{"id":1030,"date":"2022-10-27T02:23:00","date_gmt":"2022-10-26T20:53:00","guid":{"rendered":"https:\/\/www.mailxaminer.com\/blog\/?p=1030"},"modified":"2022-10-28T15:03:39","modified_gmt":"2022-10-28T09:33:39","slug":"dreammail-forensics-technique-for-email-investigation","status":"publish","type":"post","link":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/","title":{"rendered":"DreamMail Forensics \u2013 Proven Tactics for Email Investigation"},"content":{"rendered":"<p style=\"text-align: justify;\"><em>Wondering to know the perfect solution to perform DreamMail forensics? Then, check out this blog to know the finest solution to easily perform forensic analysis of DreamMail files.<\/em><\/p>\n<p style=\"text-align: justify;\">DreamMail is an email client, from the DreamSoftware Studio company. It&#8217;s purpose is to be capable of managing multiple email accounts. It supports protocols like SMTP, POP3, eSMTP, and SSL.<\/p>\n<div id=\"attachment_1031\" style=\"width: 1450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1031\" class=\"wp-image-1031 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2016\/05\/11.png\" alt=\"DreamMail Forensics\" width=\"1440\" height=\"900\" \/><p id=\"caption-attachment-1031\" class=\"wp-caption-text\"><strong>Figure 1: DreamMail Email Client<\/strong><\/p><\/div>\n<p style=\"text-align: justify;\">There are several advanced features such as spam filtration for files with a malware infection, and message rules in managed list of whitelists and blacklists. It has also compressing feature which allow you to compress email data to save space in the hard disk drive.<\/p>\n<p style=\"text-align: justify;\">DreamMail is loaded with many other features in which it auto-searches POP3 and SMTP servers for connectivity. You can also create short notes, edit received message and send message anonymously using DreamMail.<\/p>\n<p style=\"text-align: justify;\">DreamMail come up with bulk set of features that lets users to backup emails and contacts in DMD file format. It allows to export emails in multiple file formats EML, HTML, Text and MHT. It also allows to import the emails from EML file, DMD file and Outlook Express Account.<\/p>\n<h2 class=\"h4\"><strong>How to Examine DreamMail Emails for Forensic Purpose?<\/strong><\/h2>\n<p style=\"text-align: justify;\">There has been an increase in the number of cybercrime cases wherein fraudsters make use of DreamMail application to conduct crimes. However, the main question is that how to get access of DreamMail emails for searching potential artefacts. It is really important to find the user data storage location of DreamMail. However, there is no such location to find the user data from DreamMail. Therefore, the investigating officers can make searches in DefaultUser folder from the computer.<\/p>\n<h2 class=\"h4\"><strong>User Data Folder<\/strong><\/h2>\n<p style=\"text-align: justify;\"><strong>Note:<\/strong> Folder location depends on the user who is using DreamMail because it allow users to store data at any location in computer.<\/p>\n<p style=\"text-align: justify;\">As you can see in the below image, that all files &amp; folders inside DefaultUser folder are displayed. You can see two different files with the name of BlackList.txt and WhiteList.txt. Both files work for spam filtering, all spam related email IDs are listed in BlackList.txt file.<\/p>\n<div id=\"attachment_1032\" style=\"width: 1450px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1032\" class=\"wp-image-1032 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2016\/05\/21.png\" alt=\"Search User Data\" width=\"1440\" height=\"900\" \/><p id=\"caption-attachment-1032\" class=\"wp-caption-text\"><strong>Figure 2: Search User Data<\/strong><\/p><\/div>\n<p style=\"text-align: justify;\">Investigators have to take DefaultUser folder with all user data for investigation purpose. However, it is not always a good idea to take User data in a folder. As there might be a probability of data corruption in folders. Therefore, it is suggested to store data into a TAR file and then take it into any removable device for investigation.<\/p>\n<div id=\"attachment_1033\" style=\"width: 777px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-1033\" class=\"wp-image-1033 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2016\/05\/31.png\" alt=\"User Data Folder\" width=\"767\" height=\"320\" \/><p id=\"caption-attachment-1033\" class=\"wp-caption-text\"><strong>Figure 3: User Data Folder<\/strong><\/p><\/div>\n<h3 class=\"h4\"><strong>Suggested Tip:<\/strong><\/h3>\n<p style=\"text-align: justify;\"><strong>MailXaminer <a href=\"https:\/\/www.mailxaminer.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Email Examiner Software<\/a><\/strong> is a one-stop solution to examine and analyze suspected email data files effortlessly. The software offers some advanced features that allow investigators to analyze files from 20+ email file formats. Besides this, it provides multiple advanced features such analytics option, which includes link analysis, timeline analysis, word cloud and entity analysis.<\/p>\n<h3 class=\"h4\"><strong>Some Remarkable Features by MailXaminer Software<\/strong><\/h3>\n<p>Here are some additional features of the futuristic email examination software.<\/p>\n<ul>\n<li>Supports email data files from both desktop &amp; web email client<\/li>\n<li>Multiple search options such as General, Fuzzy, Proximity, etc.<\/li>\n<li>Avail OCR technology to carve contents from uneditable files<\/li>\n<li>Geolocation image mapping to find image\u2019s geographical location details<\/li>\n<li>Instantly analyze all the data from Skype DB file<\/li>\n<li>Analysis of obscene images via advanced image analysis feature<\/li>\n<\/ul>\n<h3 class=\"h4\"><strong>The Final Note<\/strong><\/h3>\n<p style=\"text-align: justify;\">DreamMail is a perfect email application for those who want to use multiple email accounts on a single platform. Evidently, DreamMail keeps backup of emails and other data items in DMD file format. Using MailXaminer, one can easily search and analyze suspected email files wherein it instantly finds out the potential evidence in a hassle-free way.