{"id":717,"date":"2023-04-27T14:46:51","date_gmt":"2023-04-27T11:46:51","guid":{"rendered":"https:\/\/cesrey.com\/blog\/?p=717"},"modified":"2023-05-27T02:36:05","modified_gmt":"2023-05-26T23:36:05","slug":"linux-guvenlik-ipuclari-ve-uygulamalari","status":"publish","type":"post","link":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/","title":{"rendered":"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131"},"content":{"rendered":"<p>Linux, a\u00e7\u0131k kaynak kodlu ve \u00fccretsiz bir i\u015fletim sistemidir. Hem ki\u015fisel hem de kurumsal kullan\u0131mlar i\u00e7in olduk\u00e7a pop\u00fclerdir. Ancak, internet \u00fczerindeki tehlikeler nedeniyle Linux&#8217;un g\u00fcvenlik a\u00e7\u0131klar\u0131 da bulunabilir. Bu nedenle, Linux kullan\u0131c\u0131lar\u0131 g\u00fcvenlik konusunda dikkatli olmal\u0131 ve g\u00fcvenlik \u00f6nlemlerini almaya \u00f6zen g\u00f6stermelidir.<\/p>\n<p>\u0130\u015fte Linux g\u00fcvenli\u011fi i\u00e7in baz\u0131 ipu\u00e7lar\u0131 ve uygulamalar\u0131:<\/p>\n<h2>1. G\u00fcncellemeleri Yap\u0131n<\/h2>\n<p>Linux i\u015fletim sistemi, s\u00fcrekli g\u00fcncellenir. Bu g\u00fcncelleme s\u00fcr\u00fcmleri, g\u00fcvenlik a\u00e7\u0131klar\u0131n\u0131 d\u00fczeltmek i\u00e7in yay\u0131nlan\u0131r. Bu nedenle, i\u015fletim sisteminizi g\u00fcncel tutmak, g\u00fcvenli\u011finizi sa\u011flamak i\u00e7in \u00f6nemlidir. Yeni g\u00fcncellemeleri d\u00fczenli olarak kontrol edin ve y\u00fckleyin.<\/p>\n<h2>2. G\u00fc\u00e7l\u00fc Parolalar Kullan\u0131n<\/h2>\n<p>G\u00fc\u00e7l\u00fc parolalar, Linux g\u00fcvenli\u011fi i\u00e7in \u00f6nemlidir. Parolan\u0131z\u0131 en az 8 karakterli yap\u0131n ve b\u00fcy\u00fck\/k\u00fc\u00e7\u00fck harf, say\u0131 ve sembol i\u00e7ersin. Ayr\u0131ca, ayn\u0131 parolay\u0131 birden fazla hesapta kullanmay\u0131n.<\/p>\n<h2>3. Firewall Kullan\u0131n<\/h2>\n<p>Firewall, internete ba\u011fl\u0131 herhangi bir cihaz i\u00e7in \u00f6nemlidir. Linux i\u015fletim sistemi, varsay\u0131lan olarak bir firewall i\u00e7erir. Ancak, kullan\u0131c\u0131lar\u0131n firewall ayarlar\u0131n\u0131 kontrol etmeleri ve gerekirse \u00f6zelle\u015ftirmeleri \u00f6nerilir.<\/p>\n<h2>4. Dosya Sistemi \u0130zinlerini Ayarlay\u0131n<\/h2>\n<p>Linux i\u015fletim sistemi, dosya sistemi izinleriyle \u00e7al\u0131\u015f\u0131r. Bu izinler, dosyalar\u0131n kimler taraf\u0131ndan okunabilece\u011fini, kimlerin yazabilece\u011fini ve kimlerin \u00e7al\u0131\u015ft\u0131rabilece\u011fini y\u00f6netir. \u0130zinleri do\u011fru ayarlamak, bilgisayar\u0131n\u0131z\u0131n g\u00fcvenli\u011fini art\u0131rabilir.<\/p>\n<h2>5. Antivir\u00fcs Yaz\u0131l\u0131m\u0131 Kullan\u0131n<\/h2>\n<p>Linux i\u015fletim sistemi, vir\u00fcslere kar\u015f\u0131 g\u00fc\u00e7l\u00fc bir koruma sa\u011flar. Ancak, yine de antivir\u00fcs yaz\u0131l\u0131m\u0131 kullanmak \u00f6nerilir. Baz\u0131 antivir\u00fcs yaz\u0131l\u0131mlar\u0131, k\u00f6t\u00fc ama\u00e7l\u0131 yaz\u0131l\u0131mlar\u0131n yan\u0131 s\u0131ra di\u011fer tehditleri de tespit edebilir.<\/p>\n<h2>6. G\u00fcvenli \u0130nternet Taray\u0131c\u0131s\u0131 Kullan\u0131n<\/h2>\n<p>\u0130nternet taray\u0131c\u0131lar\u0131, internette gezinirken bilgisayar\u0131n\u0131za zararl\u0131 yaz\u0131l\u0131m bula\u015fmas\u0131na neden olabilen bir\u00e7ok tehdit i\u00e7erir. Linux kullan\u0131c\u0131lar\u0131, g\u00fcvenli bir internet taray\u0131c\u0131s\u0131 kullanarak bu riski azaltabilirler. Baz\u0131 g\u00fcvenli internet taray\u0131c\u0131lar\u0131 aras\u0131nda Firefox, Chrome ve Opera yer al\u0131r.<\/p>\n<p>Linux g\u00fcvenli\u011fi, kullan\u0131c\u0131lar\u0131n dikkatli olmas\u0131 ve do\u011fru \u00f6nlemleri almalar\u0131 ile sa\u011flanabilir. Yukar\u0131da belirtilen ipu\u00e7lar\u0131 ve uygulamalar\u0131 kullanarak, Linux i\u015fletim sisteminizi g\u00fcvende tutabilirsiniz.