{"id":6277,"date":"2011-06-25T19:16:01","date_gmt":"2011-06-25T23:16:01","guid":{"rendered":"http:\/\/rbach.net\/blog\/index.php\/"},"modified":"2021-07-18T17:30:47","modified_gmt":"2021-07-18T21:30:47","slug":"malware-history-part-2","status":"publish","type":"post","link":"https:\/\/rbach.net\/index.php\/malware-history-part-2\/","title":{"rendered":"40 Years of Malware &#8211; Part 2"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignleft wp-image-6285\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"40 Years of Malware - Part 2\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/malware2-e1565402612127.jpg?resize=93%2C85&#038;ssl=1\" alt=\"40 Years of Malware - Part 2\" width=\"93\" height=\"85\" \/>2011 marks the 40th anniversary of the <a title=\"Computer virus\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Computer_virus\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">computer virus<\/a>. <a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Help Net Security<\/em><\/a> notes that over the last four decades, malware instances have grown from 1,300 in 1990, to 50,000 in 2000, to over 200 million in 2010. <a href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Fortinet<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-FTNT\/\" target=\"_blank\" rel=\"noopener noreferrer\">FTNT<\/a>) marks this dubious milestone with an article that counts down some of the malware evolution low-lights.<\/p>\n<p><a title=\"Fortinet\" href=\"https:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8176 size-full\" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"fortinet_logo\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/fortinet_logo-e1565402643488.jpg?resize=116%2C49&#038;ssl=1\" alt=\"\" width=\"116\" height=\"49\" \/><\/a>The <a title=\"Sunnyvale, California\" href=\"https:\/\/www.sunnyvale.ca.gov\/\" target=\"_blank\" rel=\"homepage noopener noreferrer\">Sunnyvale, CA<\/a> network security firm says that viruses evolved from academic proof of concepts to geek pranks which have evolved into cybercriminal tools. By 2005, monetization of the virus scene was underway and almost all viruses developed for the sole purpose of making money via more or less complex business models. According to <a href=\"https:\/\/www.fortiguard.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">FortiGuard Labs<\/a>, the most significant computer viruses over the last 40 years are:<\/p>\n<p>&#8211; <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-1VJ\" target=\"_blank\" rel=\"noopener noreferrer\">See Part 1 Here<\/a> &#8211; See Part 2 Here\u00a0 &#8211; <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-1Di\" target=\"_blank\" rel=\"noopener\">See Part 3 Here<\/a>\u00a0 &#8211; <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-2HC\" target=\"_blank\" rel=\"noopener\">See Part 4 Here<\/a><\/p>\n<p><strong>1945 &#8211; A Bug is Born<\/strong> &#8211;\u00a0 <a title=\"Grace Hopper\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Grace_Hopper\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Grace Murray Hopper<\/a>, a researcher at Harvard, notes a system failure and finds a moth trapped in relay panels.<\/p>\n<p><strong>1949 &#8211; <a title=\"www.infoniac.com\" href=\"https:\/\/web.archive.org\/web\/20230922003821\/http:\/\/www.infoniac.com\/hi-tech\/computer-viruses-and-worms-throughout-history.html\" target=\"_blank\" rel=\"noopener noreferrer\">Self-replicating programs<\/a> &#8211; <\/strong>John von Newman a researcher from Hungary published the theoretical base for computers that store information in their &#8220;memory&#8221;.<\/p>\n<p><strong>1962 &#8211; <\/strong>A group of <a title=\"Bell Labs\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Bell_Labs\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Bell Telephone Labs<\/a> researchers invents a game that destroys software programs.