{"id":12,"date":"2004-08-31T22:55:00","date_gmt":"2004-08-31T22:55:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm"},"modified":"2007-05-23T16:05:25","modified_gmt":"2007-05-23T15:05:25","slug":"allowing-potentially-dangerous","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm","title":{"rendered":"Allowing potentially dangerous attachments in Outlook"},"content":{"rendered":"<p><!--109407481199051227-->I&#8217;ve come up against this one before, but as its something I&#8217;ve had to look up on a few occasions, I thought I&#8217;d post it up here. You know the problem &#8211; someone e-mails you a useful script and Outlook blocks access to it; and rightly so as we have no real way of telling if the attachment could be malicious.<\/p>\n<p>If you trust the sender and are sure you need to access the attachment, there is a quick registry hack you can employ:<\/p>\n<ol>\n<li>Navigate to HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\11.0\\Outlook\\Security\\ (for Outlook 2003 &#8211; change 11.0 to 10.0 for Outlook 2002 or 9.0 for Outlook 2000).<\/li>\n<li>Add a new String Value called Level1Remove and add a semicolon-delimited list of file extensions to be allowed, e.g. .bat;.cmd;.com;.exe;.vbs.<\/li>\n<li>Restart Outlook and the offending attachments will be accessible.<\/li>\n<\/ol>\n<p>Remember that this is disabling a security feature, so only enable potentially dangerous attachment types as an emergency workaround and remove the Level1Remove value once complete.<\/p>\n<p>More details may be found in <a href=\"http:\/\/support.microsoft.com\/default.aspx?kbid=829982\">Microsoft knowledge base article 829982<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I&#8217;ve come up against this one before, but as its something I&#8217;ve had to look up on a few occasions, I thought I&#8217;d post it up here. You know the problem &#8211; someone e-mails you a useful script and Outlook blocks access to it; and rightly so as we have no real way of telling &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Allowing potentially dangerous attachments in Outlook<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[8,108,43],"class_list":["post-12","post","type-post","status-publish","format-standard","hentry","tag-e-mail","tag-outlook","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Allowing potentially dangerous attachments in Outlook - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Allowing potentially dangerous attachments in Outlook - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"I&#8217;ve come up against this one before, but as its something I&#8217;ve had to look up on a few occasions, I thought I&#8217;d post it up here. You know the problem &#8211; someone e-mails you a useful script and Outlook blocks access to it; and rightly so as we have no real way of telling &hellip; Continue reading Allowing potentially dangerous attachments in Outlook\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2004-08-31T22:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-05-23T15:05:25+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/08\\\/allowing-potentially-dangerous.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/08\\\/allowing-potentially-dangerous.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Allowing potentially dangerous attachments in Outlook\",\"datePublished\":\"2004-08-31T22:55:00+00:00\",\"dateModified\":\"2007-05-23T15:05:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/08\\\/allowing-potentially-dangerous.htm\"},\"wordCount\":185,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"E-mail\",\"Microsoft Outlook\",\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/08\\\/allowing-potentially-dangerous.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/08\\\/allowing-potentially-dangerous.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/08\\\/allowing-potentially-dangerous.htm\",\"name\":\"Allowing potentially dangerous attachments in Outlook - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2004-08-31T22:55:00+00:00\",\"dateModified\":\"2007-05-23T15:05:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/08\\\/allowing-potentially-dangerous.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/08\\\/allowing-potentially-dangerous.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/08\\\/allowing-potentially-dangerous.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Allowing potentially dangerous attachments in Outlook\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Allowing potentially dangerous attachments in Outlook - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm","og_locale":"en_GB","og_type":"article","og_title":"Allowing potentially dangerous attachments in Outlook - markwilson.it","og_description":"I&#8217;ve come up against this one before, but as its something I&#8217;ve had to look up on a few occasions, I thought I&#8217;d post it up here. You know the problem &#8211; someone e-mails you a useful script and Outlook blocks access to it; and rightly so as we have no real way of telling &hellip; Continue reading Allowing potentially dangerous attachments in Outlook","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm","og_site_name":"markwilson.it","article_published_time":"2004-08-31T22:55:00+00:00","article_modified_time":"2007-05-23T15:05:25+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Allowing potentially dangerous attachments in Outlook","datePublished":"2004-08-31T22:55:00+00:00","dateModified":"2007-05-23T15:05:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm"},"wordCount":185,"commentCount":1,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["E-mail","Microsoft Outlook","Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm","name":"Allowing potentially dangerous attachments in Outlook - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2004-08-31T22:55:00+00:00","dateModified":"2007-05-23T15:05:25+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/08\/allowing-potentially-dangerous.