{"id":123,"date":"2007-12-07T10:46:00","date_gmt":"2007-12-07T14:46:00","guid":{"rendered":"http:\/\/jdhitsolutions.com\/blog\/2007\/12\/07\/safe-at-any-price\/"},"modified":"2013-07-02T08:13:12","modified_gmt":"2013-07-02T12:13:12","slug":"safe-at-any-price","status":"publish","type":"post","link":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/","title":{"rendered":"Safe at any Price?"},"content":{"rendered":"<p>In my current Windows Tip Sheet column on the popular freeware program nLite, reader Tim from Michigan makes an excellent observation:<\/p>\n<p><font color=\"#0000ff\"><em>Have used both nLite and vLite and agree both are excellent tools and have real value. My concern however is what else is the program doing? The program is free and having built multiple iso files with custom configurations it appears to do exactly what it says it's doing. But what's it doing behind the scenes that I don't see? Is it installing rootkits, backdoors or other exploits that will make my production network vulnerable for future attacks? I haven't found any issues, but how can I be sure? If I can't be sure how can I justify using it in a production environment? Don't get me wrong, I still use the program, I just use the iso files in my test environment and on virtual machines that won't go into the production environment. I'd love to have the question addressed and some assurance that nothing else is being done.<\/em><\/font><\/p>\n<p>I whole-heartedly agree. Tim is practicing exactly what I would initially recommend which is to test anything and everything in a non-production environment. This should apply not only to freeware products like nLite but Microsoft products as well.&nbsp; Malware aside how do you know the latest gee-whiz reputable vendor solution won't break something?&nbsp; But that goes beyond Tim's point.<\/p>\n<p>Let's talk about nLite. How can we be sure it really isn't doing anything under the hood? Well first, I think this particular product has an established track record with a large install base.&nbsp; You would think that any problems would have surfaced by now. I'm not aware of any with nLite. By the way, let me be clear that I'm only using nLite as an example for the sake of discussion. As far as I can tell it is an excellent piece of software.<\/p>\n<p>But let's assume there might be more to the story. In that case I might look to tools like FileMon and RegMon from <a href=\"http:\/\/www.microsoft.com\/technet\/sysinternals\/default.mspx\" target=\"_blank\">Sysinternals<\/a> to monitor the install process. I'd certainly make sure I have up to date antivirus and antispyware products installed from reputable vendors. I might run the free rootkit detector, also from Sysinternals. There are others as well.<\/p>\n<p>I might also consider using an application packager, like Wininstall LE because it's free, and see what changes the app makes to my system.<\/p>\n<p>What steps do you take to ensure something you are installing is safe?<\/p>\n<div class=\"wlWriterSmartContent\" id=\"scid:0767317B-992E-4b12-91E0-4F059A8CECA8:09bc1db5-54ff-4fa9-8a4c-17799ed1f345\" style=\"padding-right: 0px; display: inline; padding-left: 0px; padding-bottom: 0px; margin: 0px; padding-top: 0px\">Technorati Tags: <a href=\"http:\/\/technorati.com\/tags\/TipSheet\" rel=\"tag\">TipSheet<\/a>, nLite, <a href=\"http:\/\/technorati.com\/tags\/SysInternals\" rel=\"tag\">SysInternals<\/a>, <a href=\"http:\/\/technorati.com\/tags\/malware\" rel=\"tag\">malware<\/a>, <a href=\"http:\/\/technorati.com\/tags\/msi\" rel=\"tag\">msi<\/a><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In my current Windows Tip Sheet column on the popular freeware program nLite, reader Tim from Michigan makes an excellent observation: Have used both nLite and vLite and agree both are excellent tools and have real value. My concern however is what else is the program doing? The program is free and having built multiple&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[4],"tags":[47,25],"class_list":["post-123","post","type-post","status-publish","format-standard","hentry","category-powershell","tag-sysinternals","tag-tipsheet"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Safe at any Price? &#8226; The Lonely Administrator<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safe at any Price? &#8226; The Lonely Administrator\" \/>\n<meta property=\"og:description\" content=\"In my current Windows Tip Sheet column on the popular freeware program nLite, reader Tim from Michigan makes an excellent observation: Have used both nLite and vLite and agree both are excellent tools and have real value. My concern however is what else is the program doing? The program is free and having built multiple...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/\" \/>\n<meta property=\"og:site_name\" content=\"The Lonely Administrator\" \/>\n<meta property=\"article:published_time\" content=\"2007-12-07T14:46:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-07-02T12:13:12+00:00\" \/>\n<meta name=\"author\" content=\"Jeffery Hicks\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@JeffHicks\" \/>\n<meta name=\"twitter:site\" content=\"@JeffHicks\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeffery Hicks\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/powershell\\\/123\\\/safe-at-any-price\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/powershell\\\/123\\\/safe-at-any-price\\\/\"},\"author\":{\"name\":\"Jeffery Hicks\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d0258030b41f07fd745f4078bdf5b6c9\"},\"headline\":\"Safe at any Price?