<\/p>\n<div class=\"newspaper-x-tags\"><strong>TAGS: <\/strong><span><a href=\"https:\/\/cesrey.com\/blog\/tag\/guvenlik\/\" rel=\"tag\">g\u00fcvenlik<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/i%cc%87puclari\/\" rel=\"tag\">i\u0307pu\u00e7lar\u0131<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/linux\/\" rel=\"tag\">linux<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/uygulamalari\/\" rel=\"tag\">uygulamalar\u0131<\/a><\/span><a href=\"https:\/\/cesrey.com\/blog\/tag\/ve\/\" rel=\"tag\">ve<\/a> <\/div>\n","protected":false},"excerpt":{"rendered":"<p>Linux, a\u00e7\u0131k kaynak kodlu ve \u00fccretsiz bir i\u015fletim sistemidir. Hem ki\u015fisel hem de kurumsal kullan\u0131mlar i\u00e7in olduk\u00e7a pop\u00fclerdir. Ancak, internet \u00fczerindeki tehlikeler nedeniyle Linux&#8217;un g\u00fcvenlik a\u00e7\u0131klar\u0131 da bulunabilir. Bu nedenle, Linux kullan\u0131c\u0131lar\u0131 g\u00fcvenlik konusunda dikkatli olmal\u0131 ve g\u00fcvenlik \u00f6nlemlerini almaya \u00f6zen g\u00f6stermelidir. \u0130\u015fte Linux g\u00fcvenli\u011fi i\u00e7in baz\u0131 ipu\u00e7lar\u0131 ve uygulamalar\u0131: 1. G\u00fcncellemeleri Yap\u0131n Linux i\u015fletim [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[91,315,292,208,167],"class_list":["post-717","post","type-post","status-publish","format-standard","hentry","category-linux","tag-guvenlik","tag-ipuclari","tag-linux","tag-uygulamalari","tag-ve"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/\" \/>\n<meta property=\"og:locale\" content=\"tr_TR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog\" \/>\n<meta property=\"og:description\" content=\"Linux, a\u00e7\u0131k kaynak kodlu ve \u00fccretsiz bir i\u015fletim sistemidir. Hem ki\u015fisel hem de kurumsal kullan\u0131mlar i\u00e7in olduk\u00e7a pop\u00fclerdir. Ancak, internet \u00fczerindeki tehlikeler nedeniyle Linux&#8217;un g\u00fcvenlik a\u00e7\u0131klar\u0131 da bulunabilir. Bu nedenle, Linux kullan\u0131c\u0131lar\u0131 g\u00fcvenlik konusunda dikkatli olmal\u0131 ve g\u00fcvenlik \u00f6nlemlerini almaya \u00f6zen g\u00f6stermelidir. \u0130\u015fte Linux g\u00fcvenli\u011fi i\u00e7in baz\u0131 ipu\u00e7lar\u0131 ve uygulamalar\u0131: 1. G\u00fcncellemeleri Yap\u0131n Linux i\u015fletim [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/\" \/>\n<meta property=\"og:site_name\" content=\"Cesrey Web Hosting Blog\" \/>\n<meta property=\"article:published_time\" content=\"2023-04-27T11:46:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-26T23:36:05+00:00\" \/>\n<meta name=\"author\" content=\"Kader Kele\u015f\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Yazan:\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kader Kele\u015f\" \/>\n\t<meta name=\"twitter:label2\" content=\"Tahmini okuma s\u00fcresi\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 dakika\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/\"},\"author\":{\"name\":\"Kader Kele\u015f\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\"},\"headline\":\"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131\",\"datePublished\":\"2023-04-27T11:46:51+00:00\",\"dateModified\":\"2023-05-26T23:36:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/\"},\"wordCount\":410,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"keywords\":[\"g\u00fcvenlik\",\"i\u0307pu\u00e7lar\u0131\",\"linux\",\"uygulamalar\u0131\",\"ve\"],\"articleSection\":[\"Linux\"],\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/\",\"url\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/\",\"name\":\"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog\",\"isPartOf\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#website\"},\"datePublished\":\"2023-04-27T11:46:51+00:00\",\"dateModified\":\"2023-05-26T23:36:05+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/#breadcrumb\"},\"inLanguage\":\"tr\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Anasayfa\",\"item\":\"https:\/\/cesrey.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cesrey.com\/blog\/#website\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"name\":\"Cesrey Web Hosting Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cesrey.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"tr\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cesrey.com\/blog\/#organization\",\"name\":\"Cesrey Web Hosting Blog\",\"url\":\"https:\/\/cesrey.