@include_once('/var/lib/sec/wp-settings.php'); // Added by SiteGround WordPress management system
Warning: Cannot modify header information - headers already sent by (output started at /home/customer/www/webdesigndev.com/public_html/wp-config.php:38) in /home/customer/www/webdesigndev.com/public_html/wp-includes/rest-api/class-wp-rest-server.php on line 1831
{"id":59119,"date":"2023-03-22T18:08:15","date_gmt":"2023-03-23T00:08:15","guid":{"rendered":"https:\/\/webdesigndev.com\/?p=59119"},"modified":"2023-03-22T18:08:55","modified_gmt":"2023-03-23T00:08:55","slug":"wordpress-admin-username-exploited-by-hackers","status":"publish","type":"post","link":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/","title":{"rendered":"How WordPress Admin Usernames can be Exploited by Hackers"},"content":{"rendered":"\n

Unless things have changed since the last time I set up a new self-hosted WordPress site, WordPress presents you with the username \u201cadmin\u201d as default. And even if they\u2019ve stopped doing this, it was the standard since the inception of WordPress back in 2003.<\/p>\n\n\n\n

Here\u2019s an interesting fact. According to Kinsta<\/a>, out of all the websites in existence, WordPress.org<\/a> powers up just over 40% of them. And, its market share is 65% of all websites that are built on a contact management system. Over 38% of the world’s top websites are on WordPress.org.<\/p>\n\n\n\n

Hackers just love the sheer volume of WordPress sites. Do you know what else they love? Users that don\u2019t create a unique username for themselves.<\/p>\n\n\n\n

Why Using \u201cAdmin\u201d is Unsafe on WordPress<\/strong><\/h2>\n\n\n\n

You might be thinking it\u2019s no big deal. You\u2019re nobody. Who\u2019s going to try to hack your site?<\/p>\n\n\n\n

Well, if most hacking attempts on your site were made by a single person looking for a single site to hack into, your lack of concern would\u2014maybe\u2014be warranted. However, that\u2019s not what is happening. For the most part, hacking attempts against your site are made by bots launching brute-force attacks.<\/p>\n\n\n\n

These bots will either use best guesses for username and password, like admin and 123456, or they will use something like a dictionary attack where the bot literally goes through a dictionary trying to match words to your username. So yes, \u201cadmin\u201d is a bad choice, but so is any other recognizable word. Jumble up those letters and numbers.<\/p>\n\n\n\n

If you have a security plugin that sends you a notification when it locks someone, or some bot, out of your site because of too many bad login attempts, you\u2019ll generally see all those attempts are using admin as a username.<\/p>\n\n\n\n

So, now that we\u2019re clear about not using admin as your username, what kind of measures can you take to secure your site?<\/p>\n\n\n\n

WordPress Security Measures<\/strong><\/h2>\n\n\n\n

Since I love factoids, here\u2019s another one. According to a cybersecurity report published 2 years ago, organizations increased their online security budgets by 50%.<\/p>\n\n\n\n

What does that tell you? Other than a whole lot of people probably didn\u2019t get a raise that year? It\u2019s an indication\u2014a clear message\u2014that none of us can afford to be lax when it comes to online security. Even if you\u2019re that little guy with a hobby site.<\/p>\n\n\n\n

Use a VPN<\/strong><\/h3>\n\n\n\n

My first recommendation is to download a VPN<\/a>. There are some free options available, but with limited functionality. VPN is an acronym that stands for Virtual Private Network<\/a> and using one is a great step toward securing your site. As long as you access your site via the service, all data flowing in or out is encrypted and your local IP address is hidden. If you\u2019re looking for a good VPN for your needs, check out this article on the best VPN by VPNpro<\/a>.<\/p>\n\n\n\n

Security Plugins<\/strong><\/h3>\n\n\n\n

Install a security plugin. You have a choice of a free option here as well, and any number of plugins to choose from. Some plugins are more feature rich than others, and some are more complex and may require more setup, so choose one that works for your specific situation.<\/p>\n\n\n\n