<\/p>\n<p><strong>1971 &#8211; The <a title=\"Creeper virus\" href=\"https:\/\/web.archive.org\/web\/20121122123120\/http:\/\/news.discovery.com:80\/tech\/first-computer-virus-creeper-was-no-bug-110316.html\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Creeper Virus<\/a><\/strong> appears on <a title=\"APRAnet\" href=\"http:\/\/www.computerhistory.org\/internet_history\/\" target=\"_blank\" rel=\"noopener noreferrer\">ARPANET<\/a>, the forerunner of the Internet. It replicates itself and displays a message: &#8220;I&#8217;m the Creeper: Catch Me if You Can.&#8221;<\/p>\n<p><strong>1974 &#8211; <a title=\"The Wabbit virus\" href=\"https:\/\/web.archive.org\/web\/20150609191756\/https:\/\/www.virusbtn.com\/resources\/glossary\/wabbit.xml\" target=\"_blank\" rel=\"noopener noreferrer\">The Wabbit<\/a><\/strong> &#8211; was a <a title=\"Computer virus\" href=\"http:\/\/en.wikipedia.org\/wiki\/Computer_virus\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">self-replicating program<\/a>, that made multiple copies of itself on a computer until it bogs down the system to such an extent that system performance is reduced to zero and the computer eventually crashes. This virus was named wabbit because of the speed at which it was able to replicate.<\/p>\n<p><strong><a title=\"Apple IIe computer\" href=\"http:\/\/oldcomputers.net\/appleii.html\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8173 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"appleiie\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/appleiie-e1565402695593.jpg?resize=114%2C100&#038;ssl=1\" alt=\"Apple IIe\" width=\"114\" height=\"100\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/appleiie-e1565402695593.jpg?w=221&amp;ssl=1 221w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/appleiie-e1565402695593.jpg?resize=75%2C66&amp;ssl=1 75w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/appleiie-e1565402695593.jpg?resize=150%2C132&amp;ssl=1 150w\" sizes=\"auto, (max-width: 114px) 100vw, 114px\" \/><\/a>1981 &#8211; <a title=\"Elk Cloner\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Elk_Cloner\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Elk Cloner<\/a><\/strong> &#8211; the first widespread virus on the <a title=\"Apple\" href=\"http:\/\/www.apple.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Apple<\/a> (<a title=\"NASDAQ : AAPL\" href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-AAPL\/\" target=\"_blank\" rel=\"noopener noreferrer\">AAPL<\/a>) <a title=\"Apple II\" href=\"https:\/\/web.archive.org\/web\/20201012053707\/https:\/\/www.old-computers.com\/museum\/computer.asp?c=68\" target=\"_blank\" rel=\"noopener noreferrer\">II platform<\/a>, spreads by the floppy disk and infects boot sectors, generating messages and impairing performance.<\/p>\n<p><strong>1983 &#8211;\u00a0 The term &#8220;computer virus&#8221;<\/strong> comes into vogue after Professor <a title=\"Leonard Adleman\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Leonard_Adleman\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Len Adleman<\/a> at Lehigh University demonstrates the concept at a seminar.<\/p>\n<p><strong>1986 &#8211; <a title=\"rbach.net\" href=\"https:\/\/wp.me\/p2wgaW-1VJ\" target=\"_blank\" rel=\"noopener noreferrer\">The Brain<\/a><\/strong> is the first global epidemic on the PC platform and shows businesses and consumers are clueless about protection.