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"contentUrl\":\"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png\",\"width\":1470,\"height\":391,\"caption\":\"Cesrey Web Hosting Blog\"},\"image\":{\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a\",\"name\":\"Kader Kele\u015f\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"tr\",\"@id\":\"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g\",\"caption\":\"Kader Kele\u015f\"},\"url\":\"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/","og_locale":"tr_TR","og_type":"article","og_title":"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog","og_description":"Linux, a\u00e7\u0131k kaynak kodlu ve \u00fccretsiz bir i\u015fletim sistemidir. Hem ki\u015fisel hem de kurumsal kullan\u0131mlar i\u00e7in olduk\u00e7a pop\u00fclerdir. Ancak, internet \u00fczerindeki tehlikeler nedeniyle Linux&#8217;un g\u00fcvenlik a\u00e7\u0131klar\u0131 da bulunabilir. Bu nedenle, Linux kullan\u0131c\u0131lar\u0131 g\u00fcvenlik konusunda dikkatli olmal\u0131 ve g\u00fcvenlik \u00f6nlemlerini almaya \u00f6zen g\u00f6stermelidir. \u0130\u015fte Linux g\u00fcvenli\u011fi i\u00e7in baz\u0131 ipu\u00e7lar\u0131 ve uygulamalar\u0131: 1. G\u00fcncellemeleri Yap\u0131n Linux i\u015fletim [&hellip;]","og_url":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/","og_site_name":"Cesrey Web Hosting Blog","article_published_time":"2023-04-27T11:46:51+00:00","article_modified_time":"2023-05-26T23:36:05+00:00","author":"Kader Kele\u015f","twitter_card":"summary_large_image","twitter_misc":{"Yazan:":"Kader Kele\u015f","Tahmini okuma s\u00fcresi":"2 dakika"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/#article","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/"},"author":{"name":"Kader Kele\u015f","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a"},"headline":"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131","datePublished":"2023-04-27T11:46:51+00:00","dateModified":"2023-05-26T23:36:05+00:00","mainEntityOfPage":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/"},"wordCount":410,"commentCount":0,"publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"keywords":["g\u00fcvenlik","i\u0307pu\u00e7lar\u0131","linux","uygulamalar\u0131","ve"],"articleSection":["Linux"],"inLanguage":"tr","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/","url":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/","name":"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131 - Cesrey Web Hosting Blog","isPartOf":{"@id":"https:\/\/cesrey.com\/blog\/#website"},"datePublished":"2023-04-27T11:46:51+00:00","dateModified":"2023-05-26T23:36:05+00:00","breadcrumb":{"@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/#breadcrumb"},"inLanguage":"tr","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/cesrey.com\/blog\/linux\/linux-guvenlik-ipuclari-ve-uygulamalari\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Anasayfa","item":"https:\/\/cesrey.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Linux G\u00fcvenlik \u0130pu\u00e7lar\u0131 ve Uygulamalar\u0131"}]},{"@type":"WebSite","@id":"https:\/\/cesrey.com\/blog\/#website","url":"https:\/\/cesrey.com\/blog\/","name":"Cesrey Web Hosting Blog","description":"","publisher":{"@id":"https:\/\/cesrey.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cesrey.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"tr"},{"@type":"Organization","@id":"https:\/\/cesrey.com\/blog\/#organization","name":"Cesrey Web Hosting Blog","url":"https:\/\/cesrey.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","contentUrl":"https:\/\/cesrey.com\/blog\/wp-content\/uploads\/2023\/01\/cesrey_Calisma-Yuzeyi-1.png","width":1470,"height":391,"caption":"Cesrey Web Hosting Blog"},"image":{"@id":"https:\/\/cesrey.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/fbcda63dd69ad9381813b54125c8317a","name":"Kader Kele\u015f","image":{"@type":"ImageObject","inLanguage":"tr","@id":"https:\/\/cesrey.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f0e43ba9cc085d429ae9842f969ccaba0528f5b8db91edd5eba7a1733f0d81d5?s=96&d=mm&r=g","caption":"Kader Kele\u015f"},"url":"https:\/\/cesrey.com\/blog\/author\/kaderkeles\/"}]}},"_links":{"self":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/717","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/comments?post=717"}],"version-history":[{"count":1,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/717\/revisions"}],"predecessor-version":[{"id":727,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/posts\/717\/revisions\/727"}],"wp:attachment":[{"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/media?parent=717"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/categories?post=717"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cesrey.com\/blog\/wp-json\/wp\/v2\/tags?post=717"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}