{"id":1153,"date":"2021-07-21T06:42:17","date_gmt":"2021-07-21T11:42:17","guid":{"rendered":"https:\/\/www.knownhost.com\/kb\/?p=1153"},"modified":"2021-10-21T07:08:12","modified_gmt":"2021-10-21T12:08:12","slug":"how-to-prevent-malicious-compromises","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/","title":{"rendered":"How to prevent malicious compromises."},"content":{"rendered":"<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 ez-toc-wrap-right counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #212121;color:#212121\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #212121;color:#212121\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 eztoc-toggle-hide-by-default' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#use_unique_complex_passwords\" >Use Unique, Complex Passwords<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#top_tips\" >Top Tips<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#choose_web_hosting_carefully\" >Choose Web Hosting Carefully<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#get_ddos_protection\" >Get DDoS Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#use_ssl\" >Use SSL<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#keep_desktop_apps_updated\" >Keep Desktop Apps Updated<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#update_server_systems\" >Update Server Systems<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#update_core_applications\" >Update Core Applications<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>Top Tips to Prevent Malicious Compromises<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"use_unique_complex_passwords\"><\/span>Use Unique, Complex Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>With more than&nbsp;<a href=\"https:\/\/www.cnet.com\/news\/2019-data-breach-hall-of-shame-these-were-the-biggest-data-breaches-of-the-year\/\">5,000 data breaches<\/a>&nbsp;in 2019 alone, the importance of using unique, complex passwords cannot be overstated.<\/p>\n\n\n\n<p>The Surveillance Self-Defense guide at eff.org has many&nbsp;<a href=\"https:\/\/ssd.eff.org\/en\/module\/creating-strong-passwords\">recommendations<\/a>&nbsp;regarding passwords including writing them down on paper!<\/p>\n\n\n\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"top_tips\"><\/span>Top Tips<span class=\"ez-toc-section-end\"><\/span><\/h3>\n\n\n\n<p>Use a&nbsp;<a href=\"https:\/\/www.lastpass.com\/password-generator\">password generator<\/a>&nbsp;to create highly complex, secure passwords.<\/p>\n\n\n\n<p>Use a password manager that encrypts passwords for sites, stores them where you can access online via a master password and that has a history of security success.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li>LastPass &#8211;\u00a0<a href=\"https:\/\/www.lastpass.com\/\">www.lastpass.com\/<\/a><\/li><li>NordPass &#8211;\u00a0<a href=\"https:\/\/nordpass.com\/free-password-manager\/\">nordpass.com\/free-password-manager\/<\/a><\/li><li>bitwarden &#8211;\u00a0<a href=\"https:\/\/bitwarden.com\/\">bitwarden.com\/<\/a><\/li><\/ol>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"choose_web_hosting_carefully\"><\/span>Choose Web Hosting Carefully<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The decision as to where to host your website can play as big a role in keeping secure as any other single thing you can do. Compromises happen due to outdated software, updates not applied, systems not secured using best practices and simple lax standards about internal employee and external accesses.<\/p>\n\n\n\n<p>Choosing a web hosting company with more than a decade of proven secure-hosting experience makes sense. A great history of success, coupled with managed hosting that&#8217;s high-performance, high-specification and value priced &#8211; all combine to make&nbsp;<strong><a href=\"https:\/\/www.knownhost.com\/\">KnownHost<\/a><\/strong>&nbsp;web hosting a decision that makes sense.<\/p>\n\n\n\n<p>Quality web hosting will not only keep everything from kernel and operating system software updated to applications and control panels. Updates are critical. More than just updating systems, expert hosts will include hardening and optimization services as standard (behind the scenes) to assure customers of a secure, high-performance solution.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"get_ddos_protection\"><\/span>Get DDoS Protection<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Distributed Denial of Service (DDoS) attacks are one common means hackers use to compromise websites. Even when server hardware and software have been hardened, an exposed, unfiltered network can provide an attack vector.<\/p>\n\n\n\n<p>Choose web hosting, like KnownHost that includes complementary&nbsp;<strong><a href=\"https:\/\/www.knownhost.com\/ddos-protection\">DDoS protection for all<\/a><\/strong>&nbsp;hosting accounts. Ensure that your account has maximum protection from network to server.