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Wondering to know the perfect solution to perform DreamMail forensics? Then, check out this blog to know the finest solution <a href=\"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/\" >Read More&#8230;<\/a><\/p>\n","protected":false},"author":8,"featured_media":5126,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"class_list":["post-1030","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DreamMail Forensics - Proven Tactics to Examine DreamMail Emails<\/title>\n<meta name=\"description\" content=\"DreamMail Forensics technique to examine DreamMail Emails, User Data, etc. MailXaminer helps to analyze DreamMail complete data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DreamMail Forensics - Proven Tactics to Examine DreamMail Emails\" \/>\n<meta property=\"og:description\" content=\"DreamMail Forensics technique to examine DreamMail Emails, User Data, etc. MailXaminer helps to analyze DreamMail complete data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/\" \/>\n<meta property=\"og:site_name\" content=\"MailXaminer Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-26T20:53:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-28T09:33:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/DreamMail-Forensics.png\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"390\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mansi Joshi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansi Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/\"},\"author\":{\"name\":\"Mansi Joshi\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"headline\":\"DreamMail Forensics \u2013 Proven Tactics for Email Investigation\",\"datePublished\":\"2022-10-26T20:53:00+00:00\",\"dateModified\":\"2022-10-28T09:33:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/\"},\"wordCount\":636,\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/DreamMail-Forensics.png\",\"keywords\":[\"DreamMail Forensics\"],\"articleSection\":[\"Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/\",\"name\":\"DreamMail Forensics - Proven Tactics to Examine DreamMail Emails\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/DreamMail-Forensics.png\",\"datePublished\":\"2022-10-26T20:53:00+00:00\",\"dateModified\":\"2022-10-28T09:33:39+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"description\":\"DreamMail Forensics technique to examine DreamMail Emails, User Data, etc. MailXaminer helps to analyze DreamMail complete data.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/DreamMail-Forensics.png\",\"contentUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/11\\\/DreamMail-Forensics.png\",\"width\":696,\"height\":390,\"caption\":\"DreamMail Forensics\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/dreammail-forensics-technique-for-email-investigation\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Home\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensics\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/category\\\/forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DreamMail Forensics \u2013 Proven Tactics for Email Investigation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\",\"name\":\"MailXaminer Official Blog\",\"description\":\"Tech Talks by Forensics Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\",\"name\":\"Mansi Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"caption\":\"Mansi Joshi\"},\"description\":\"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/mansi-joshi-54414524a\\\/\",\"https:\\\/\\\/www.mailxaminer.com\\\/assets\\\/author\\\/mansi-joshi.png\"],\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/author\\\/mansi-joshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DreamMail Forensics - Proven Tactics to Examine DreamMail Emails","description":"DreamMail Forensics technique to examine DreamMail Emails, User Data, etc. MailXaminer helps to analyze DreamMail complete data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/","og_locale":"en_US","og_type":"article","og_title":"DreamMail Forensics - Proven Tactics to Examine DreamMail Emails","og_description":"DreamMail Forensics technique to examine DreamMail Emails, User Data, etc. MailXaminer helps to analyze DreamMail complete data.","og_url":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/","og_site_name":"MailXaminer Official Blog","article_published_time":"2022-10-26T20:53:00+00:00","article_modified_time":"2022-10-28T09:33:39+00:00","og_image":[{"width":696,"height":390,"url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/DreamMail-Forensics.png","type":"image\/png"}],"author":"Mansi Joshi","twitter_misc":{"Written by":"Mansi Joshi","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/#article","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/"},"author":{"name":"Mansi Joshi","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"headline":"DreamMail Forensics \u2013 Proven Tactics for Email Investigation","datePublished":"2022-10-26T20:53:00+00:00","dateModified":"2022-10-28T09:33:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/"},"wordCount":636,"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/DreamMail-Forensics.png","keywords":["DreamMail Forensics"],"articleSection":["Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/","url":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/","name":"DreamMail Forensics - Proven Tactics to Examine DreamMail Emails","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/#primaryimage"},"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/DreamMail-Forensics.png","datePublished":"2022-10-26T20:53:00+00:00","dateModified":"2022-10-28T09:33:39+00:00","author":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"description":"DreamMail Forensics technique to examine DreamMail Emails, User Data, etc. MailXaminer helps to analyze DreamMail complete data.","breadcrumb":{"@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/#primaryimage","url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/DreamMail-Forensics.png","contentUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2020\/11\/DreamMail-Forensics.png","width":696,"height":390,"caption":"DreamMail Forensics"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailxaminer.com\/blog\/dreammail-forensics-technique-for-email-investigation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Home","item":"https:\/\/www.mailxaminer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensics","item":"https:\/\/www.mailxaminer.com\/blog\/category\/forensics\/"},{"@type":"ListItem","position":3,"name":"DreamMail Forensics \u2013 Proven Tactics for Email Investigation"}]},{"@type":"WebSite","@id":"https:\/\/www.mailxaminer.com\/blog\/#website","url":"https:\/\/www.mailxaminer.com\/blog\/","name":"MailXaminer Official Blog","description":"Tech Talks by Forensics Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailxaminer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95","name":"Mansi Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","caption":"Mansi Joshi"},"description":"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.","sameAs":["https:\/\/www.linkedin.com\/in\/mansi-joshi-54414524a\/","https:\/\/www.mailxaminer.com\/assets\/author\/mansi-joshi.png"],"url":"https:\/\/www.mailxaminer.com\/blog\/author\/mansi-joshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/1030","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/comments?post=1030"}],"version-history":[{"count":0,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/1030\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media\/5126"}],"wp:attachment":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media?parent=1030"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/categories?post=1030"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}