{"id":6642,"date":"2016-11-04T12:00:05","date_gmt":"2016-11-04T12:00:05","guid":{"rendered":"http:\/\/www.markwilson.co.uk\/blog\/?p=6642"},"modified":"2016-11-03T23:44:49","modified_gmt":"2016-11-03T23:44:49","slug":"short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm","title":{"rendered":"Short takes: a password generator; cybercrime 101 and an HTML table generator"},"content":{"rendered":"<p>Some more browser tabs turned into mini-snippets of blog post&#8230;<\/p>\n<h3>Password generator and cybercrime advice<\/h3>\n<p>The Random number service <a href=\"https:\/\/www.random.org\/passwords\/\">(random.org) has a useful password generator<\/a> (though I tend to let <a href=\"https:\/\/lastpass.com\/\">LastPass <\/a>generate mine, this is useful when creating passwords in customer implementations).<\/p>\n<p>And, whilst on the subject of security &#8211; <a href=\"http:\/\/enterprise.blob.core.windows.net\/events\/Cybercrime_Microsoft_whitepaper_0527_vFinal.pdf\">Microsoft Researcher Shawn Loveland has written a useful introduction to understanding cybercrime<\/a>.<\/p>\n<h3>HTML\u00a0table generator<\/h3>\n<p>I know that HTML tables fell out of fashion when we started to use CSS but they do still have a place &#8211; for displaying tabular data on a web page &#8211; just not for controlling page layouts!<\/p>\n<p>I needed to create a table for a blog post recently and I found this <a href=\"http:\/\/www.tablesgenerator.com\/html_tables\">HTML Table Generator<\/a> that did a fair chunk of the legwork for me&#8230;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Some more browser tabs turned into mini-snippets of blog post&#8230; Password generator and cybercrime advice The Random number service (random.org) has a useful password generator (though I tend to let LastPass generate mine, this is useful when creating passwords in customer implementations). And, whilst on the subject of security &#8211; Microsoft Researcher Shawn Loveland has &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Short takes: a password generator; cybercrime 101 and an HTML table generator<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[218],"tags":[631,43,29],"class_list":["post-6642","post","type-post","status-publish","format-standard","hentry","category-technology","tag-cybercrime","tag-security","tag-website-development"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Short takes: a password generator; cybercrime 101 and an HTML table generator - markwilson.it<\/title>\n<meta name=\"description\" content=\"Short snippets of information, including a useful password generator, an intro to cybercrime and an HTML table generator\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Short takes: a password generator; cybercrime 101 and an HTML table generator - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"Short snippets of information, including a useful password generator, an intro to cybercrime and an HTML table generator\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2016-11-04T12:00:05+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/11\\\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/11\\\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Short takes: a password generator; cybercrime 101 and an HTML table generator\",\"datePublished\":\"2016-11-04T12:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/11\\\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm\"},\"wordCount\":143,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Cybercrime\",\"Security\",\"Website Development\"],\"articleSection\":[\"Technology\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/11\\\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/11\\\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/11\\\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm\",\"name\":\"Short takes: a password generator; cybercrime 101 and an HTML table generator - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2016-11-04T12:00:05+00:00\",\"description\":\"Short snippets of information, including a useful password generator, an intro to cybercrime and an HTML table generator\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/11\\\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/11\\\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2016\\\/11\\\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Short takes: a password generator; cybercrime 101 and an HTML table generator\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Short takes: a password generator; cybercrime 101 and an HTML table generator - markwilson.it","description":"Short snippets of information, including a useful password generator, an intro to cybercrime and an HTML table generator","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm","og_locale":"en_GB","og_type":"article","og_title":"Short takes: a password generator; cybercrime 101 and an HTML table generator - markwilson.it","og_description":"Short snippets of information, including a useful password generator, an intro to cybercrime and an HTML table generator","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm","og_site_name":"markwilson.it","article_published_time":"2016-11-04T12:00:05+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Short takes: a password generator; cybercrime 101 and an HTML table generator","datePublished":"2016-11-04T12:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm"},"wordCount":143,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Cybercrime","Security","Website Development"],"articleSection":["Technology"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm","name":"Short takes: a password generator; cybercrime 101 and an HTML table generator - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2016-11-04T12:00:05+00:00","description":"Short snippets of information, including a useful password generator, an intro to cybercrime and an HTML table generator","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2016\/11\/short-takes-a-password-generator-cybercrime-101-and-an-html-table-generator.