<\/p>\n<p><strong>1987 &#8211; <a title=\"Jerusalem virus\" href=\"https:\/\/www.techopedia.com\/definition\/27875\/jerusalem-virus\" target=\"_blank\" rel=\"noopener noreferrer\">Jerusalem virus<\/a><\/strong> &#8211; On any Black Friday (Friday the 13th), it would delete any programs that were run, instead of infecting them, so it simply couldn&#8217;t be ignored,&#8221; Roger Thompson <a title=\"www.news.com.au\" href=\"https:\/\/web.archive.org\/web\/20160415185549\/http:\/\/www.news.com.au:80\/technology\/the-birth-of-the-first-personal-computer-virus-brain\/story-e6frfro0-1225990906387\" target=\"_blank\" rel=\"noopener noreferrer\">told<\/a><a title=\"www.news.com.au\" href=\"https:\/\/www.news.com.au\/\" target=\"_blank\" rel=\"noopener noreferrer\"> News.com, Australia<\/a>. &#8220;Y<em>ou couldn&#8217;t throw away your hard drive, and reformatting it didn&#8217;t remove the virus,<\/em>&#8221; the chief research officer for <a title=\"AVG\" href=\"https:\/\/free.avg.com\/us-en\/homepage\" target=\"_blank\" rel=\"noopener noreferrer\">AVG<\/a> said.<\/p>\n<p><strong><a title=\"BSD Daemon\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/FreeBSD\" target=\"_blank\" rel=\"noopener noreferrer\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-8183 \" style=\"border: 0pt none; margin-left: 3px; margin-right: 3px;\" title=\"Bsd_daemon\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/2011\/03\/Bsd_daemon-e1565402741822.jpg?resize=100%2C100&#038;ssl=1\" alt=\"BSD Daemon\" width=\"100\" height=\"100\" \/><\/a>1988 &#8211; The <a title=\"Morris worm\" href=\"http:\/\/groups.csail.mit.edu\/mac\/classes\/6.805\/articles\/morris-worm.html\" target=\"_blank\" rel=\"noopener noreferrer\">Morris worm<\/a> <\/strong>&#8211; created by <a title=\"Robert Tappan Morris\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Robert_Tappan_Morris\" target=\"_blank\" rel=\"noopener noreferrer\">Robert Tappan Morris<\/a>, infects <a title=\"Digital Equipment Corporation\" href=\"http:\/\/www.computerhistory.org\/brochures\/companies.php?alpha=d-f&amp;company=com-42b9d67d9c350\" target=\"_blank\" rel=\"noopener noreferrer\">DEC<\/a> <a title=\"VAX\" href=\"http:\/\/web.archive.org\/web\/20160115094019\/http:\/\/www.mcmanis.com:80\/chuck\/Computers\/vaxen\/\" target=\"_blank\" rel=\"noopener noreferrer\">VAX<\/a> and <a title=\"Sun Microsystems\" href=\"https:\/\/web.archive.org\/web\/20130728084022\/http:\/\/www.oracle.com:80\/us\/products\/servers-storage\/servers\/index.html\" target=\"_blank\" rel=\"noopener noreferrer\">Sun<\/a> machines running <a title=\"BSD UNIX\" href=\"http:\/\/www.freebsd.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">BSD UNIX<\/a> connected to the <a title=\"Internet\" href=\"https:\/\/secure.wikimedia.org\/wikipedia\/en\/wiki\/Internet\" target=\"_blank\" rel=\"noopener noreferrer\">Internet<\/a>\u00a0and becomes the first worm to spread extensively &#8220;in the wild&#8221;, and one of the first well-known programs exploiting <a title=\"Buffer overrun\" href=\"http:\/\/msdn.microsoft.com\/en-us\/library\/ms717795%28v=vs.85%29.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">buffer overrun<\/a> vulnerabilities.<\/p>\n<p><strong>1990 &#8211; <a title=\"Chameleon virus\" href=\"https:\/\/web.archive.org\/web\/20170918185656\/http:\/\/virus.wikia.com\/wiki\/Chameleon\" target=\"_blank\" rel=\"noopener noreferrer\">Chameleon<\/a><\/strong>&#8211; the first documented <a title=\"Polymorphic code\" href=\"http:\/\/en.wikipedia.org\/wiki\/Polymorphic_code\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">polymorphic virus<\/a>, malware that adapts and changes to avoid detection.<\/p>\n<p><strong>1992 &#8211; <a title=\"Michelangelo virus\" href=\"http:\/\/web.archive.org\/web\/20131005015904\/http:\/\/www.cert.org\/advisories\/CA-1992-02.html\" target=\"_blank\" rel=\"noopener noreferrer\">Michelangelo<\/a> <\/strong>&#8211; was expected to create a digital apocalypse on March 6, with millions of computers having their information wiped according to mass media hysteria surrounding the virus.