\",\"datePublished\":\"2007-12-07T14:46:00+00:00\",\"dateModified\":\"2013-07-02T12:13:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/powershell\\\/123\\\/safe-at-any-price\\\/\"},\"wordCount\":444,\"publisher\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d0258030b41f07fd745f4078bdf5b6c9\"},\"keywords\":[\"Sysinternals\",\"TipSheet\"],\"articleSection\":[\"PowerShell\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/powershell\\\/123\\\/safe-at-any-price\\\/\",\"url\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/powershell\\\/123\\\/safe-at-any-price\\\/\",\"name\":\"Safe at any Price? &#8226; The Lonely Administrator\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#website\"},\"datePublished\":\"2007-12-07T14:46:00+00:00\",\"dateModified\":\"2013-07-02T12:13:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/powershell\\\/123\\\/safe-at-any-price\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/powershell\\\/123\\\/safe-at-any-price\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/powershell\\\/123\\\/safe-at-any-price\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"PowerShell\",\"item\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/category\\\/powershell\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Safe at any Price?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/\",\"name\":\"The Lonely Administrator\",\"description\":\"Practical Advice for the Automating IT Pro\",\"publisher\":{\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d0258030b41f07fd745f4078bdf5b6c9\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/jdhitsolutions.com\\\/blog\\\/#\\\/schema\\\/person\\\/d0258030b41f07fd745f4078bdf5b6c9\",\"name\":\"Jeffery Hicks\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg\",\"caption\":\"Jeffery Hicks\"},\"logo\":{\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Safe at any Price? &#8226; The Lonely Administrator","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/","og_locale":"en_US","og_type":"article","og_title":"Safe at any Price? &#8226; The Lonely Administrator","og_description":"In my current Windows Tip Sheet column on the popular freeware program nLite, reader Tim from Michigan makes an excellent observation: Have used both nLite and vLite and agree both are excellent tools and have real value. My concern however is what else is the program doing? The program is free and having built multiple...","og_url":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/","og_site_name":"The Lonely Administrator","article_published_time":"2007-12-07T14:46:00+00:00","article_modified_time":"2013-07-02T12:13:12+00:00","author":"Jeffery Hicks","twitter_card":"summary_large_image","twitter_creator":"@JeffHicks","twitter_site":"@JeffHicks","twitter_misc":{"Written by":"Jeffery Hicks","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/#article","isPartOf":{"@id":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/"},"author":{"name":"Jeffery Hicks","@id":"https:\/\/jdhitsolutions.com\/blog\/#\/schema\/person\/d0258030b41f07fd745f4078bdf5b6c9"},"headline":"Safe at any Price?","datePublished":"2007-12-07T14:46:00+00:00","dateModified":"2013-07-02T12:13:12+00:00","mainEntityOfPage":{"@id":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/"},"wordCount":444,"publisher":{"@id":"https:\/\/jdhitsolutions.com\/blog\/#\/schema\/person\/d0258030b41f07fd745f4078bdf5b6c9"},"keywords":["Sysinternals","TipSheet"],"articleSection":["PowerShell"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/","url":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/","name":"Safe at any Price? &#8226; The Lonely Administrator","isPartOf":{"@id":"https:\/\/jdhitsolutions.com\/blog\/#website"},"datePublished":"2007-12-07T14:46:00+00:00","dateModified":"2013-07-02T12:13:12+00:00","breadcrumb":{"@id":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/jdhitsolutions.com\/blog\/powershell\/123\/safe-at-any-price\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"PowerShell","item":"https:\/\/jdhitsolutions.com\/blog\/category\/powershell\/"},{"@type":"ListItem","position":2,"name":"Safe at any Price?"}]},{"@type":"WebSite","@id":"https:\/\/jdhitsolutions.com\/blog\/#website","url":"https:\/\/jdhitsolutions.com\/blog\/","name":"The Lonely Administrator","description":"Practical Advice for the Automating IT Pro","publisher":{"@id":"https:\/\/jdhitsolutions.com\/blog\/#\/schema\/person\/d0258030b41f07fd745f4078bdf5b6c9"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jdhitsolutions.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/jdhitsolutions.com\/blog\/#\/schema\/person\/d0258030b41f07fd745f4078bdf5b6c9","name":"Jeffery Hicks","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg","caption":"Jeffery Hicks"},"logo":{"@id":"https:\/\/secure.gravatar.com\/avatar\/832ae5d438fdcfc1420d720cd1991307927de8a0b12f2342e81c30f773e21098?s=96&d=wavatar&r=pg"}}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_likes_enabled":true,"jetpack-related-posts":[{"id":3401,"url":"https:\/\/jdhitsolutions.com\/blog\/hardware\/3401\/mini-hyper-v-setup\/","url_meta":{"origin":123,"position":0},"title":"Mini Hyper-V: Setup","author":"Jeffery Hicks","date":"September 6, 2013","format":false,"excerpt":"Now that hardware has been installed on my mini Hyper-V project, next up is to setup the unit and get software installed. The Brix fires up very quickly and of course since nothing is installed I initially see the no operating system found message. Rebooting, pressing F2 gets me into\u2026","rel":"","context":"In &quot;Hardware&quot;","block_context":{"text":"Hardware","link":"https:\/\/jdhitsolutions.com\/blog\/category\/hardware\/"},"img":{"alt_text":"IMG_6536","src":"https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2013\/09\/IMG_6536-300x225.jpg?