{"id":2033,"date":"2011-05-13T05:02:30","date_gmt":"2011-05-13T09:02:30","guid":{"rendered":"http:\/\/www.mccordweb.com\/weblogs\/?p=2033"},"modified":"2011-05-12T15:17:30","modified_gmt":"2011-05-12T19:17:30","slug":"solving-a-blog-hack-problem","status":"publish","type":"post","link":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/","title":{"rendered":"Solving a Blog Hack Problem"},"content":{"rendered":"<p>Even the very best website and most vigilant webmaster can have their blog hacked. It just happens. Typically the higher you are in the organic search results the more attempts will be made to hack your blog.<\/p>\n<p><strong>Why does someone want to hack your site?<\/strong><\/p>\n<p>It is typically for these reasons:<\/p>\n<ol>\n<li>Parlay on your high placement and traffic to bleed off your search engine capital to a black hat optimizers list of sites that need &#8220;SEO Juice&#8221;.<\/li>\n<li>Parlay on your website placement and traffic to spew malware to your site visitors to turn visitors&#8217; computers into spam bots.<\/li>\n<li>Use your unprotected site as a launch pad for black hat optimization doorway pages.<\/li>\n<\/ol>\n<p>There is simply nothing personal about the situation, it is simply a crime of convenience. If you are not secure, you are a target. In some cases the security problem may be on your web host&#8217;s side, but in other cases the issue is on your website&#8217;s side.<\/p>\n<p>I have successfully used several WordPress plug-ins on a number of client sites to lock out the bad guys, even ones who some how seem to keep getting in. Here are\u00a0three of the plug-ins that I really like to use that help to beef up your security after you have thoroughly cleaned your blog and website from a hack attack.<\/p>\n<p><a href=\"http:\/\/wordpress.org\/extend\/plugins\/wordpress-file-monitor-plus\/\" target=\"_blank\"><strong>WP File Monitor Plus<\/strong><br \/>\n<\/a>If you are repeatedly being hacked with this plug-in, you will instantly know which core files need to be replaced. The application can email or send you a text message.<\/p>\n<p><a href=\"http:\/\/wordpress.org\/extend\/plugins\/login-lockdown\/\" target=\"_blank\"><strong>Login Lockdown<\/strong><br \/>\n<\/a>Limit attempted intrusions by locking out bots and spiders who are testing your admin and trying to crack your password. You choose what settings to lock them out with. Your MySQL database will keep a list of attempts and lockouts so you can see the date of intrusion attempts.<\/p>\n<p><a href=\"http:\/\/wordpress.org\/extend\/plugins\/admin-renamer-extended\/\" target=\"_blank\"><strong>WP Admin Renamer Extended<\/strong><br \/>\n<\/a>I love this one. First create a new admin file with a super secure name and password. Then rename your existing admin using this plug-in. But don&#8217;t stop there. Go back in and set your old admin user as a subscriber only; effectively locking out the bad guys that even if they can get back in they can&#8217;t make any changes.<\/p>\n<p>These are great starts, but be aware that if a hacker really, really wants to get in they can be extremely difficult to keep out. My motto is make it very hard for them to get in and time consuming that they simply want to move elsewhere to do their dirty work.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Even the very best website and most vigilant webmaster can have their blog hacked. It just happens. Typically the higher you are in the organic search results the more attempts will be made to hack your blog. Why does someone want to hack your site? It is typically for these reasons: Parlay on your high placement and traffic to bleed off your search engine capital to a black hat optimizers list of sites that need &#8220;SEO Juice&#8221;. Parlay on your website placement and traffic to spew malware to your site visitors to turn visitors&#8217; computers into spam bots. Use your unprotected site as a launch pad for black hat optimization doorway pages. There is simply nothing personal about the situation, it is simply a crime of convenience. If you are not secure, you are a target. In some cases the security problem may be on your web host&#8217;s side, but in other cases the issue is on your website&#8217;s side. I have successfully used several WordPress plug-ins on a number of client sites to lock out the bad guys, even ones who some how seem to keep getting in. Here are\u00a0three of the plug-ins that I really like to use that help to beef up your security after you have thoroughly cleaned your blog and website from a hack attack. WP File Monitor Plus If you are repeatedly being hacked with this plug-in, you will instantly know which core files need to be replaced. The application can email or send you a text message. Login Lockdown Limit attempted intrusions by locking out bots and spiders who are testing your admin and trying to crack your password. You choose what settings to lock them out with. Your MySQL database will keep a list of attempts and lockouts so you can see the date of intrusion attempts. WP Admin Renamer Extended I love this one. First create a new admin file with a super secure name and password. Then rename your existing admin using this plug-in. But don&#8217;t stop there. Go back in and set your old admin user as a subscriber only; effectively locking out the bad guys that even if they can get back in they can&#8217;t make any changes. These are great starts, but be aware that if a hacker really, really wants to get in they can be extremely difficult to keep out. My motto is make it very hard for them to get in and time consuming that they simply want to move elsewhere to do their dirty work.