{"id":3335,"date":"2017-04-03T13:05:51","date_gmt":"2017-04-03T17:05:51","guid":{"rendered":"\/wp-content\/uploads\/coder-keyboard-blue.jpg"},"modified":"2017-04-03T13:05:51","modified_gmt":"2017-04-03T17:05:51","slug":"computer-crime-concept-2","status":"inherit","type":"attachment","link":"https:\/\/www.connectalk.com\/fr\/computer-crime-concept-2\/","title":{"rendered":"Computer crime concept"},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","inline_featured_image":false},"class_list":["post-3335","attachment","type-attachment","status-inherit","hentry"],"description":{"rendered":"<p class=\"attachment\"><a href='\/wp-content\/uploads\/coder-keyboard-blue.jpg'><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"200\" src=\"\/wp-content\/uploads\/coder-keyboard-blue-300x200.jpg\" class=\"attachment-medium size-medium\" alt=\"\" srcset=\"\/wp-content\/uploads\/coder-keyboard-blue-300x200.jpg 300w, \/wp-content\/uploads\/coder-keyboard-blue-768x512.jpg 768w, \/wp-content\/uploads\/coder-keyboard-blue-272x182.jpg 272w, \/wp-content\/uploads\/coder-keyboard-blue.jpg 800w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n"},"caption":{"rendered":"<p>Hacker using laptop. Lots of digits on the computer screen.<\/p>\n"},"alt_text":"","media_type":"image","mime_type":"image\/jpeg","media_details":{"width":800,"height":533,"file":"coder-keyboard-blue.jpg","sizes":{"thumbnail":{"file":"coder-keyboard-blue-150x150.jpg","width":150,"height":150,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/coder-keyboard-blue-150x150.jpg"},"medium":{"file":"coder-keyboard-blue-300x200.jpg","width":300,"height":200,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/coder-keyboard-blue-300x200.jpg"},"medium_large":{"file":"coder-keyboard-blue-768x512.jpg","width":768,"height":512,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/coder-keyboard-blue-768x512.jpg"},"et-pb-post-main-image":{"file":"coder-keyboard-blue-400x250.jpg","width":400,"height":250,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/coder-keyboard-blue-400x250.jpg"},"et-pb-portfolio-image":{"file":"coder-keyboard-blue-400x284.jpg","width":400,"height":284,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/coder-keyboard-blue-400x284.jpg"},"et-pb-portfolio-module-image":{"file":"coder-keyboard-blue-510x382.jpg","width":510,"height":382,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/coder-keyboard-blue-510x382.jpg"},"et-pb-gallery-module-image-portrait":{"file":"coder-keyboard-blue-400x516.jpg","width":400,"height":516,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/coder-keyboard-blue-400x516.jpg"},"sow-carousel-default":{"file":"coder-keyboard-blue-272x182.jpg","width":272,"height":182,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/coder-keyboard-blue-272x182.jpg"},"full":{"file":"coder-keyboard-blue.jpg","width":800,"height":533,"mime_type":"image\/jpeg","source_url":"\/wp-content\/uploads\/coder-keyboard-blue.jpg"}},"image_meta":{"aperture":"5","credit":"Getty Images\/iStockphoto","camera":"Canon EOS 5D Mark III","caption":"Hacker using laptop. Lots of digits on the computer screen.","created_timestamp":"1454170439","copyright":"scyther5","focal_length":"54","iso":"100","shutter_speed":"1.3","title":"Computer crime concept","orientation":"1","keywords":["Firewall","Computer","White Collar Crime","Digital Display","Html","Spy","Coding","Network Security","Computer Language","Privacy","Computer Network","Script","Security System","Password","Surveillance","Burglary","Binary Code","Computer Programmer","Computer Bug","Computer Hacker","Burglar","Thief","Criminal","Typing","Stealing","Law","Protection","Communication","Identity","Danger","Order","Security","Dark","Business","Technology","Crime","Social Issues","Digitally Generated Image","Police Force","People","Java","Internet","Computer Software","Laptop","Data","hack","Anonymous","Phishing"]}},"post":null,"source_url":"\/wp-content\/uploads\/coder-keyboard-blue.jpg","_links":{"self":[{"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/media\/3335","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/media"}],"about":[{"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/types\/attachment"}],"author":[{"embeddable":true,"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.connectalk.com\/fr\/wp-json\/wp\/v2\/comments?post=3335"}]}}