{"id":376,"date":"2005-11-21T13:16:00","date_gmt":"2005-11-21T13:16:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2005\/11\/some-handy-system-utilities.htm"},"modified":"2008-12-05T21:15:31","modified_gmt":"2008-12-05T21:15:31","slug":"some-handy-system-utilities","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm","title":{"rendered":"Some handy system utilities"},"content":{"rendered":"<p><!--113257949653012747-->Most system administrators are used to using utilities from <a href=\"http:\/\/www.sysinternals.com\/\">Sysinternals<\/a> &#8211; <a href=\"http:\/\/www.sysinternals.com\/blog\/\">Mark Russinovich<\/a> and Bryce Cogswell&#8217;s operating system internals site &#8211; and last year I blogged about some <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/10\/free-network-scanning-tools.htm\">free network scanning tools<\/a> from <a href=\"http:\/\/www.eeye.com\/html\/resources\/downloads\/index.html\">eEye Digital Security<\/a> (although with some trepidation as for those of us who need to keep systems secure, they are valuable tools, but there are others who may wish to use them for nefarious purposes, which I&#8217;m certainly not encouraging).<\/p>\n<p>A couple of days back, I stumbled across Nir Sofer&#8217;s <a href=\"http:\/\/www.nirsoft.net\/\">NirSoft<\/a> site which is full of freeware utilities, some of which are quite frankly frighteningly easy to use to obtain information that should remain secret (e.g. the product keys for Windows and Office installations and stored passwords for various common applications).<\/p>\n<p>Of course, I&#8217;m supplying this information all with a health warning &#8211; although these utilities look useful, I haven&#8217;t checked if there are any side effects (e.g. rootkits or trojan horses, although <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/why-i-think-copy-protection-has-gone.htm\">these days all you need is to play a CD to get infected by a rootkit<\/a>) and the anti-virus software on our corporate firewall is certainly preventing access to some of the utilities &#8211; highlighting them as password crackers.<\/p>\n<p>You have been warned!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most system administrators are used to using utilities from Sysinternals &#8211; Mark Russinovich and Bryce Cogswell&#8217;s operating system internals site &#8211; and last year I blogged about some free network scanning tools from eEye Digital Security (although with some trepidation as for those of us who need to keep systems secure, they are valuable tools, &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Some handy system utilities<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[39],"class_list":["post-376","post","type-post","status-publish","format-standard","hentry","tag-useful-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Some handy system utilities - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Some handy system utilities - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"Most system administrators are used to using utilities from Sysinternals &#8211; Mark Russinovich and Bryce Cogswell&#8217;s operating system internals site &#8211; and last year I blogged about some free network scanning tools from eEye Digital Security (although with some trepidation as for those of us who need to keep systems secure, they are valuable tools, &hellip; Continue reading Some handy system utilities\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2005-11-21T13:16:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2008-12-05T21:15:31+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/11\\\/some-handy-system-utilities.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/11\\\/some-handy-system-utilities.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Some handy system utilities\",\"datePublished\":\"2005-11-21T13:16:00+00:00\",\"dateModified\":\"2008-12-05T21:15:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/11\\\/some-handy-system-utilities.htm\"},\"wordCount\":210,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Useful Software\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/11\\\/some-handy-system-utilities.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/11\\\/some-handy-system-utilities.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/11\\\/some-handy-system-utilities.htm\",\"name\":\"Some handy system utilities - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2005-11-21T13:16:00+00:00\",\"dateModified\":\"2008-12-05T21:15:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/11\\\/some-handy-system-utilities.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/11\\\/some-handy-system-utilities.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/11\\\/some-handy-system-utilities.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Some handy system utilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Some handy system utilities - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm","og_locale":"en_GB","og_type":"article","og_title":"Some handy system utilities - markwilson.it","og_description":"Most system administrators are used to using utilities from Sysinternals &#8211; Mark Russinovich and Bryce Cogswell&#8217;s operating system internals site &#8211; and last year I blogged about some free network scanning tools from eEye Digital Security (although with some trepidation as for those of us who need to keep systems secure, they are valuable tools, &hellip; Continue reading Some handy system utilities","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm","og_site_name":"markwilson.it","article_published_time":"2005-11-21T13:16:00+00:00","article_modified_time":"2008-12-05T21:15:31+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Some handy system utilities","datePublished":"2005-11-21T13:16:00+00:00","dateModified":"2008-12-05T21:15:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm"},"wordCount":210,"commentCount":1,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Useful Software"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm","name":"Some handy system utilities - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2005-11-21T13:16:00+00:00","dateModified":"2008-12-05T21:15:31+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/some-handy-system-utilities.