{"id":163,"date":"2005-09-11T18:32:00","date_gmt":"2005-09-11T18:32:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm"},"modified":"2007-07-09T09:46:03","modified_gmt":"2007-07-09T08:46:03","slug":"one-method-of-opening-strange","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm","title":{"rendered":"One method of opening strange attachments from trusted sources"},"content":{"rendered":"<p><!--112646389353617235-->Whilst I was on holiday last week, a professional photographer friend of ours sent me a list of gear that he is selling now that he has switched from Nikon to Canon (come on Nikon, can we have a full-frame image sensor in a digital SLR please&#8230;).  Unfortunately, he is a Macintosh user and the attachment arrived in Microsoft Outlook as a a .DAT file.  Not having a clue what application he had created this list in, I opened it with Notepad and found the words Microsoft Excel Worksheet contained within all of the binary garbage.  I opened the file again (this time in Excel) and hey presto &#8211; a list of equipment for sale!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Whilst I was on holiday last week, a professional photographer friend of ours sent me a list of gear that he is selling now that he has switched from Nikon to Canon (come on Nikon, can we have a full-frame image sensor in a digital SLR please&#8230;). Unfortunately, he is a Macintosh user and the &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">One method of opening strange attachments from trusted sources<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[8,47],"class_list":["post-163","post","type-post","status-publish","format-standard","hentry","tag-e-mail","tag-office"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>One method of opening strange attachments from trusted sources - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"One method of opening strange attachments from trusted sources - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"Whilst I was on holiday last week, a professional photographer friend of ours sent me a list of gear that he is selling now that he has switched from Nikon to Canon (come on Nikon, can we have a full-frame image sensor in a digital SLR please&#8230;). Unfortunately, he is a Macintosh user and the &hellip; Continue reading One method of opening strange attachments from trusted sources\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2005-09-11T18:32:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-07-09T08:46:03+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/09\\\/one-method-of-opening-strange.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/09\\\/one-method-of-opening-strange.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"One method of opening strange attachments from trusted sources\",\"datePublished\":\"2005-09-11T18:32:00+00:00\",\"dateModified\":\"2007-07-09T08:46:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/09\\\/one-method-of-opening-strange.htm\"},\"wordCount\":124,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"E-mail\",\"Microsoft Office\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/09\\\/one-method-of-opening-strange.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/09\\\/one-method-of-opening-strange.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/09\\\/one-method-of-opening-strange.htm\",\"name\":\"One method of opening strange attachments from trusted sources - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2005-09-11T18:32:00+00:00\",\"dateModified\":\"2007-07-09T08:46:03+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/09\\\/one-method-of-opening-strange.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/09\\\/one-method-of-opening-strange.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/09\\\/one-method-of-opening-strange.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"One method of opening strange attachments from trusted sources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"One method of opening strange attachments from trusted sources - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm","og_locale":"en_GB","og_type":"article","og_title":"One method of opening strange attachments from trusted sources - markwilson.it","og_description":"Whilst I was on holiday last week, a professional photographer friend of ours sent me a list of gear that he is selling now that he has switched from Nikon to Canon (come on Nikon, can we have a full-frame image sensor in a digital SLR please&#8230;). Unfortunately, he is a Macintosh user and the &hellip; Continue reading One method of opening strange attachments from trusted sources","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm","og_site_name":"markwilson.it","article_published_time":"2005-09-11T18:32:00+00:00","article_modified_time":"2007-07-09T08:46:03+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"One method of opening strange attachments from trusted sources","datePublished":"2005-09-11T18:32:00+00:00","dateModified":"2007-07-09T08:46:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm"},"wordCount":124,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["E-mail","Microsoft Office"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm","name":"One method of opening strange attachments from trusted sources - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2005-09-11T18:32:00+00:00","dateModified":"2007-07-09T08:46:03+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/one-method-of-opening-strange.