{"id":5,"date":"2011-05-03T20:29:31","date_gmt":"2011-05-04T02:29:31","guid":{"rendered":"http:\/\/www.digital-armory.com\/?page_id=5"},"modified":"2012-02-03T09:35:11","modified_gmt":"2012-02-03T15:35:11","slug":"about","status":"publish","type":"page","link":"https:\/\/digital-armory.com\/?page_id=5","title":{"rendered":"Malware Analysis"},"content":{"rendered":"","protected":true},"excerpt":{"rendered":"","protected":true},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"open","ping_status":"open","template":"","meta":{"footnotes":""},"class_list":["post-5","page","type-page","status-publish","post-password-required","hentry"],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/digital-armory.com\/index.php?rest_route=\/wp\/v2\/pages\/5","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digital-armory.com\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/digital-armory.com\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/digital-armory.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/digital-armory.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=5"}],"version-history":[{"count":2,"href":"https:\/\/digital-armory.com\/index.php?rest_route=\/wp\/v2\/pages\/5\/revisions"}],"predecessor-version":[{"id":70,"href":"https:\/\/digital-armory.com\/index.php?rest_route=\/wp\/v2\/pages\/5\/revisions\/70"}],"wp:attachment":[{"href":"https:\/\/digital-armory.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=5"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}