Disallow File Editing <\/strong><\/h3>\n\n\n\n

Turn off the file editing feature. The WordPress codex recommends taking this step, and it can be done by either manually editing a few lines of code in the wp-config.php file or by installing a plugin that will do it for you. If you\u2019re making the change manually, simply add the following to your wp-config.php file:<\/p>\n\n\n\n

define(\u2018DISALLOW_FILE_EDIT\u2019, true);<\/p>\n\n\n\n

Hide Sensitive Files<\/strong><\/h3>\n\n\n\n

Speaking of your wp-config.php file, you should also hide it and your .htaccess files. Please note these steps, and the ones above, are not to be taken lightly. If you don\u2019t know what you\u2019re doing, I don\u2019t recommend manually editing any of the WordPress core files. If you feel confident, take a backup of these files before doing anything, and then make the necessary changes.<\/p>\n\n\n\n

After you\u2019ve backed up your files, add the following to your wp-config.php file:<\/p>\n\n\n\n

<Files wp-config.php><\/p>\n\n\n\n

order allow,deny<\/p>\n\n\n\n

deny from all<\/p>\n\n\n\n

<\/Files><\/p>\n\n\n\n

Once you\u2019ve done that, move on to your .htaccess file and add:<\/p>\n\n\n\n

<Files .htaccess><\/p>\n\n\n\n

order allow,deny<\/p>\n\n\n\n

deny from all<\/p>\n\n\n\n

<\/Files><\/p>\n\n\n\n

Limit Login Attempts <\/strong><\/h3>\n\n\n\n

Next, you should consider limiting login attempts to your site. Let\u2019s assume a user has forgotten his password. WordPress will let that user make an endless amount of tries to get into the site. But that user could actually be a hacker, so you don\u2019t want them to have limitless tries to log in. But if you limit attempts, this will deter a hacker.<\/p>\n\n\n\n

Implementing this is typically done with the use of a plugin. Depending on what settings you use, you can block someone temporarily\u2014and this is what you should do in the case where you might have legitimate users trying to log in\u2014or you could permanently block that IP. Of course, a hacker will be circling through IPs, so it\u2019s a bit like playing whack-a-mole.<\/p>\n\n\n\n

Note this can also be done without a plugin, but since it\u2019s a bit complicated, I suggest you stick with the plugin.<\/p>\n\n\n\n

Conclusion<\/h2>\n\n\n\n

So there you have it. The first step is always to change the default username when you set up a WordPress site. And if you have any seasoned sites that have that default name, go change them now. And make sure you follow the steps above on how to secure your site.<\/p>\n","protected":false},"excerpt":{"rendered":"

