{"id":1386,"date":"2022-10-06T00:02:00","date_gmt":"2022-10-05T18:32:00","guid":{"rendered":"https:\/\/www.mailxaminer.com\/blog\/?p=1386"},"modified":"2022-10-07T16:49:54","modified_gmt":"2022-10-07T11:19:54","slug":"working-with-keywords","status":"publish","type":"post","link":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/","title":{"rendered":"Working with Keywords Using the MailXaminer Tool"},"content":{"rendered":"<p style=\"text-align: justify;\">Crimes have always been a part of society. Nowadays, technology has become essential for our daily lives, thus the cyber world also threatens insecurity and danger. To prevent digital crimes in this era of technological innovation, more futuristic technology is what we need. Nowadays, digital forensics investigators also use forensic software to manage investigations, evidence testing, and email investigations. Using forensic tools like <strong>MailXaminer<\/strong>, It&#8217;s\u00a0 possible to track digital crimes and curtail their effect can be before occurring huge loss. MailXaminer&#8217;s working with keywords feature helps to find any emails.<\/p>\n<p style=\"text-align: justify;\"><strong>MailXaminer<\/strong> is an in-depth <a href=\"https:\/\/www.mailxaminer.com\/product\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Email Investigation Tool<\/strong><\/a> that is globally trusted by forensics investigators for its efficient process of email examination. This forensic tool provides a wide variety of inbuilt advanced features that can be used to analyze email data in a quick and easy way. With this utility, users can initiate the email investigation process by adding data inputs into the software that need to be examined. They can use suspected keywords to extract out evidence from the input data.<\/p>\n<h2 class=\"h4\">Use of Keyword Search in Forensic Investigation<\/h2>\n<p style=\"text-align: justify;\">The forensic tool allows to add keywords prior to processing, which can be added individually or in a CSV file with a list of keywords. The input keywords can be used to filter out suspected evidential facts from the huge data. Then, the user can easily analyze the suspected files to fetch out evidence without wasting time in analyzing whole data. Working with keywords while examining the case, it makes the task easy and less time-consuming.<\/p>\n<p style=\"text-align: justify;\">Along with the keyword search feature, the software also provides a facility to export, bookmark, tag, etc. Users can save the email data files locally in the desired file format using <strong>\u201cExport\u201d<\/strong> option. The <strong>\u201cBookmark\u201d<\/strong> tab can help users to categorize specific files for the further investigation process. To delete the searched unwanted data, the user can use the direct <strong>\u201cDelete\u201d<\/strong> option. Besides this, the tool provides many more features that are helpful in making the investigation process straight and convenient.<\/p>\n<h2 class=\"h4\">Keyword Search to Conduct Clues Based Search<\/h2>\n<p style=\"text-align: justify;\">In a digital forensic investigation, examiners generally use keyword searches while investigating the email forensic case. It helps them to find out the suspected data on the basis of clue searches. With the efficient email forensic tool i.e., <strong>MailXaminer<\/strong>, users can minimize the efforts and time to investigate a large amount of email data. Users just need to enter the keywords to find out related data for examination. They do not need to search manually and examine suspected files.<\/p>\n<h3 class=\"h4\">Working with Keywords Feature to Examine Files<\/h3>\n<p style=\"text-align: justify;\">To examine evidential files using <strong>MailXaminer<\/strong> with keyword-based search, simply follow some simple steps. The steps are as follows:<\/p>\n<p style=\"text-align: justify;\"><strong>Step 1:<\/strong> After adding evidential files into the software, go to the <strong>\u201cKeyword\u201d<\/strong> section. Then, click on the tab <strong>\u201cAdd Keywords\u201d<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5029\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/1.png\" alt=\"Add Keywords\" width=\"1920\" height=\"1030\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Step 2:<\/strong> A <strong>\u201cKeyword Search\u201d<\/strong> window will open. In the <strong>\u201cKeyword List\u201d<\/strong> column, the user can enter multiple keywords to find the evidence files related to keywords. It also provides an option <strong>\u201cBrowse CSV\u201d<\/strong> that we can use to add the list of keywords in CSV format. Then, click on the <strong>\u201cSearch\u201d<\/strong> tab.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5031\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/2.png\" alt=\"Keyword List\" width=\"585\" height=\"238\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Step 3:<\/strong> Tool will begin the search process which may take time depending on the file size.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5032\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/3.png\" alt=\"Working with Keywords\" width=\"947\" height=\"510\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Step 4:<\/strong> After completing the search process, one can see all the email data in the <strong>\u201cEmail\u201d<\/strong> tab. In the left panel of the screen, the tool will show entered keywords in the list with checkboxes. To view the emails related to a particular keyword, users can select the keywords by tick marking the check box.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5033\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/4.png\" alt=\"Email - Working with Keywords\" width=\"1920\" height=\"1032\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Step 5:<\/strong> The tool also allows viewing the attachment files related to a particular keyword. In the attachment tab, the user can view the list of all the attachment files related to the selected keyword.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5034\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/5.png\" alt=\"Attachment\" width=\"1920\" height=\"1030\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Step 6:<\/strong> The utility provides various functions to perform on the resultant email files. For example, by using the <strong>\u201cExport\u201d<\/strong> option, the user can download and save the files in any of the provided file formats. <strong>\u201cBookmark\u201d<\/strong> option is also available that categorizes specific files for further investigations.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5035\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/6.png\" alt=\"Export\" width=\"1920\" height=\"1030\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Step 7:<\/strong> It also provides direct options to perform direct functions like <strong>Bulk Export, Export to CSV<\/strong>, and <strong>Delete<\/strong>. These direct options are a good option to export and delete required files with one click.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-5036\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/7.png\" alt=\"Bulk Export, Export to CSV\" width=\"1920\" height=\"1031\" \/><\/p>\n<p>Users just need to select the email files by tick marking the box corresponding to email files and select the option (<strong>Bulk Export, Export to CSV<\/strong>, or <strong>Delete<\/strong>) directly to perform the needed action.