<\/p>\n","protected":false},"author":5,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[172,29],"tags":[314,177],"class_list":["post-2033","post","type-post","status-publish","format-standard","hentry","category-blogging","category-bright-idea-tips","tag-blog-hackers","tag-blogs"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Solving a Blog Hack Problem | The Web Authority<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Solving a Blog Hack Problem | The Web Authority\" \/>\n<meta property=\"og:description\" content=\"Even the very best website and most vigilant webmaster can have their blog hacked. It just happens. Typically the higher you are in the organic search results the more attempts will be made to hack your blog. Why does someone want to hack your site? It is typically for these reasons: Parlay on your high placement and traffic to bleed off your search engine capital to a black hat optimizers list of sites that need &#8220;SEO Juice&#8221;. Parlay on your website placement and traffic to spew malware to your site visitors to turn visitors&#8217; computers into spam bots. Use your unprotected site as a launch pad for black hat optimization doorway pages. There is simply nothing personal about the situation, it is simply a crime of convenience. If you are not secure, you are a target. In some cases the security problem may be on your web host&#8217;s side, but in other cases the issue is on your website&#8217;s side. I have successfully used several WordPress plug-ins on a number of client sites to lock out the bad guys, even ones who some how seem to keep getting in. Here are\u00a0three of the plug-ins that I really like to use that help to beef up your security after you have thoroughly cleaned your blog and website from a hack attack. WP File Monitor Plus If you are repeatedly being hacked with this plug-in, you will instantly know which core files need to be replaced. The application can email or send you a text message. Login Lockdown Limit attempted intrusions by locking out bots and spiders who are testing your admin and trying to crack your password. You choose what settings to lock them out with. Your MySQL database will keep a list of attempts and lockouts so you can see the date of intrusion attempts. WP Admin Renamer Extended I love this one. First create a new admin file with a super secure name and password. Then rename your existing admin using this plug-in. But don&#8217;t stop there. Go back in and set your old admin user as a subscriber only; effectively locking out the bad guys that even if they can get back in they can&#8217;t make any changes. These are great starts, but be aware that if a hacker really, really wants to get in they can be extremely difficult to keep out. My motto is make it very hard for them to get in and time consuming that they simply want to move elsewhere to do their dirty work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/\" \/>\n<meta property=\"og:site_name\" content=\"The Web Authority\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mccordweb\" \/>\n<meta property=\"article:published_time\" content=\"2011-05-13T09:02:30+00:00\" \/>\n<meta name=\"author\" content=\"Nancy McCord\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:site\" content=\"@mccordweb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nancy McCord\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2011\\\/05\\\/13\\\/solving-a-blog-hack-problem\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2011\\\/05\\\/13\\\/solving-a-blog-hack-problem\\\/\"},\"author\":{\"name\":\"Nancy McCord\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\"},\"headline\":\"Solving a Blog Hack Problem\",\"datePublished\":\"2011-05-13T09:02:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2011\\\/05\\\/13\\\/solving-a-blog-hack-problem\\\/\"},\"wordCount\":428,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"keywords\":[\"Blog Hackers\",\"Blogs\"],\"articleSection\":[\"Blogs\",\"Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2011\\\/05\\\/13\\\/solving-a-blog-hack-problem\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2011\\\/05\\\/13\\\/solving-a-blog-hack-problem\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2011\\\/05\\\/13\\\/solving-a-blog-hack-problem\\\/\",\"name\":\"Solving a Blog Hack Problem | The Web Authority\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\"},\"datePublished\":\"2011-05-13T09:02:30+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2011\\\/05\\\/13\\\/solving-a-blog-hack-problem\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2011\\\/05\\\/13\\\/solving-a-blog-hack-problem\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/2011\\\/05\\\/13\\\/solving-a-blog-hack-problem\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Solving a Blog Hack Problem\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#website\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"name\":\"The Web Authority | McCord Web Services News\\\/Blog\",\"description\":\"Smart Digital Marketing, Real Business Results - McCord Web Services\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#organization\",\"name\":\"McCord Web Services LLC\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/McCord-Web-White-logo.png\",\"width\":450,\"height\":203,\"caption\":\"McCord Web Services LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mccordweb\",\"https:\\\/\\\/x.com\\\/mccordweb\",\"https:\\\/\\\/www.instagram.com\\\/nancy_mccord\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/nancymccord\",\"https:\\\/\\\/www.youtube.com\\\/user\\\/mccordweb\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mccordweb.com\\\/weblogs\\\/#\\\/schema\\\/person\\\/7499f3ac0b008bc0e5b7a138ac1dc0ba\",\"name\":\"Nancy McCord\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g\",\"caption\":\"Nancy McCord\"},\"sameAs\":[\"http:\\\/\\\/www.mccordweb.com\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Solving a Blog Hack Problem | The Web Authority","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/","og_locale":"en_US","og_type":"article","og_title":"Solving