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":3551,"url":"https:\/\/jdhitsolutions.com\/blog\/powershell-3-0\/3551\/powershell-clean-up-tools\/","url_meta":{"origin":123,"position":1},"title":"PowerShell Clean Up Tools","author":"Jeffery Hicks","date":"November 11, 2013","format":false,"excerpt":"A few years ago I think I posted some PowerShell clean up tools. These were functions designed to help clear out old files, especially for folders like TEMP. Recently I decided to upgrade them to at least PowerShell 3.0 to take advantage of v3 cmdlets and features. I use these\u2026","rel":"","context":"In &quot;Powershell 3.0&quot;","block_context":{"text":"Powershell 3.0","link":"https:\/\/jdhitsolutions.com\/blog\/category\/powershell-3-0\/"},"img":{"alt_text":"021913_2047_WordTest1.png","src":"https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2013\/02\/021913_2047_WordTest1.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":2605,"url":"https:\/\/jdhitsolutions.com\/blog\/powershell\/2605\/copy-and-mount-a-cd-with-powercli\/","url_meta":{"origin":123,"position":2},"title":"Copy and Mount a CD with PowerCLI","author":"Jeffery Hicks","date":"November 30, 2012","format":false,"excerpt":"The other day I realized I needed to rebuild my SQL Server 2012 installation which I'm running on a virtual machine running on an ESX box. Given that I have PowerCLI and I like to do things from the command prompt when I can, I decided to mount the SQL\u2026","rel":"","context":"In &quot;PowerCLI&quot;","block_context":{"text":"PowerCLI","link":"https:\/\/jdhitsolutions.com\/blog\/category\/powercli\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2012\/11\/PowerCLI-150x150.png?resize=350%2C200","width":350,"height":200},"classes":[]},{"id":58,"url":"https:\/\/jdhitsolutions.com\/blog\/scripting\/58\/techmentor-las-vegas-2006-demo-cd\/","url_meta":{"origin":123,"position":3},"title":"Techmentor Las Vegas 2006 Demo CD","author":"Jeffery Hicks","date":"October 17, 2006","format":false,"excerpt":"I've posted the ISO for my demo CD from Techmentor Las Vegas 2006. This 160MB CD has all of my demos (including video demos), updated slides, web links. Be sure to install the VMWare Video codec (included) before you try to view any of the AVI files. For right now,\u2026","rel":"","context":"In &quot;Scripting&quot;","block_context":{"text":"Scripting","link":"https:\/\/jdhitsolutions.com\/blog\/category\/scripting\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":120,"url":"https:\/\/jdhitsolutions.com\/blog\/powershell\/120\/powershell-v2-0-ctp-e-book-offer\/","url_meta":{"origin":123,"position":4},"title":"PowerShell v2.0 CTP e-book Offer","author":"Jeffery Hicks","date":"November 9, 2007","format":false,"excerpt":"As you may well be aware of by now, Microsoft has released a Community Technology Preview (CTP) of PowerShell v2.0.\u00a0 This is pre-release software, not even a beta. It is not approved or even remotely recommended for production use. Because it is a CTP, documentation (other than the help files)\u2026","rel":"","context":"In &quot;PowerShell&quot;","block_context":{"text":"PowerShell","link":"https:\/\/jdhitsolutions.com\/blog\/category\/powershell\/"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":7288,"url":"https:\/\/jdhitsolutions.com\/blog\/powershell\/7288\/living-the-linux-life\/","url_meta":{"origin":123,"position":5},"title":"Living the Linux Life","author":"Jeffery Hicks","date":"February 18, 2020","format":false,"excerpt":"I have been an IT Pro for almost 30 years. For the most part that has meant working in a Microsoft Windows environment. I remember dabbling with Linux when it first hit the scene. I found it intriguing but never had a need to really learn and use it. Over\u2026","rel":"","context":"In &quot;Lenovo&quot;","block_context":{"text":"Lenovo","link":"https:\/\/jdhitsolutions.com\/blog\/category\/lenovo\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2020\/02\/neofetch.png?resize=350%2C200&ssl=1","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2020\/02\/neofetch.png?resize=350%2C200&ssl=1 1x, https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2020\/02\/neofetch.png?resize=525%2C300&ssl=1 1.5x, https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2020\/02\/neofetch.png?resize=700%2C400&ssl=1 2x, https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2020\/02\/neofetch.png?resize=1050%2C600&ssl=1 3x, https:\/\/i0.wp.com\/jdhitsolutions.com\/blog\/wp-content\/uploads\/2020\/02\/neofetch.png?resize=1400%2C800&ssl=1 4x"},"classes":[]}],"_links":{"self":[{"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/123","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/comments?post=123"}],"version-history":[{"count":0,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/posts\/123\/revisions"}],"wp:attachment":[{"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/media?parent=123"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/categories?post=123"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jdhitsolutions.com\/blog\/wp-json\/wp\/v2\/tags?post=123"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}