\u00a0 Later assessments of the damage showed the <a title=\"news.cnet.com\" href=\"http:\/\/news.cnet.com\/No-sign-of-Michelangelo-virus-yet\/2100-1023_3-276501.html\" target=\"_blank\" rel=\"noopener noreferrer\">aftermath to be minimal<\/a>.<\/p>\n<p><strong>1995 &#8211;\u00a0 <a title=\"Concept virus\" href=\"https:\/\/web.archive.org\/web\/20120729160448\/http:\/\/www.securelist.com\/en\/glossary?glossid=189267795\" target=\"_blank\" rel=\"noopener noreferrer\">Concept<\/a><\/strong> &#8211; the first <a title=\"Macro virus (computing)\" href=\"http:\/\/en.wikipedia.org\/wiki\/Macro_virus_%28computing%29\" target=\"_blank\" rel=\"wikipedia noopener noreferrer\">Macro virus<\/a> attacked <a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) <a title=\"MS Word\" href=\"https:\/\/office.microsoft.com\/en-us\/word\/\" target=\"_blank\" rel=\"noopener noreferrer\">Word<\/a> documents.<\/p>\n<p><strong>1996 &#8211; <a title=\"Laroux virus\" href=\"http:\/\/www.microsoft.com\/security\/portal\/threat\/encyclopedia\/Entry.aspx?Name=Virus%3AX97M%2FLaroux\" target=\"_blank\" rel=\"noopener noreferrer\">Laroux<\/a><\/strong> &#8211; the first <a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) <a title=\"MS Excel\" href=\"https:\/\/office.microsoft.com\/en-us\/excel\/\" target=\"_blank\" rel=\"noopener noreferrer\">Excel<\/a> virus, appears in the wild.<\/p>\n<p><strong><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-99968\" src=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft-windows-logo-2.gif?resize=118%2C80&#038;ssl=1\" alt=\"\" width=\"118\" height=\"80\" srcset=\"https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft-windows-logo-2.gif?resize=150%2C102&amp;ssl=1 150w, https:\/\/i0.wp.com\/rbach.net\/wp-content\/uploads\/microsoft-windows-logo-2.gif?resize=75%2C51&amp;ssl=1 75w\" sizes=\"auto, (max-width: 118px) 100vw, 118px\" \/>1999 &#8211; The <a title=\"Happy99\" href=\"https:\/\/web.archive.org\/web\/20151023135359\/http:\/\/www.symantec.com\/security_response\/writeup.jsp?docid=2000-121812-3151-99&amp;tabid=2\" target=\"_blank\" rel=\"noopener noreferrer\">Happy99<\/a> worm<\/strong> &#8211; invisibly attached itself to emails and would display fireworks to hide the changes being made then wished the user a happy New Year. It modified system files related to<a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> Microsoft<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) <a title=\"Outlook Express\" href=\"http:\/\/support.microsoft.com\/gp\/outlook-express\" target=\"_blank\" rel=\"noopener noreferrer\">Outlook Express<\/a> and <a title=\"Internet Explorer\" href=\"http:\/\/windows.microsoft.com\/en-US\/internet-explorer\/products\/ie\/home\" target=\"_blank\" rel=\"noopener noreferrer\">Internet Explorer<\/a> (IE) on <a title=\"Windows 95\" href=\"http:\/\/windows.microsoft.com\/en-US\/windows\/history\" target=\"_blank\" rel=\"noopener noreferrer\">Windows 95<\/a> and <a title=\"Windows 98\" href=\"https:\/\/web.archive.org\/web\/20210928131546\/https:\/\/support.microsoft.com\/ph\/1139\" target=\"_blank\" rel=\"noopener noreferrer\">Windows 98<\/a>.<\/p>\n<p><strong>1999 &#8211; <a title=\"Melissa computer worm\" href=\"https:\/\/www.welivesecurity.com\/2016\/07\/15\/flashback-friday-melissa-virus\/\" target=\"_blank\" rel=\"noopener noreferrer\">The Melissa worm<\/a><\/strong> targeted\u00a0<a href=\"http:\/\/www.microsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Microsoft<\/a> (<a href=\"https:\/\/www.tradingview.com\/symbols\/NASDAQ-MSFT\/\" target=\"_blank\" rel=\"noopener noreferrer\">MSFT<\/a>) <a title=\"MS Word\" href=\"https:\/\/office.microsoft.com\/en-us\/word\/\" target=\"_blank\" rel=\"noopener noreferrer\">Word<\/a> and Outlook-based\u00a0systems, and created <a title=\"www.zdnet.com\" href=\"http:\/\/www.zdnet.com\/news\/melissa-virus-swamps-corporate-e-mail\/101906\" target=\"_blank\" rel=\"noopener noreferrer\">considerable<\/a> network traffic.