{"id":595,"date":"2004-07-01T17:00:00","date_gmt":"2004-07-01T17:00:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm"},"modified":"2007-05-15T15:54:31","modified_gmt":"2007-05-15T14:54:31","slug":"why-physical-access-to-pc-is-so-useful","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm","title":{"rendered":"Why physical access to a PC is so useful for a hacker"},"content":{"rendered":"<p><!--113865663375199797-->This week, I&#8217;ve been attending a (Microsoft-sponsored) training course, looking at Windows security.  Now, what happens when you get a bunch of techies together in a room and talk about security?  Exactly!  We all start to think of ways around things.  Like the classroom PCs with locked-down configurations&#8230;<\/p>\n<p>&#8230;the guy sitting next to me (who will remain anonymous, as will the training provider) had a <a href=\"http:\/\/www.winternals.com\/\">Winternals ERD Commander 2003 boot CD.<\/a><\/p>\n<p>Using this, we were quickly able to reboot, launch the Locksmith utility and reset the administrator password to one of our choice, following which we had unrestricted access to the PC.<\/p>\n<p>It was all just a bit of harmless fun within a classroom environment, but it goes to show why physical access is such an important part of a defence in depth strategy.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This week, I&#8217;ve been attending a (Microsoft-sponsored) training course, looking at Windows security. Now, what happens when you get a bunch of techies together in a room and talk about security? Exactly! We all start to think of ways around things. Like the classroom PCs with locked-down configurations&#8230; &#8230;the guy sitting next to me (who &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Why physical access to a PC is so useful for a hacker<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[43],"class_list":["post-595","post","type-post","status-publish","format-standard","hentry","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why physical access to a PC is so useful for a hacker - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why physical access to a PC is so useful for a hacker - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"This week, I&#8217;ve been attending a (Microsoft-sponsored) training course, looking at Windows security. Now, what happens when you get a bunch of techies together in a room and talk about security? Exactly! We all start to think of ways around things. Like the classroom PCs with locked-down configurations&#8230; &#8230;the guy sitting next to me (who &hellip; Continue reading Why physical access to a PC is so useful for a hacker\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2004-07-01T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-05-15T14:54:31+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/07\\\/why-physical-access-to-pc-is-so-useful.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/07\\\/why-physical-access-to-pc-is-so-useful.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Why physical access to a PC is so useful for a hacker\",\"datePublished\":\"2004-07-01T17:00:00+00:00\",\"dateModified\":\"2007-05-15T14:54:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/07\\\/why-physical-access-to-pc-is-so-useful.htm\"},\"wordCount\":146,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/07\\\/why-physical-access-to-pc-is-so-useful.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/07\\\/why-physical-access-to-pc-is-so-useful.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/07\\\/why-physical-access-to-pc-is-so-useful.htm\",\"name\":\"Why physical access to a PC is so useful for a hacker - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2004-07-01T17:00:00+00:00\",\"dateModified\":\"2007-05-15T14:54:31+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/07\\\/why-physical-access-to-pc-is-so-useful.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/07\\\/why-physical-access-to-pc-is-so-useful.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2004\\\/07\\\/why-physical-access-to-pc-is-so-useful.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why physical access to a PC is so useful for a hacker\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why physical access to a PC is so useful for a hacker - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm","og_locale":"en_GB","og_type":"article","og_title":"Why physical access to a PC is so useful for a hacker - markwilson.it","og_description":"This week, I&#8217;ve been attending a (Microsoft-sponsored) training course, looking at Windows security. Now, what happens when you get a bunch of techies together in a room and talk about security? Exactly! We all start to think of ways around things. Like the classroom PCs with locked-down configurations&#8230; &#8230;the guy sitting next to me (who &hellip; Continue reading Why physical access to a PC is so useful for a hacker","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm","og_site_name":"markwilson.it","article_published_time":"2004-07-01T17:00:00+00:00","article_modified_time":"2007-05-15T14:54:31+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Why physical access to a PC is so useful for a hacker","datePublished":"2004-07-01T17:00:00+00:00","dateModified":"2007-05-15T14:54:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm"},"wordCount":146,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm","name":"Why physical access to a PC is so useful for a hacker - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2004-07-01T17:00:00+00:00","dateModified":"2007-05-15T14:54:31+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2004\/07\/why-physical-access-to-pc-is-so-useful.