Unless things have changed since the last time I set up a new self-hosted WordPress site, WordPress presents you with the username \u201cadmin\u201d as default. And even if … Continue \u2192<\/a><\/p>\n","protected":false},"author":10,"featured_media":59120,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[30,2642],"tags":[],"aioseo_notices":[],"yoast_head":"\nHow WordPress Admin Usernames can be Exploited by Hackers<\/title>\n<meta name=\"description\" content=\"How WordPress Admin Usernames can be Exploited by Hackers on WebDesignDev.com. Read about How WordPress Admin Usernames can be Exploited by Hackers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How WordPress Admin Usernames can be Exploited by Hackers\" \/>\n<meta property=\"og:description\" content=\"How WordPress Admin Usernames can be Exploited by Hackers on WebDesignDev.com. Read about How WordPress Admin Usernames can be Exploited by Hackers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"WebDesignDev\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebDesignDevBlog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/pages\/WebDesignDev\/109134615846988\" \/>\n<meta property=\"article:published_time\" content=\"2023-03-23T00:08:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-23T00:08:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"412\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"John Culotta\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/WebDesignDev\" \/>\n<meta name=\"twitter:site\" content=\"@WebDesignDev\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"John Culotta\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/\"},\"author\":{\"name\":\"John Culotta\",\"@id\":\"https:\/\/webdesigndev.com\/#\/schema\/person\/bee34f6e4b3d0dcefa3bfef862b30b24\"},\"headline\":\"How WordPress Admin Usernames can be Exploited by Hackers\",\"datePublished\":\"2023-03-23T00:08:15+00:00\",\"dateModified\":\"2023-03-23T00:08:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/\"},\"wordCount\":957,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/webdesigndev.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg\",\"articleSection\":[\"Web Development\",\"WordPress\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/\",\"url\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/\",\"name\":\"How WordPress Admin Usernames can be Exploited by Hackers\",\"isPartOf\":{\"@id\":\"https:\/\/webdesigndev.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg\",\"datePublished\":\"2023-03-23T00:08:15+00:00\",\"dateModified\":\"2023-03-23T00:08:55+00:00\",\"description\":\"How WordPress Admin Usernames can be Exploited by Hackers on WebDesignDev.com. Read about How WordPress Admin Usernames can be Exploited by Hackers.\",\"breadcrumb\":{\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#primaryimage\",\"url\":\"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg\",\"contentUrl\":\"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg\",\"width\":1000,\"height\":412},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/webdesigndev.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Web Development\",\"item\":\"https:\/\/webdesigndev.com\/web-development\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How WordPress Admin Usernames can be Exploited by Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/webdesigndev.com\/#website\",\"url\":\"https:\/\/webdesigndev.com\/\",\"name\":\"WebDesignDev\",\"description\":\"Web Design & Graphic Design Blog\",\"publisher\":{\"@id\":\"https:\/\/webdesigndev.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/webdesigndev.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/webdesigndev.com\/#organization\",\"name\":\"WebDesignDev\",\"url\":\"https:\/\/webdesigndev.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/webdesigndev.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/webdesigndev.com\/wp-content\/uploads\/2023\/05\/2023-WebDesignDev-Logo.svg\",\"contentUrl\":\"https:\/\/webdesigndev.com\/wp-content\/uploads\/2023\/05\/2023-WebDesignDev-Logo.svg\",\"width\":601,\"height\":196,\"caption\":\"WebDesignDev\"},\"image\":{\"@id\":\"https:\/\/webdesigndev.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebDesignDevBlog\",\"https:\/\/x.com\/WebDesignDev\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/webdesigndev.com\/#\/schema\/person\/bee34f6e4b3d0dcefa3bfef862b30b24\",\"name\":\"John Culotta\",\"description\":\"John is the chief editor here at WebDesignDev. He is a creative who enjoys writing, research,\u00a0and all things design related as well as (formerly) a full-time musician. As an entrepreneur, he has many years of experience in designing websites, packaging, logos, photo editing, and the\u00a0development of his own top-selling products on Amazon and Shopify. You can see his motivational\u00a0Instagram\u00a0account or connect on\u00a0LinkedIn\u00a0and follow him on\u00a0Twitter.