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"One method of opening strange attachments from trusted sources"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":1415,"url":"https:\/\/www.markwilson.co.uk\/blog\/2009\/05\/useful-links-may-2009.htm","url_meta":{"origin":163,"position":0},"title":"Useful Links: May 2009","author":"Mark Wilson","date":"Sunday 31 May 2009","format":false,"excerpt":"A list of items I've come across recently that I found potentially useful, interesting, or just plain funny: PowerShell cheat sheet - Useful PowerShell reference, originally produced by a Microsoft blogger and converted to PDF. NVU - Free, cross-platform, standalone web authoring software. Approved memory cards for Nikon D-SLR cameras\u2026","rel":"","context":"In \"Useful Websites\"","block_context":{"text":"Useful Websites","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/useful-websites"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":361,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/09\/working-with-nikon-raw-nef-images.htm","url_meta":{"origin":163,"position":1},"title":"Working with Nikon raw (.NEF) images","author":"Mark Wilson","date":"Friday 1 September 2006","format":false,"excerpt":"Ever since I started taking photos digitally, I've been meaning to investigate the use of raw image capture as it offers much more flexibility for off-camera editing. Basically, a raw image is the unprocessed data from the camera sensor which most cameras then process to produce a JPEG image; however\u2026","rel":"","context":"In \"Digital Photography\"","block_context":{"text":"Digital Photography","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/digital-photography"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1322,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/12\/camera-raw-support-in-windows-vista-and-later.htm","url_meta":{"origin":163,"position":2},"title":"Camera raw support in Windows Vista and later","author":"Mark Wilson","date":"Sunday 21 December 2008","format":false,"excerpt":"Most of my digital photography workflow takes place on a Mac, where I use Adobe Camera Raw and Bridge\/Photoshop CS3 to handle camera raw images.\u00a0 With my recent purchase of a netbook (which is small enough and light enough to take out with me on a shoot \u00e2\u20ac\u201c and less\u2026","rel":"","context":"In \"Adobe Digital Negative (.DNG)\"","block_context":{"text":"Adobe Digital Negative (.DNG)","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/dng"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":360,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/08\/microsoft-raw-image-thumbnailer-and.htm","url_meta":{"origin":163,"position":3},"title":"Microsoft RAW image thumbnailer and viewer for Windows XP","author":"Mark Wilson","date":"Friday 12 August 2005","format":false,"excerpt":"When I'm not \"messing around with technology\" my main hobby is photography and last September I bought a Nikon D70 digital SLR camera. Since then, I've taken almost 3000 digital images, all as 6 megapixel JPEG images, but for those images which are a bit more than just family snaps\u2026","rel":"","context":"In \"Digital Photography\"","block_context":{"text":"Digital Photography","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/digital-photography"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1432,"url":"https:\/\/www.markwilson.co.uk\/blog\/2009\/05\/quick-tip-for-opening-microsoft-office-files-without-installing-office.htm","url_meta":{"origin":163,"position":4},"title":"Quick tip for opening Microsoft Office files without installing Office","author":"Mark Wilson","date":"Friday 1 May 2009","format":false,"excerpt":"From time to time, I find myself working on a server and thinking it would be useful to be able to open a document and, whilst WordPad usually manages to open enough of a Word document for me to get by, sometimes I need to open a spreadsheet - and\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":5805,"url":"https:\/\/www.markwilson.co.uk\/blog\/2015\/08\/short-takes-excel-tips-display-worksheet-name-validate-data-editing-microsoft-project-files-stored-sharepoint-xps-pdf-conversion-service.htm","url_meta":{"origin":163,"position":5},"title":"Short takes: Excel tips to display the worksheet name and validate data; editing Microsoft Project files stored on SharePoint; and an XPS to PDF conversion service","author":"Mark Wilson","date":"Monday 17 August 2015","format":false,"excerpt":"Another collection of mini-posts based on recent IT trials and tribulations... Excel tips to display the worksheet name in a cell\u00a0and to validate data Last week, I was working on an Excel spreadsheet that acts as a plan for a series of tests. Each sheet has the same format, with\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/163","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=163"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/163\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=163"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=163"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=163"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}