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Short takes: a password generator; cybercrime 101 and an HTML table generator"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":7042,"url":"https:\/\/www.markwilson.co.uk\/blog\/2017\/04\/securing-modern-productive-enterprise-microsoft-technology.htm","url_meta":{"origin":6642,"position":0},"title":"Securing the modern productive enterprise with Microsoft technology","author":"Mark Wilson","date":"Wednesday 19 April 2017","format":false,"excerpt":"\u201cCybercrime costs projected to reach $2 trillion by 2019\u201d [Forbes, 2016] 99: The median number of days that attackers reside within a victim\u2019s network before detection [Mandiant\/FireEye M-Trends Report, 2017] \u201cMore than 63% of all network intrusions are due to compromised user credentials\u201d [Microsoft] The effects of cybercrime are tremendous,\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"Securing the modern productive enterprise with Microsoft technology","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/images\/security-whitepaper.png?resize=350%2C200&ssl=1","width":350,"height":200},"classes":[]},{"id":1116,"url":"https:\/\/www.markwilson.co.uk\/blog\/2008\/07\/generating-secure-passwords.htm","url_meta":{"origin":6642,"position":1},"title":"Generating secure passwords","author":"Mark Wilson","date":"Monday 14 July 2008","format":false,"excerpt":"One corporate blogger at Symantec recently wrote about the useless passwords that people use (with various lists placing \"password\") at or close to the top of the list. His source contained some dubious claims (e.g. it claimed that one of the top passwords across Europe is \"monkey\"... maybe that is\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":832,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/07\/quick-tip-for-mac-users-to-recover-a-forgotten-password.htm","url_meta":{"origin":6642,"position":2},"title":"Quick tip for Mac users to recover a forgotten password","author":"Mark Wilson","date":"Saturday 7 July 2007","format":false,"excerpt":"If you're anything like me, then you have hundreds of security credentials to use at many websites. Best practice dictates that you should use a different password at each one but sometimes that's just not practical - and, unless you write it down, sometimes you just forget what the password\u2026","rel":"","context":"In \"Apple Mac OS X\"","block_context":{"text":"Apple Mac OS X","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/mac-os-x"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":540,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/11\/introduction-to-password-cracking.htm","url_meta":{"origin":6642,"position":3},"title":"Introduction to password cracking","author":"Mark Wilson","date":"Tuesday 29 November 2005","format":false,"excerpt":"I just read a very interesting article on password cracking techniques on the IBM website. It doesn't contain any information that isn't already well known, but it's still a useful summary of some of the issues which an administrator should be prepared for and how to prevent them.","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":766,"url":"https:\/\/www.markwilson.co.uk\/blog\/2007\/04\/what-was-that-password-again.htm","url_meta":{"origin":6642,"position":4},"title":"What was that password again?","author":"Mark Wilson","date":"Tuesday 10 April 2007","format":false,"excerpt":"In the course of my daily computing activities I have to remember hundreds of username and password combinations. Literally. Just at work there are two (yes two!) timesheet applications, then there's my corporate domain credentials, remote access, mobile phone billing portal, etc., each with their own username and password complexity\/expiry\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":8658,"url":"https:\/\/www.markwilson.co.uk\/blog\/2024\/01\/removing-password-protection-from-pdf-files.htm","url_meta":{"origin":6642,"position":5},"title":"Removing password protection from PDF files","author":"Mark Wilson","date":"Monday 29 January 2024","format":false,"excerpt":"Important note: this post wont help you if you have a PDF file and don't know the password. This is for removing passwords on PDFs that you have legal access to, but don't want to be password-protected any more. A while ago, one of my employers started emailing payslips in\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/password-protected-pdf.png?fit=649%2C414&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/password-protected-pdf.png?fit=649%2C414&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/password-protected-pdf.png?fit=649%2C414&ssl=1&resize=525%2C300 1.5x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6642","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=6642"}],"version-history":[{"count":1,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6642\/revisions"}],"predecessor-version":[{"id":6643,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/6642\/revisions\/6643"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=6642"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=6642"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=6642"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}