<\/p>\n<p><strong><em>rb-<\/em><\/strong><\/p>\n<p><em>Back in the day, I had to deal with both Happy99 and Melissa, as well as the occasional Stoned. Melissa was the easiest to deal with since I was running a GroupWise shop at the time, once the news spread, we just pulled the Cat5 from the GWIA and we saw minimal blowback. Let&#8217;s hear it for technological diversity.<\/em><\/p>\n<h6>Related articles<\/h6>\n<ul>\n<li><a href=\"http:\/\/www.freetech4teachers.com\/2011\/06\/anatomy-of-computer-virus.html\" target=\"_blank\" rel=\"noopener noreferrer\">Anatomy of a Computer Virus<\/a> (freetech4teachers.com)<\/li>\n<li><a href=\"http:\/\/nakedsecurity.sophos.com\/2011\/06\/07\/more-mac-malware-top-tips-for-avoiding-infection\/\" target=\"_blank\" rel=\"noopener noreferrer\">More Mac malware &#8211; top tips for avoiding infection<\/a> (nakedsecurity.sophos.com)<\/li>\n<li><a href=\"https:\/\/web.archive.org\/web\/20221124062506\/https:\/\/www.brighthub.com\/computing\/smb-security\/articles\/119936.aspx\/\" target=\"_blank\" rel=\"noopener noreferrer\">Combating Viruses: Software Comparison and Guidance<\/a> (brighthub.com)<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><em><a title=\"Ralph Bach\" href=\"https:\/\/rbach.net\/index.php\/new-resume\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ralph Bach<\/a>\u00a0has been in IT long enough to know better and has blogged from his\u00a0<a title=\"Bach Seat\" href=\"https:\/\/rbach.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Bach Seat<\/a> about IT, careers, and anything else that catches his attention since 2005. You can follow him on <a class=\"broken_link\" href=\"http:\/\/www.linkedin.com\/in\/rb48334\" target=\"_blank\" rel=\"noopener noreferrer nofollow\">LinkedIn<\/a>,\u00a0<a href=\"https:\/\/www.facebook.com\/ralph.bach.14\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>,\u00a0and\u00a0<a href=\"https:\/\/twitter.com\/rbach48334\" target=\"_blank\" rel=\"noopener noreferrer\">Twitter<\/a>. Email the Bach Seat\u00a0<a href=\"mailto:\/\/bach.seat@gmail.com\" target=\"_blank\" rel=\"noopener noreferrer\">here<\/a>.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>2011 is the 40th anniversary of the computer malware this article counts down the malware evolution low-lights like Brain Creeper Melissa up to Y2K<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[3045,420,101,1027,1420,1819,617,380,153,626,621,625,615,23,383,382,82,624,421,613,4,810],"class_list":["post-6277","post","type-post","status-publish","format-standard","hentry","category-security","tag-3045","tag-aapl","tag-apple","tag-arpanet","tag-brain","tag-computer","tag-creeper-virus","tag-elk-cloner","tag-fortinet","tag-ftnt","tag-grace-murray-hopper","tag-happy99","tag-iloveyou","tag-malware","tag-melissa","tag-michelangelo","tag-microsoft","tag-morris-worm","tag-msft","tag-robert-slade","tag-security","tag-virus"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6277","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/comments?post=6277"}],"version-history":[{"count":35,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6277\/revisions"}],"predecessor-version":[{"id":132481,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/posts\/6277\/revisions\/132481"}],"wp:attachment":[{"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/media?parent=6277"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/categories?post=6277"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rbach.net\/index.php\/wp-json\/wp\/v2\/tags?post=6277"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}