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"use_ssl\"><\/span>Use SSL<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Secure Sockets Layer (SSL) is what makes http:<em>&nbsp;URLs function as https:<\/em>&nbsp;and what makes the communication between server and web visitor encrypted. It&#8217;s also used to encrypt admin connections with the server so that mail, control panel, and other functions can be encrypted as well.<\/p>\n\n\n\n<p>Some hosts, like KnownHost, provide&nbsp;<strong><a href=\"https:\/\/www.knownhost.com\/ssl-certificates\">free SSL certificates<\/a><\/strong>&nbsp;for web hosting customers because of the important protection SSL affords.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"keep_desktop_apps_updated\"><\/span>Keep Desktop Apps Updated<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>It&#8217;s not always server-side systems that drop the ball and provide hackers an inroad into compromising website systems. There are times that a website owner has an application compromised, dangerous email or website link clicked and thus provides a hacking opportunity at their very own hands.<\/p>\n\n\n\n<p>Use a proven anti-virus, in addition to keeping the operating system and desktop applications up to date, as ways to prevent malicious compromises.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"update_server_systems\"><\/span>Update Server Systems<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The server operating system and underlying technologies like PHP, mySQL or MariaDB, programming languages and interpreters, and more, can all play a role in containing hacking opportunities.<\/p>\n\n\n\n<p>If you&#8217;re using a managed hosting provider, make sure to check with them so that they confirm they&#8217;re role includes keeping systems updated on your behalf.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"update_core_applications\"><\/span>Update Core Applications<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Websites typically run an application, or several applications, such as blog, ecommerce package, wiki or forum. Generally speaking, it&#8217;s the web hosting customer who has installed these that is responsible for keeping them up to date.<\/p>\n\n\n\n<p>An exception to this rule is specialty hosting,&nbsp;<a href=\"https:\/\/www.knownhost.com\/wordpress-hosting\">like WordPress hosting<\/a>, in which the core WordPress install is patched and updated automatically, regularly.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>There are a number of simple, easy to implement, steps that you can put in place to secure your website hosting environment.<\/p>\n\n\n\n<p>Secure your passwords, desktop, server environment and applications and hosting platform in order to minimize hacks of your web hosting account.<\/p>\n\n\n\n<p>If you have questions about what KnownHost can do to help harden your hosting, open up a support ticket and get answers today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Top Tips to Prevent Malicious Compromises Use Unique, Complex Passwords With more than&nbsp;5,000 data breaches&nbsp;in 2019 alone, the importance of using unique, complex passwords cannot be overstated. The Surveillance Self-Defense guide at eff.org has many&nbsp;recommendations&nbsp;regarding passwords including writing them down on paper! Top Tips Use a&nbsp;password generator&nbsp;to create highly complex, secure passwords. Use a password [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[109,128,217,218,219,130,106],"class_list":["post-1153","post","type-post","status-publish","format-standard","hentry","category-getting-started","tag-cpanel","tag-directadmin","tag-preventing-compromise","tag-proactive","tag-reactive","tag-software","tag-wordpress"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to prevent malicious compromises. - KnownHost<\/title>\n<meta name=\"description\" content=\"In this guide we will teach you on how to prevent malicious compromises on your premium KnownHost servers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to prevent malicious compromises. - KnownHost\" \/>\n<meta property=\"og:description\" content=\"In this guide we will teach you on how to prevent malicious compromises on your premium KnownHost servers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-21T11:42:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-21T12:08:12+00:00\" \/>\n<meta name=\"author\" content=\"Jonathan K. W.\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jonathan K. W.\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/how-to-prevent-malicious-compromises\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/how-to-prevent-malicious-compromises\\\/\"},\"author\":{\"name\":\"Jonathan K. W.\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\"},\"headline\":\"How to prevent malicious compromises.