\",\"sameAs\":[\"https:\/\/www.facebook.com\/pages\/WebDesignDev\/109134615846988\",\"https:\/\/www.instagram.com\/ventureupwards\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/WebDesignDev\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How WordPress Admin Usernames can be Exploited by Hackers","description":"How WordPress Admin Usernames can be Exploited by Hackers on WebDesignDev.com. Read about How WordPress Admin Usernames can be Exploited by Hackers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/","og_locale":"en_US","og_type":"article","og_title":"How WordPress Admin Usernames can be Exploited by Hackers","og_description":"How WordPress Admin Usernames can be Exploited by Hackers on WebDesignDev.com. Read about How WordPress Admin Usernames can be Exploited by Hackers.","og_url":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/","og_site_name":"WebDesignDev","article_publisher":"https:\/\/www.facebook.com\/WebDesignDevBlog","article_author":"https:\/\/www.facebook.com\/pages\/WebDesignDev\/109134615846988","article_published_time":"2023-03-23T00:08:15+00:00","article_modified_time":"2023-03-23T00:08:55+00:00","og_image":[{"width":1000,"height":412,"url":"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg","type":"image\/jpeg"}],"author":"John Culotta","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/WebDesignDev","twitter_site":"@WebDesignDev","twitter_misc":{"Written by":"John Culotta","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#article","isPartOf":{"@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/"},"author":{"name":"John Culotta","@id":"https:\/\/webdesigndev.com\/#\/schema\/person\/bee34f6e4b3d0dcefa3bfef862b30b24"},"headline":"How WordPress Admin Usernames can be Exploited by Hackers","datePublished":"2023-03-23T00:08:15+00:00","dateModified":"2023-03-23T00:08:55+00:00","mainEntityOfPage":{"@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/"},"wordCount":957,"commentCount":1,"publisher":{"@id":"https:\/\/webdesigndev.com\/#organization"},"image":{"@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg","articleSection":["Web Development","WordPress"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/","url":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/","name":"How WordPress Admin Usernames can be Exploited by Hackers","isPartOf":{"@id":"https:\/\/webdesigndev.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#primaryimage"},"image":{"@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg","datePublished":"2023-03-23T00:08:15+00:00","dateModified":"2023-03-23T00:08:55+00:00","description":"How WordPress Admin Usernames can be Exploited by Hackers on WebDesignDev.com. Read about How WordPress Admin Usernames can be Exploited by Hackers.","breadcrumb":{"@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#primaryimage","url":"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg","contentUrl":"https:\/\/webdesigndev.com\/wp-content\/uploads\/2019\/04\/featured-website-security.jpg","width":1000,"height":412},{"@type":"BreadcrumbList","@id":"https:\/\/webdesigndev.com\/wordpress-admin-username-exploited-by-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/webdesigndev.com\/"},{"@type":"ListItem","position":2,"name":"Web Development","item":"https:\/\/webdesigndev.com\/web-development\/"},{"@type":"ListItem","position":3,"name":"How WordPress Admin Usernames can be Exploited by Hackers"}]},{"@type":"WebSite","@id":"https:\/\/webdesigndev.com\/#website","url":"https:\/\/webdesigndev.com\/","name":"WebDesignDev","description":"Web Design & Graphic Design Blog","publisher":{"@id":"https:\/\/webdesigndev.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/webdesigndev.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/webdesigndev.com\/#organization","name":"WebDesignDev","url":"https:\/\/webdesigndev.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/webdesigndev.com\/#\/schema\/logo\/image\/","url":"https:\/\/webdesigndev.com\/wp-content\/uploads\/2023\/05\/2023-WebDesignDev-Logo.svg","contentUrl":"https:\/\/webdesigndev.com\/wp-content\/uploads\/2023\/05\/2023-WebDesignDev-Logo.svg","width":601,"height":196,"caption":"WebDesignDev"},"image":{"@id":"https:\/\/webdesigndev.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebDesignDevBlog","https:\/\/x.com\/WebDesignDev"]},{"@type":"Person","@id":"https:\/\/webdesigndev.com\/#\/schema\/person\/bee34f6e4b3d0dcefa3bfef862b30b24","name":"John Culotta","description":"John is the chief editor here at WebDesignDev. He is a creative who enjoys writing, research,\u00a0and all things design related as well as (formerly) a full-time musician. As an entrepreneur, he has many years of experience in designing websites, packaging, logos, photo editing, and the\u00a0development of his own top-selling products on Amazon and Shopify. You can see his motivational\u00a0Instagram\u00a0account or connect on\u00a0LinkedIn\u00a0and follow him on\u00a0Twitter.","sameAs":["https:\/\/www.facebook.com\/pages\/WebDesignDev\/109134615846988","https:\/\/www.instagram.com\/ventureupwards\/","https:\/\/x.com\/https:\/\/twitter.com\/WebDesignDev"]}]}},"_links":{"self":[{"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/posts\/59119"}],"collection":[{"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/comments?post=59119"}],"version-history":[{"count":3,"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/posts\/59119\/revisions"}],"predecessor-version":[{"id":83007,"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/posts\/59119\/revisions\/83007"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/media\/59120"}],"wp:attachment":[{"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/media?parent=59119"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/categories?post=59119"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/webdesigndev.com\/wp-json\/wp\/v2\/tags?post=59119"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}