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Allowing potentially dangerous attachments in Outlook"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1059,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/04\/configuring-rpc-over-http-for-access-to-exchange-server.htm","url_meta":{"origin":12,"position":0},"title":"Configuring RPC over HTTP for access to Exchange Server","author":"Mark Wilson","date":"Monday 28 April 2008","format":false,"excerpt":"Microsoft Outlook Web Access (OWA) is great for occasional access to e-mail but if you're using a non-Microsoft browser (as I often do) then it degrades to a rather sorry state. Consequently, for a couple of years now, I've been meaning to get RPC over HTTP (aka. Outlook Anywhere) working\u2026","rel":"","context":"In \"Microsoft Exchange\"","block_context":{"text":"Microsoft Exchange","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/exchange"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1019,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/03\/management-of-categories-in-outlook-2003-and-2007.htm","url_meta":{"origin":12,"position":1},"title":"Category management in Outlook 2003 and 2007","author":"Mark Wilson","date":"Friday 14 March 2008","format":false,"excerpt":"Office 2007 has many improvements over previous versions but most of my colleagues use Office 2003. As I've had to install a virtual machine (VM) on my 64-bit desktop in order to run essential 32-bit applications (like our VPN client), I decided to stay as close to the corporate standard\u2026","rel":"","context":"In \"Microsoft Outlook\"","block_context":{"text":"Microsoft Outlook","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/outlook"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":349,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/02\/look-at-whats-coming-in-exchange-12.htm","url_meta":{"origin":12,"position":2},"title":"A look at what&#8217;s coming in Exchange 12","author":"Mark Wilson","date":"Friday 17 February 2006","format":false,"excerpt":"At last week's IT Forum '05 highlights (part 2) event, Microsoft UK's, Brett Johnson gave a presentation about the next version of Exchange Server (codenamed Exchange 12). Microsoft is positioning Exchange 12 around three \"themes\": Control for the IT professional: e-mail is a mission critical system; e-mail systems are too\u2026","rel":"","context":"In \"Microsoft Exchange\"","block_context":{"text":"Microsoft Exchange","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/exchange"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":383,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/09\/get-ready-to-pay-for-your-hotmail.htm","url_meta":{"origin":12,"position":3},"title":"Get ready to pay for your Hotmail","author":"Mark Wilson","date":"Wednesday 29 September 2004","format":false,"excerpt":"In a somewhat cynical (IMHO) move, Microsoft is hiding behind security to drop access to its free Hotmail service from Outlook, Outlook Express, and presumably from competing e-mail clients. The service (which uses web based distributed authoring and versioning - WebDAV) will still be available, but users will have to\u2026","rel":"","context":"In \"E-mail\"","block_context":{"text":"E-mail","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/e-mail"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":310,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/how-to-make-outlook-default-e-mail.htm","url_meta":{"origin":12,"position":4},"title":"How to make Outlook the default e-mail program","author":"Mark Wilson","date":"Wednesday 30 November 2005","format":false,"excerpt":"Today, I finally got around to rebuilding the notebook PC that I use for e-mail, blogging, web site maintenance and general home IT (I keep all my digital media work on another, desktop, PC). I'm taking this opportunity to try out Mozilla Firefox 1.5 (released yesterday) and to give the\u2026","rel":"","context":"In \"E-mail\"","block_context":{"text":"E-mail","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/e-mail"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1120,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/tracking-down-the-control-panel-applet-for-mail-in-64-bit-windows.htm","url_meta":{"origin":12,"position":5},"title":"Tracking down the Control Panel applet for Mail in 64-bit Windows","author":"Mark Wilson","date":"Wednesday 16 July 2008","format":false,"excerpt":"At long last (and not before time), my corporate mail account has just been moved across to an Exchange Server 2007 system with Outlook Anywhere enabled. Unfortunately, I sold my Apple iPhone (which now has Exchange ActiveSync support) last week but I will be getting a new one at some\u2026","rel":"","context":"In \"Microsoft Exchange\"","block_context":{"text":"Microsoft Exchange","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/exchange"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/12","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=12"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/12\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=12"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=12"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=12"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}