{"id":12368,"date":"2023-05-04T18:19:08","date_gmt":"2023-05-04T12:49:08","guid":{"rendered":"https:\/\/nginx.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1.jpg"},"modified":"2023-05-04T18:19:08","modified_gmt":"2023-05-04T12:49:08","slug":"programmer","status":"inherit","type":"attachment","link":"https:\/\/www.hiddenbrains.com\/blog\/programmer","title":{"rendered":"Programmer"},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":{"web_stories_base_color":"#221437","web_stories_blurhash":"UF8M;9OTt9R$E]rnR;niI^nKj^WS-aSetAnh","web_stories_cropped_origin_id":0,"web_stories_muted_id":0,"web_stories_optimized_id":0,"web_stories_poster_id":0,"web_stories_trim_data":{"original":0},"web_stories_is_gif":false},"web_story_media_source":[31],"class_list":["post-12368","attachment","type-attachment","status-inherit","hentry"],"acf":[],"web_stories_media_source":"editor","web_stories_is_muted":null,"featured_media_src":[],"description":{"rendered":"<p class=\"attachment\"><a href='https:\/\/console.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1.jpg'><img decoding=\"async\" width=\"225\" height=\"300\" src=\"https:\/\/cdn-server-blog.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-225x300.jpg\" class=\"attachment-medium size-medium\" alt=\"Software development tech stack\" srcset=\"https:\/\/cdn-server-blog.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-225x300.jpg 225w, https:\/\/cdn-server-blog.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-769x1024.jpg 769w, https:\/\/cdn-server-blog.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-640x853.jpg 640w, https:\/\/cdn-server-blog.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-150x200.jpg 150w\" sizes=\"(max-width: 225px) 100vw, 225px\" \/><\/a><\/p>\n"},"caption":{"rendered":"<p>Developer following scheme when programming at his workplace<\/p>\n"},"alt_text":"Software development tech stack","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":4912,"height":6545,"file":"2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1.jpg","filesize":15207585,"sizes":{"medium":{"file":"top-view-unrecognizable-hacker-performing-cyberattack-night-1-225x300.jpg","width":225,"height":300,"filesize":40661,"mime_type":"image\/jpeg","source_url":"https:\/\/console.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-225x300.jpg"},"large":{"file":"top-view-unrecognizable-hacker-performing-cyberattack-night-1-769x1024.jpg","width":769,"height":1024,"filesize":182158,"mime_type":"image\/jpeg","source_url":"https:\/\/console.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-769x1024.jpg"},"thumbnail":{"file":"top-view-unrecognizable-hacker-performing-cyberattack-night-1-150x150.jpg","width":150,"height":150,"filesize":27981,"mime_type":"image\/jpeg","source_url":"https:\/\/console.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-150x150.jpg"},"web-stories-poster-portrait":{"file":"top-view-unrecognizable-hacker-performing-cyberattack-night-1-640x853.jpg","width":640,"height":853,"filesize":138594,"mime_type":"image\/jpeg","source_url":"https:\/\/console.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-640x853.jpg"},"web-stories-publisher-logo":{"file":"top-view-unrecognizable-hacker-performing-cyberattack-night-1-96x96.jpg","width":96,"height":96,"filesize":23686,"mime_type":"image\/jpeg","source_url":"https:\/\/console.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-96x96.jpg"},"web-stories-thumbnail":{"file":"top-view-unrecognizable-hacker-performing-cyberattack-night-1-150x200.jpg","width":150,"height":200,"filesize":30307,"mime_type":"image\/jpeg","source_url":"https:\/\/console.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1-150x200.jpg"},"full":{"file":"top-view-unrecognizable-hacker-performing-cyberattack-night-1.jpg","width":4912,"height":6545,"mime_type":"image\/jpeg","source_url":"https:\/\/console.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1.jpg"}},"image_meta":{"aperture":"6.3","credit":"","camera":"NIKON D800E","caption":"Developer following scheme when programming at his workplace","created_timestamp":"1507270587","copyright":"","focal_length":"35","iso":"800","shutter_speed":"0.01","title":"Programmer","orientation":"1","keywords":["working","computer","technology","programmer","coding","software","developer","screen","professional","script","tester","dark","drawing","scheme","plan","tablet","hands","keyboard","IT","late","table","website","computing","hacking","cyberattack"]}},"post":null,"source_url":"https:\/\/console.hiddenbrains.com\/blog\/wp-content\/uploads\/2023\/05\/top-view-unrecognizable-hacker-performing-cyberattack-night-1.jpg","_links":{"self":[{"href":"https:\/\/www.hiddenbrains.com\/blog\/index.php\/wp-json\/wp\/v2\/media\/12368","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hiddenbrains.com\/blog\/index.php\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/www.hiddenbrains.com\/blog\/index.php\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/www.hiddenbrains.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hiddenbrains.com\/blog\/index.php\/wp-json\/wp\/v2\/comments?post=12368"}],"wp:term":[{"taxonomy":"web_story_media_source","embeddable":true,"href":"https:\/\/www.hiddenbrains.com\/blog\/index.php\/wp-json\/web-stories\/v1\/web_story_media_source?post=12368"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}