{"id":199,"date":"2008-03-13T18:52:43","date_gmt":"2008-03-14T02:52:43","guid":{"rendered":"http:\/\/cubist.cs.washington.edu\/Security\/2008\/03\/13\/time-to-test-our-security-mindset\/"},"modified":"2008-03-13T18:52:43","modified_gmt":"2008-03-14T02:52:43","slug":"time-to-test-our-security-mindset","status":"publish","type":"post","link":"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/13\/time-to-test-our-security-mindset\/","title":{"rendered":"Time to test our security mindset"},"content":{"rendered":"<p>Hey everyone. I found a website where you can try to use various ways to hack through levels of password. I think this is a fun way to get in touch with our security mindsets and see how far you can go. I wish everyone good luck \ud83d\ude42<\/p>\n<p>http:\/\/hackerskills.com\/<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hey everyone. I found a website where you can try to use various ways to hack through levels of password. I think this is a fun way to get in touch with our security mindsets and see how far you &hellip; <a href=\"https:\/\/secblog.cs.washington.edu\/Security\/2008\/03\/13\/time-to-test-our-security-mindset\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":26,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,1],"tags":[135,136,137],"class_list":["post-199","post","type-post","status-publish","format-standard","hentry","category-announcements","category-miscellaneous","tag-game","tag-hacker","tag-skill"],"_links":{"self":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/199","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/users\/26"}],"replies":[{"embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/comments?post=199"}],"version-history":[{"count":0,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/posts\/199\/revisions"}],"wp:attachment":[{"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/media?parent=199"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/categories?post=199"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/secblog.cs.washington.edu\/Security\/wp-json\/wp\/v2\/tags?post=199"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}