\",\"datePublished\":\"2021-07-21T11:42:17+00:00\",\"dateModified\":\"2021-10-21T12:08:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/how-to-prevent-malicious-compromises\\\/\"},\"wordCount\":653,\"keywords\":[\"cpanel\",\"directadmin\",\"preventing compromise\",\"proactive\",\"reactive\",\"software\",\"wordpress\"],\"articleSection\":[\"Getting Started\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/how-to-prevent-malicious-compromises\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/how-to-prevent-malicious-compromises\\\/\",\"name\":\"How to prevent malicious compromises. - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#website\"},\"datePublished\":\"2021-07-21T11:42:17+00:00\",\"dateModified\":\"2021-10-21T12:08:12+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\"},\"description\":\"In this guide we will teach you on how to prevent malicious compromises on your premium KnownHost servers.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/how-to-prevent-malicious-compromises\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/how-to-prevent-malicious-compromises\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/how-to-prevent-malicious-compromises\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to prevent malicious compromises.\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/\",\"name\":\"KnownHost\",\"description\":\"KnownHost provides a comprehensive webhosting knowledge base to help answer many of your common webhosting and linux questions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/kb\\\/#\\\/schema\\\/person\\\/3db6e20d1f33519cd68fe0ba1230a48b\",\"name\":\"Jonathan K. W.\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g\",\"caption\":\"Jonathan K. W.\"},\"sameAs\":[\"https:\\\/\\\/www.knownhost.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to prevent malicious compromises. - KnownHost","description":"In this guide we will teach you on how to prevent malicious compromises on your premium KnownHost servers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/","og_locale":"en_US","og_type":"article","og_title":"How to prevent malicious compromises. - KnownHost","og_description":"In this guide we will teach you on how to prevent malicious compromises on your premium KnownHost servers.","og_url":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/","og_site_name":"KnownHost","article_published_time":"2021-07-21T11:42:17+00:00","article_modified_time":"2021-10-21T12:08:12+00:00","author":"Jonathan K. W.","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jonathan K. W.","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/"},"author":{"name":"Jonathan K. W.","@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b"},"headline":"How to prevent malicious compromises.","datePublished":"2021-07-21T11:42:17+00:00","dateModified":"2021-10-21T12:08:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/"},"wordCount":653,"keywords":["cpanel","directadmin","preventing compromise","proactive","reactive","software","wordpress"],"articleSection":["Getting Started"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/","url":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/","name":"How to prevent malicious compromises. - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/kb\/#website"},"datePublished":"2021-07-21T11:42:17+00:00","dateModified":"2021-10-21T12:08:12+00:00","author":{"@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b"},"description":"In this guide we will teach you on how to prevent malicious compromises on your premium KnownHost servers.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/kb\/how-to-prevent-malicious-compromises\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/kb\/"},{"@type":"ListItem","position":2,"name":"How to prevent malicious compromises."}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/kb\/#website","url":"https:\/\/www.knownhost.com\/kb\/","name":"KnownHost","description":"KnownHost provides a comprehensive webhosting knowledge base to help answer many of your common webhosting and linux questions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/kb\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/kb\/#\/schema\/person\/3db6e20d1f33519cd68fe0ba1230a48b","name":"Jonathan K. W.","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f432b99e6651fe8d1deb57a285bd84e806f1c9ae8b4c6c585d7e3a0b33789ad9?s=96&d=mm&r=g","caption":"Jonathan K. W."},"sameAs":["https:\/\/www.knownhost.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts\/1153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/comments?post=1153"}],"version-history":[{"count":0,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/posts\/1153\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/media?parent=1153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/categories?post=1153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/kb\/wp-json\/wp\/v2\/tags?post=1153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}