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Why physical access to a PC is so useful for a hacker"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":2093,"url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/11\/how-tablets-will-disrupt-desktop-managed-service-delivery.htm","url_meta":{"origin":595,"position":0},"title":"How tablets will disrupt desktop managed service delivery","author":"Mark Wilson","date":"Tuesday 9 November 2010","format":false,"excerpt":"I've been watching the tweets from this week's Gartner Symposium with interest and it looks as though there is a lot of interesting stuff happening out in Cannes this week but I was rather surprised to see this tweet, from Graeme Hackland: \"#gartnersym consensus in the room seems to be\u2026","rel":"","context":"In \"Apple iPad\"","block_context":{"text":"Apple iPad","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/ipad"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":62,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/new-use-for-virtualisation.htm","url_meta":{"origin":595,"position":1},"title":"A new use for virtualisation?","author":"Mark Wilson","date":"Monday 21 February 2005","format":false,"excerpt":"The running of legacy applications that cannot be ported to a modern operating system, in their own legacy environment, inside a virtual machine on a modern host operating system is often cited as one of the advantages of virtualisation. I have a slightly different issue. As a consultant, I spend\u2026","rel":"","context":"In \"Virtualisation\"","block_context":{"text":"Virtualisation","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/virtualisation"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":203,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/12\/securing-my-wireless-network.htm","url_meta":{"origin":595,"position":2},"title":"Securing my wireless network","author":"Mark Wilson","date":"Thursday 22 December 2005","format":false,"excerpt":"Last week I wrote about upgrading my wireless network. It's been running well since then, so this afternoon I decided to go ahead with stage 3 - configuring wifi protected access (WPA). As I haven't set up a RADIUS server here, and to be honest, it would be overkill for\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4609,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/11\/unable-to-access-barclaycard-powered-credit-card-websites-try-inprivate-browsing.htm","url_meta":{"origin":595,"position":3},"title":"Unable to access Barclaycard-powered credit card websites? Try InPrivate browsing","author":"Mark Wilson","date":"Friday 23 November 2012","format":false,"excerpt":"Late last night, I was trying to log on to the website for a credit card that I use, that's branded as belonging to a hotel chain but actually provided by Barclaycard*. \u00a0After going through the usual security theatre to log on, the system kept telling me that it was\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1014,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/03\/the-delicate-balance-between-it-security-supportability-and-usability.htm","url_meta":{"origin":595,"position":4},"title":"The delicate balance between IT security, supportability and usability","author":"Mark Wilson","date":"Tuesday 11 March 2008","format":false,"excerpt":"There is a delicate balance between IT security, supportability and usability. Just like the project management trilogy of fastest time, lowest cost and highest quality, you cannot have all three. Or can you? Take, for example, a fictitious company with an IT-savvy user who has a business requirement to run\u2026","rel":"","context":"In &quot;Waffle and randomness&quot;","block_context":{"text":"Waffle and randomness","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/inane-waffle"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4495,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/10\/the-desktop-is-an-outdated-concept.htm","url_meta":{"origin":595,"position":5},"title":"The &#8220;desktop&#8221; is an outdated concept","author":"Mark Wilson","date":"Thursday 25 October 2012","format":false,"excerpt":"In terms of productivity, yesterday was a write-off - and it looks like today will be too. My company-supplied notebook PC is unusable and I need to get it fixed. Understandably, a loss of service for one user is not allocated the highest priority and at least a desktop services\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/595","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=595"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/595\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=595"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=595"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=595"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}