{"id":6434,"date":"2016-05-25T22:17:27","date_gmt":"2016-05-25T21:17:27","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/?p=6434"},"modified":"2016-05-25T22:17:27","modified_gmt":"2016-05-25T21:17:27","slug":"have-i-been-pwned","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm","title":{"rendered":"Have I been pwned?"},"content":{"rendered":"<p>You&#8217;re probably aware that <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-36320322\">LinkedIn suffered a major security breach<\/a>, in which something like 164,611,595 sets of user credentials were stolen. Surprisingly, you won&#8217;t find anything about this in <a href=\"https:\/\/press.linkedin.com\/news-releases\">LinkedIn&#8217;s press releases<\/a>.<\/p>\n<p>In less enlightened times (and before I started using <a href=\"https:\/\/lastpass.com\/\">LastPass<\/a>), I may have re-used passwords. That&#8217;s why breaches like the one at LinkedIn are potentially bad. Re-using that identity means someone can potentially log in as me somewhere else &#8211; I could be <a href=\"https:\/\/en.wikipedia.org\/wiki\/Pwn\">pwned<\/a>.<\/p>\n<p>Microsoft Regional Director and MVP, <a href=\"https:\/\/www.troyhunt.com\/\">Troy Hunt<\/a> (<a href=\"https:\/\/twitter.com\/troyhunt\">@troyhunt<\/a>) has set up <a href=\"https:\/\/haveibeenpwned.com\/\">an extremely useful site called HaveIBeenPwned<\/a>. Entering your email address (yes, that means trusting the site) checks it against a number of known lists and yes, it seems mine was compromised in three hacks (at LinkedIn, Adobe and Gawker). In all of those cases, I&#8217;ve since changed my passwords and for popular sites &#8211;\u00a0where they offer the option &#8211; I&#8217;ve started to\u00a0use second factor authentication solutions (<a href=\"https:\/\/azure.microsoft.com\/en-gb\/services\/multi-factor-authentication\/\">Azure MFA<\/a> has\u00a0been on my Office 365 subscription for a long time, I use <a href=\"https:\/\/www.google.com\/landing\/2step\/\">Google two-step verification<\/a> too and, since tonight, I&#8217;ve added <a href=\"https:\/\/www.linkedin.com\/psettings\/two-step-verification\">LinkedIn&#8217;s two-step verification<\/a> and <a href=\"https:\/\/www.facebook.com\/settings?tab=security&amp;view\">Facebook Login Approvals<\/a>).<\/p>\n<p>So, I guess the two points of this post are:<\/p>\n<ol>\n<li>For heavens sake stop re-using passwords on multiple sites &#8211; you can&#8217;t rely on the security of others.<\/li>\n<li>Turn on 2FA where it&#8217;s available.<\/li>\n<\/ol>\n<p>Hopefully one day soon, passwords will be consigned to the dustbin of technology past&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>You&#8217;re probably aware that LinkedIn suffered a major security breach, in which something like 164,611,595 sets of user credentials were stolen. Surprisingly, you won&#8217;t find anything about this in LinkedIn&#8217;s press releases. In less enlightened times (and before I started using LastPass), I may have re-used passwords. That&#8217;s why breaches like the one at LinkedIn &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Have I been pwned?<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[218],"tags":[43],"class_list":["post-6434","post","type-post","status-publish","format-standard","hentry","category-technology","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Have I been pwned? - markwilson.it<\/title>\n<meta name=\"description\" content=\"Major security breaches like LinkedIn&#039;s bring the (re-)use of passwords into sharp focus. Check to see if you have been pwned. And turn on 2FA!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Have I been pwned? - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"Major security breaches like LinkedIn&#039;s bring the (re-)use of passwords into sharp focus. Check to see if you have been pwned. And turn on 2FA!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-25T21:17:27+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/05\\\/have-i-been-pwned.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/05\\\/have-i-been-pwned.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Have I been pwned?\",\"datePublished\":\"2016-05-25T21:17:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/05\\\/have-i-been-pwned.htm\"},\"wordCount\":246,\"commentCount\":4,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Security\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/05\\\/have-i-been-pwned.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/05\\\/have-i-been-pwned.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/05\\\/have-i-been-pwned.htm\",\"name\":\"Have I been pwned? - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2016-05-25T21:17:27+00:00\",\"description\":\"Major security breaches like LinkedIn's bring the (re-)use of passwords into sharp focus. Check to see if you have been pwned. And turn on 2FA!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/05\\\/have-i-been-pwned.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/05\\\/have-i-been-pwned.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/05\\\/have-i-been-pwned.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Have I been pwned?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Have I been pwned? - markwilson.it","description":"Major security breaches like LinkedIn's bring the (re-)use of passwords into sharp focus. Check to see if you have been pwned. And turn on 2FA!