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Some handy system utilities"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":725,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/10\/free-network-scanning-tools.htm","url_meta":{"origin":376,"position":0},"title":"Free network scanning tools","author":"Mark Wilson","date":"Monday 25 October 2004","format":false,"excerpt":"Network scanning tools are a bit of a grey area. For those of us who need to keep systems secure, they are valuable tools. But for those who are unaware of their existence, they are a means for a would be attacker to scan your network in search of vulnerabilities.\u2026","rel":"","context":"In \"Useful Software\"","block_context":{"text":"Useful Software","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/useful-software"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":49,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/01\/microsofts-new-malware-removal-and.htm","url_meta":{"origin":376,"position":1},"title":"Microsoft&#8217;s new malware removal and anti-spyware products","author":"Mark Wilson","date":"Friday 14 January 2005","format":false,"excerpt":"This week, alongside the January security updates, Microsoft released the first version of its malware removal tool, called the Microsoft Windows Malicious Software Removal Tool (MSRT). New versions will be released on the second Tuesday of each month (with the monthly security updates) and each version will be cumulative. Note\u2026","rel":"","context":"In \"Malware\"","block_context":{"text":"Malware","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/malware"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":115,"url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/05\/scripting-changes-to-resource.htm","url_meta":{"origin":376,"position":2},"title":"Scripting changes to resource permissions in Windows","author":"Mark Wilson","date":"Wednesday 12 May 2004","format":false,"excerpt":"Earlier today, I needed to include some registry permissions changes within a command line script that I was writing. Microsoft knowledge base article 245031 discusses a method using the regini.exe resource kit tool for Windows NT 4.0; however, for Windows 2000, XP and Server 2003 there is the SubInACL utility\u2026","rel":"","context":"In \"Microsoft Windows\"","block_context":{"text":"Microsoft Windows","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":201,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-your-windows-computer-with.htm","url_meta":{"origin":376,"position":3},"title":"Securing your Windows computer with syskey","author":"Mark Wilson","date":"Friday 16 December 2005","format":false,"excerpt":"At an event a few weeks back, Steve Lamb mentioned using the syskey utility to secure a Windows system. Even though it's a standard Windows utility, I'd never heard of it before and Steve has now written about syskey on his blog, along with a follow up post on storing\u2026","rel":"","context":"In \"Microsoft Windows XP\"","block_context":{"text":"Microsoft Windows XP","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-xp"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":881,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/08\/useful-source-for-microsoft-resource-kit-utilities.htm","url_meta":{"origin":376,"position":4},"title":"Useful source for Microsoft resource kit utilities","author":"Mark Wilson","date":"Tuesday 14 August 2007","format":false,"excerpt":"A couple of nights back, I needed to get hold of a Windows 2000 Server resource kit utility called cusrmgr.exe in an attempt to add a global security group from a domain to the local Administrators group on a Windows Server 2008 core server (following the advice in Microsoft knowledge\u2026","rel":"","context":"In \"Microsoft Windows Server 2008\"","block_context":{"text":"Microsoft Windows Server 2008","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-server-2008"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":983,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/02\/download-all-the-sysinternals-troubleshooting-tools-as-a-single-suite.htm","url_meta":{"origin":376,"position":5},"title":"Download all the Sysinternals troubleshooting tools as a single suite","author":"Mark Wilson","date":"Tuesday 5 February 2008","format":false,"excerpt":"Garry Martin dropped me a line to let me know that (finally), the Sysinternals troubleshooting utilities have been rolled into a suite for download from the Microsoft TechNet website. Furthermore, this 8MB download is free of charge.","rel":"","context":"In \"Microsoft\"","block_context":{"text":"Microsoft","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/microsoft"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/376","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=376"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/376\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=376"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=376"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=376"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}