a Blog Hack Problem | The Web Authority","og_description":"Even the very best website and most vigilant webmaster can have their blog hacked. It just happens. Typically the higher you are in the organic search results the more attempts will be made to hack your blog. Why does someone want to hack your site? It is typically for these reasons: Parlay on your high placement and traffic to bleed off your search engine capital to a black hat optimizers list of sites that need &#8220;SEO Juice&#8221;. Parlay on your website placement and traffic to spew malware to your site visitors to turn visitors&#8217; computers into spam bots. Use your unprotected site as a launch pad for black hat optimization doorway pages. There is simply nothing personal about the situation, it is simply a crime of convenience. If you are not secure, you are a target. In some cases the security problem may be on your web host&#8217;s side, but in other cases the issue is on your website&#8217;s side. I have successfully used several WordPress plug-ins on a number of client sites to lock out the bad guys, even ones who some how seem to keep getting in. Here are\u00a0three of the plug-ins that I really like to use that help to beef up your security after you have thoroughly cleaned your blog and website from a hack attack. WP File Monitor Plus If you are repeatedly being hacked with this plug-in, you will instantly know which core files need to be replaced. The application can email or send you a text message. Login Lockdown Limit attempted intrusions by locking out bots and spiders who are testing your admin and trying to crack your password. You choose what settings to lock them out with. Your MySQL database will keep a list of attempts and lockouts so you can see the date of intrusion attempts. WP Admin Renamer Extended I love this one. First create a new admin file with a super secure name and password. Then rename your existing admin using this plug-in. But don&#8217;t stop there. Go back in and set your old admin user as a subscriber only; effectively locking out the bad guys that even if they can get back in they can&#8217;t make any changes. These are great starts, but be aware that if a hacker really, really wants to get in they can be extremely difficult to keep out. My motto is make it very hard for them to get in and time consuming that they simply want to move elsewhere to do their dirty work.","og_url":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/","og_site_name":"The Web Authority","article_publisher":"https:\/\/www.facebook.com\/mccordweb","article_published_time":"2011-05-13T09:02:30+00:00","author":"Nancy McCord","twitter_card":"summary_large_image","twitter_creator":"@mccordweb","twitter_site":"@mccordweb","twitter_misc":{"Written by":"Nancy McCord","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/#article","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/"},"author":{"name":"Nancy McCord","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba"},"headline":"Solving a Blog Hack Problem","datePublished":"2011-05-13T09:02:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/"},"wordCount":428,"commentCount":0,"publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"keywords":["Blog Hackers","Blogs"],"articleSection":["Blogs","Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/","url":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/","name":"Solving a Blog Hack Problem | The Web Authority","isPartOf":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#website"},"datePublished":"2011-05-13T09:02:30+00:00","breadcrumb":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mccordweb.com\/weblogs\/2011\/05\/13\/solving-a-blog-hack-problem\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mccordweb.com\/weblogs\/"},{"@type":"ListItem","position":2,"name":"Solving a Blog Hack Problem"}]},{"@type":"WebSite","@id":"https:\/\/www.mccordweb.com\/weblogs\/#website","url":"https:\/\/www.mccordweb.com\/weblogs\/","name":"The Web Authority | McCord Web Services News\/Blog","description":"Smart Digital Marketing, Real Business Results - McCord Web Services","publisher":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mccordweb.com\/weblogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mccordweb.com\/weblogs\/#organization","name":"McCord Web Services LLC","url":"https:\/\/www.mccordweb.com\/weblogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","contentUrl":"https:\/\/www.mccordweb.com\/weblogs\/wp-content\/uploads\/2025\/09\/McCord-Web-White-logo.png","width":450,"height":203,"caption":"McCord Web Services LLC"},"image":{"@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mccordweb","https:\/\/x.com\/mccordweb","https:\/\/www.instagram.com\/nancy_mccord\/","https:\/\/www.linkedin.com\/in\/nancymccord","https:\/\/www.youtube.com\/user\/mccordweb"]},{"@type":"Person","@id":"https:\/\/www.mccordweb.com\/weblogs\/#\/schema\/person\/7499f3ac0b008bc0e5b7a138ac1dc0ba","name":"Nancy McCord","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/84f303fb7bc8bf9e3aa944d8a2b0913642ca2c0cb4e244d9bbea83c59dac189e?s=96&d=blank&r=g","caption":"Nancy McCord"},"sameAs":["http:\/\/www.mccordweb.com"]}]}},"_links":{"self":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/2033","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/comments?post=2033"}],"version-history":[{"count":2,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/2033\/revisions"}],"predecessor-version":[{"id":2035,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/posts\/2033\/revisions\/2035"}],"wp:attachment":[{"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/media?parent=2033"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/categories?post=2033"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mccordweb.com\/weblogs\/wp-json\/wp\/v2\/tags?post=2033"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}