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm","og_locale":"en_GB","og_type":"article","og_title":"Have I been pwned? - markwilson.it","og_description":"Major security breaches like LinkedIn's bring the (re-)use of passwords into sharp focus. Check to see if you have been pwned. And turn on 2FA!","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm","og_site_name":"markwilson.it","article_published_time":"2016-05-25T21:17:27+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Have I been pwned?","datePublished":"2016-05-25T21:17:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm"},"wordCount":246,"commentCount":4,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Security"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm","name":"Have I been pwned? - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2016-05-25T21:17:27+00:00","description":"Major security breaches like LinkedIn's bring the (re-)use of passwords into sharp focus. Check to see if you have been pwned. And turn on 2FA!","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/05\/have-i-been-pwned.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Have I been pwned?"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":6845,"url":"https:\/\/www.markwilson.co.uk\/blog\/2017\/01\/linkedin-endorsements-not-worth-paper-written-itil-foundation-exam-study-tips.htm","url_meta":{"origin":6434,"position":0},"title":"Why LinkedIn endorsements are meaningless (and some ITIL Foundation exam study tips)","author":"Mark Wilson","date":"Tuesday 10 January 2017","format":false,"excerpt":"According to my LinkedIn profile, 25 people have endorsed me for IT Service Management skills. Until last month* my entire knowledge of IT Service Management came from watching Karl McCarthy present at the Northampton branch of the BCS, which does leave me wondering about the value of LinkedIn endorsements... ...still,\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":3612,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/02\/using-linkedin-as-a-b2b-social-media-platform-smwmecsocial-smwldn.htm","url_meta":{"origin":6434,"position":1},"title":"Using LinkedIn as a B2B social media platform (#smwmecsocial #smwldn)","author":"Mark Wilson","date":"Thursday 16 February 2012","format":false,"excerpt":"Yesterday, I wrote about an event I'd attended as part of Social Media Week London, hosted by MEC Global, looking at thought leadership and B2B social media. For reasons of brevity, I skipped over much of LinkedIn's presentation in my original post but it provided a lot of insights that\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"Involving your brand in a social conversation","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/smwmecsocial-linkedin-involve-conversation.jpg?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1806,"url":"https:\/\/www.markwilson.co.uk\/blog\/2010\/05\/reassigning-recommendations-in-linkedin.htm","url_meta":{"origin":6434,"position":2},"title":"Reassigning recommendations in LinkedIn","author":"Mark Wilson","date":"Friday 7 May 2010","format":false,"excerpt":"This week's new job means time to update LinkedIn. Previously, I've taken the view that all of my time with one company was a \"position\", but when I look back at what I've done at Fujitsu in the last 5 years, it's actually pretty diverse and better represented by three\u2026","rel":"","context":"In \"Social Networking\"","block_context":{"text":"Social Networking","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/social-networking"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":4403,"url":"https:\/\/www.markwilson.co.uk\/blog\/2012\/09\/social-media-plunge.htm","url_meta":{"origin":6434,"position":3},"title":"Social Media: Taking the Plunge","author":"Nikki Wilson","date":"Wednesday 26 September 2012","format":false,"excerpt":"January 2012 new year\u2019s resolution: to join the 21st century! With two young children, the past few years have flown by in a time-starved, sleep-deprived haze. Juggling motherhood with work has left little time or head-space for anything new. I\u2019m firmly stuck in the age of email. If I want\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/guest-post.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":5128,"url":"https:\/\/www.markwilson.co.uk\/blog\/2014\/02\/short-takes-android-screenshots-linkedin-invitation-preferences-and-hiding-excel-headings.htm","url_meta":{"origin":6434,"position":4},"title":"Short takes: Android screenshots; LinkedIn invitation preferences; and hiding Excel headings","author":"Mark Wilson","date":"Friday 7 February 2014","format":false,"excerpt":"Every now and again, in an attempt to close down some \"must blog about that\" tabs in my browser, I write one of these \"short takes\" posts\u2026 here's the latest snippets from the world of Mark... Screen-grabbing on Android There have been a couple of occasions recently when I've wanted\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":1125,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/windows-server-user-group-uk-on-linkedin.htm","url_meta":{"origin":6434,"position":5},"title":"Windows Server User Group UK on LinkedIn","author":"Mark Wilson","date":"Monday 21 July 2008","format":false,"excerpt":"Last year, Scotty McLeod set up the Windows Server User Group UK with the intention of creating a lively discussion area (backed up with regular meetings) for UK-based IT Professionals who are interested in the development of the Windows Server platform. Unfortunately, Scotty was involved in a serious accident at\u2026","rel":"","context":"In \"Microsoft Windows Server 2008\"","block_context":{"text":"Microsoft Windows Server 2008","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-server-2008"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6434","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6434"}],"version-history":[{"count":1,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6434\/revisions"}],"predecessor-version":[{"id":6435,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6434\/revisions\/6435"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6434"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6434"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6434"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}