{"id":6168,"date":"2016-07-26T12:41:14","date_gmt":"2016-07-26T17:41:14","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=6168"},"modified":"2016-07-26T12:41:14","modified_gmt":"2016-07-26T17:41:14","slug":"information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/","title":{"rendered":"Information Security Training: A Quick Guide to CHMOD Settings in UNIX Systems"},"content":{"rendered":"<p>CHMOD settings are something that you will learn about in <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\/\">information security classes<\/a>, and while they can be very complex, we\u2019re only going to cover a few simple aspects of them. The first thing that we would like to point out, is that Windows has an equivalent of the CHMOD setting, even if you don\u2019t realize it. There are three important basics which include: \u201cRead, Write, and Execute\u201d. These are literally the only permissions that matter in most files, and if you are looking for them in Windows, they are typically sitting in the \u2018properties\u2019 menu on all of your files.<\/p>\n<p>The only difference is that in Windows they are set through check boxes rather than a command line. In recent days, the introduction of WordPress has made it more important for CHMOD settings to become available and accessible to the average user and it is often set in the backend rather than on a terminal, but today we are going to talk about the command line settings.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter\" title=\"information security classes\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\" alt=\"information security classes\" width=\"1580\" height=\"450\" \/><\/p>\n<h2>The UNIX Command Line<\/h2>\n<p>If you happen to be using a standard UNIX GUI interface like Gnome, the terminal you use will most likely be \u2018Bash\u2019, but many servers do not use the GUI interface. For example if you are remoting into a shell using SSH you will only see the bash terminal which requires you to have a very good memory. That being said, let\u2019s take a quick look at the most common permissions:<\/p>\n<p>7- Read, Write, Execute (RWX)<\/p>\n<p>6- Read, Write (RW-)<\/p>\n<p>5- Read, Execute (R-X)<\/p>\n<p>4- Read Only (R&#8211;)<\/p>\n<p>3- Write, Execute (-WX)<\/p>\n<p>2- Write Only (-W-)<\/p>\n<p>1- Execute Only (&#8211;X)<\/p>\n<p>UNIX systems have the option for multiple accounts, and just as in Windows, these permissions can change the user\u2019s level of access to that system. The only difference between UNIX and Windows is the customizable nature provided by the command line interface. In <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/the-growing-need-for-computer-information-security-technology-training\/\">information technology security careers<\/a>, having access to this type of information and knowledge is going to be absolutely vital, even if you don\u2019t know it yet. In addition to learning how it works, however, you\u2019re going to need to know how to avoid making certain mistakes.<\/p>\n<h2>Permission Mistakes<\/h2>\n<p><img decoding=\"async\" class=\"alignright\" title=\"information technology security careers\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/04\/campus-1.jpg\" alt=\"information technology security careers\" width=\"558\" height=\"194\" \/>Okay, so here\u2019s why it is important to make sure you keep a backup of your existing system. It is entirely possible to set the wrong permissions \u00a0and lock yourself out of the UNIX system. This is not always possible in Windows, but UNIX systems assume that the user knows precisely what they are doing and provides them with complete ROOT access to the file system.<\/p>\n<p>This is both a gift and a curse. The gift is the level of customization that you will be able to take advantage of. The curse, on the other hand, is the realization that you\u2019re playing with fire. Let\u2019s face it, if you\u2019re working in a corporate environment the last thing you ever want to do is explain to your department or management team that you have to reformat and reinstall the entire server simply because you made a numerical mistake. Trust us, it doesn\u2019t go over very well, and that is precisely why you are going to need good information security classes.<\/p>\n<h2>The UNIX Difference<\/h2>\n<p>While there are many people out there who still prefer Windows, they often do not realize that UNIX is far older and far more stable. Like we said before, the major benefit lies in the ability to customize the system to any specification that you wish. Over the years, the UNIX system has evolved into many different forms, from MINIX, to the <a href=\"https:\/\/en.wikipedia.org\/wiki\/Linux_kernel\" target=\"_blank\" rel=\"noopener\">Linux Kernel<\/a> that was created by Linus Torvald many years ago.<\/p>\n<p>Today there are a plethora of commercialized versions of Linux on the market, including Redhat which started out as a free version, eventually evolving into the enterprise edition that we see today. As you can see, plenty of things have changed over the years, but permissions still remain entirely relevant. If you\u2019re going to work in the IT field, then this is something that you are absolutely, positively going to need to know. Don\u2019t worry; we have you covered, and we offer plenty of financial aid!<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:\u00a0<\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CHMOD settings are something that you will learn about in information security classes, and while they can be very complex, [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,105,94,106,107,96,97,98,99,100],"class_list":["post-6168","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-security-classes","tag-information-security-degree","tag-information-security-training","tag-information-systems-security-school","tag-information-technology-credits","tag-information-technology-homeland-security","tag-information-technology-security-careers","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>CHMOD Settings in UNIX Systems | ITI Technical College<\/title>\n<meta name=\"description\" content=\"CHMOD stands for Change Mode. It is used to change the file permissions of a file or directory on a Unix-like operating system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"CHMOD Settings in UNIX Systems | ITI Technical College\" \/>\n<meta property=\"og:description\" content=\"CHMOD stands for Change Mode. It is used to change the file permissions of a file or directory on a Unix-like operating system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-26T17:41:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Information Security Training: A Quick Guide to CHMOD Settings in UNIX Systems\",\"datePublished\":\"2016-07-26T17:41:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/\"},\"wordCount\":749,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information security classes\",\"information security degree\",\"information security training\",\"information systems security school\",\"information technology credits\",\"information technology homeland security\",\"information technology security careers\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/\",\"name\":\"CHMOD Settings in UNIX Systems | ITI Technical College\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg\",\"datePublished\":\"2016-07-26T17:41:14+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"CHMOD stands for Change Mode. It is used to change the file permissions of a file or directory on a Unix-like operating system.\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security Training: A Quick Guide to CHMOD Settings in UNIX Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"CHMOD Settings in UNIX Systems | ITI Technical College","description":"CHMOD stands for Change Mode. It is used to change the file permissions of a file or directory on a Unix-like operating system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/","og_locale":"en_US","og_type":"article","og_title":"CHMOD Settings in UNIX Systems | ITI Technical College","og_description":"CHMOD stands for Change Mode. It is used to change the file permissions of a file or directory on a Unix-like operating system.","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/","og_site_name":"ITI College","article_published_time":"2016-07-26T17:41:14+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Information Security Training: A Quick Guide to CHMOD Settings in UNIX Systems","datePublished":"2016-07-26T17:41:14+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/"},"wordCount":749,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information security classes","information security degree","information security training","information systems security school","information technology credits","information technology homeland security","information technology security careers","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/","name":"CHMOD Settings in UNIX Systems | ITI Technical College","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2017\/01\/biz-admin-large-1.jpg","datePublished":"2016-07-26T17:41:14+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"CHMOD stands for Change Mode. It is used to change the file permissions of a file or directory on a Unix-like operating system.","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/information-security-training-a-quick-guide-to-chmod-settings-in-unix-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Information Security Training: A Quick Guide to CHMOD Settings in UNIX Systems"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/6168","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=6168"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/6168\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=6168"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=6168"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=6168"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}