleSection\":[\"Linux\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/\",\"url\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/\",\"name\":\"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#website\"},\"datePublished\":\"2023-04-26T11:59:34+00:00\",\"dateModified\":\"2023-04-26T12:00:44+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/cesrey.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cesrey.com\/blog\/#website\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"name\":\"Cesrey Web Hosting Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cesrey.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\",\"name\":\"Cesrey Web Hosting Blog\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"contentUrl\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"width\":1470,\"height\":391,\"caption\":\"Cesrey Web Hosting Blog\"},\"image\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\",\"name\":\"Kader Kele\u015f\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"caption\":\"Kader Kele\u015f\"},\"url\":\"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/","og_locale":"tr_TR","og_type":"article","og_title":"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog","og_description":"Linux i\u015fletim sistemi, a\u00e7\u0131k kaynak kodlu bir yaz\u0131l\u0131m olarak bir\u00e7ok kullan\u0131c\u0131n\u0131n tercih etti\u011fi bir sistemdir. G\u00fcvenlik a\u00e7\u0131s\u0131ndan da olduk\u00e7a g\u00fc\u00e7l\u00fcd\u00fcr. Ancak, her ne kadar g\u00fcvenlik konusunda bir\u00e7ok \u00f6zelli\u011fi olsa da, baz\u0131 durumlarda ek g\u00fcvenlik ara\u00e7lar\u0131 ve uygulamalar\u0131 kullanmak gerekebilir. G\u00fcvenlik Duvar\u0131 (Firewall) Bir\u00e7ok Linux da\u011f\u0131t\u0131m\u0131nda, g\u00fcvenlik duvar\u0131 (firewall) varsay\u0131lan olarak kuruludur. G\u00fcvenlik duvar\u0131, a\u011fa gelen [&hellip;]","og_url":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/","og_site_name":"Cesrey Web Hosting Blog","article_published_time":"2023-04-26T11:59:34+00:00","article_modified_time":"2023-04-26T12:00:44+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/04\/linux-nedir.jpg","type":"image\/jpeg"}],"author":"Kader Kele\u015f","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Kader Kele\u015f","Tahmini okuma s\u00fcresi":"2 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/#article","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/"},"author":{"name":"Kader Kele\u015f","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a"},"headline":"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131","datePublished":"2023-04-26T11:59:34+00:00","dateModified":"2023-04-26T12:00:44+00:00","mainEntityOfPage":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/"},"wordCount":344,"commentCount":0,"publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"keywords":["ara\u00e7lar\u0131","g\u00fcvenlik","linux","uygulamalar\u0131","ve"],"articleSection":["Linux"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/","url":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/","name":"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/#website"},"datePublished":"2023-04-26T11:59:34+00:00","dateModified":"2023-04-26T12:00:44+00:00","breadcrumb":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-araclari-ve-uygulamalari\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/cesrey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux G\u00fcvenlik Ara\u00e7lar\u0131 ve Uygulamalar\u0131"}]},{"@type":"WebSite","@id":"https:\/\/cesrey.com\/blog\/#website","url":"https:\/\/cesrey.com\/blog\/","name":"Cesrey Web Hosting Blog","description":"","publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cesrey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/cesrey.com\/blog\/#organization","name":"Cesrey Web Hosting Blog","url":"https:\/\/cesrey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","contentUrl":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","width":1470,"height":391,"caption":"Cesrey Web Hosting Blog"},"image":{"@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a","name":"Kader Kele\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","caption":"Kader Kele\u015f"},"url":"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/"}]}},"_links":{"self":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/701","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/comments?post=701"}],"version-history":[{"count":1,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/701\/revisions"}],"predecessor-version":[{"id":702,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/701\/revisions\/702"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media\/545"}],"wp:attachment":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media?parent=701"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/categories?post=701"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/tags?post=701"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}