<\/p>\n<h3 class=\"h4\">Conclusion &#8211; Working with Keywords<\/h3>\n<p style=\"text-align: justify;\">In digital forensic investigations, investigators need advanced functionalities in the forensic software to minimize the load of work. The keyword searches technique is one of the amazing features that help investigators to filter out the suspected data for examination. Using this, investigators can search clue based data and easily find out the evidence from it. <strong>MailXaminer<\/strong> provides this feature, which enables an easy email investigation process.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Crimes have always been a part of society. Nowadays, technology has become essential for our daily lives, thus the cyber <a href=\"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/\" >Read More&#8230;<\/a><\/p>\n","protected":false},"author":8,"featured_media":5066,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"class_list":["post-1386","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Working with Keywords - Search Keyword to Inspect Evidence<\/title>\n<meta name=\"description\" content=\"Working with Keywords feature to search evidence preciously of cybercrime cases with different options. Use Advance filters to find results in a short time.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Working with Keywords - Search Keyword to Inspect Evidence\" \/>\n<meta property=\"og:description\" content=\"Working with Keywords feature to search evidence preciously of cybercrime cases with different options. Use Advance filters to find results in a short time.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/\" \/>\n<meta property=\"og:site_name\" content=\"MailXaminer Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-05T18:32:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-07T11:19:54+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/Working-With-Keywords.png\" \/>\n\t<meta property=\"og:image:width\" content=\"696\" \/>\n\t<meta property=\"og:image:height\" content=\"390\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mansi Joshi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansi Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/\"},\"author\":{\"name\":\"Mansi Joshi\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"headline\":\"Working with Keywords Using the MailXaminer Tool\",\"datePublished\":\"2022-10-05T18:32:00+00:00\",\"dateModified\":\"2022-10-07T11:19:54+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/\"},\"wordCount\":820,\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Working-With-Keywords.png\",\"keywords\":[\"Working with Keywords\"],\"articleSection\":[\"Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/\",\"name\":\"Working with Keywords - Search Keyword to Inspect Evidence\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Working-With-Keywords.png\",\"datePublished\":\"2022-10-05T18:32:00+00:00\",\"dateModified\":\"2022-10-07T11:19:54+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"description\":\"Working with Keywords feature to search evidence preciously of cybercrime cases with different options. Use Advance filters to find results in a short time.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Working-With-Keywords.png\",\"contentUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/Working-With-Keywords.png\",\"width\":696,\"height\":390,\"caption\":\"WORKING WITH KEYWORDS\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/working-with-keywords\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Home\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensics\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/category\\\/forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Working with Keywords Using the MailXaminer Tool\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\",\"name\":\"MailXaminer Official Blog\",\"description\":\"Tech Talks by Forensics Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\",\"name\":\"Mansi Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"caption\":\"Mansi Joshi\"},\"description\":\"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/mansi-joshi-54414524a\\\/\",\"https:\\\/\\\/www.mailxaminer.com\\\/assets\\\/author\\\/mansi-joshi.png\"],\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/author\\\/mansi-joshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Working with Keywords - Search Keyword to Inspect Evidence","description":"Working with Keywords feature to search evidence preciously of cybercrime cases with different options. Use Advance filters to find results in a short time.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/","og_locale":"en_US","og_type":"article","og_title":"Working with Keywords - Search Keyword to Inspect Evidence","og_description":"Working with Keywords feature to search evidence preciously of cybercrime cases with different options. Use Advance filters to find results in a short time.","og_url":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/","og_site_name":"MailXaminer Official Blog","article_published_time":"2022-10-05T18:32:00+00:00","article_modified_time":"2022-10-07T11:19:54+00:00","og_image":[{"width":696,"height":390,"url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/Working-With-Keywords.png","type":"image\/png"}],"author":"Mansi Joshi","twitter_misc":{"Written by":"Mansi Joshi","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/#article","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/"},"author":{"name":"Mansi Joshi","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"headline":"Working with Keywords Using the MailXaminer Tool","datePublished":"2022-10-05T18:32:00+00:00","dateModified":"2022-10-07T11:19:54+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/"},"wordCount":820,"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/Working-With-Keywords.png","keywords":["Working with Keywords"],"articleSection":["Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/","url":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/","name":"Working with Keywords - Search Keyword to Inspect Evidence","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/#primaryimage"},"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/Working-With-Keywords.png","datePublished":"2022-10-05T18:32:00+00:00","dateModified":"2022-10-07T11:19:54+00:00","author":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"description":"Working with Keywords feature to search evidence preciously of cybercrime cases with different options. Use Advance filters to find results in a short time.","breadcrumb":{"@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/#primaryimage","url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/Working-With-Keywords.png","contentUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2021\/02\/Working-With-Keywords.png","width":696,"height":390,"caption":"WORKING WITH KEYWORDS"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailxaminer.com\/blog\/working-with-keywords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Home","item":"https:\/\/www.mailxaminer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensics","item":"https:\/\/www.mailxaminer.com\/blog\/category\/forensics\/"},{"@type":"ListItem","position":3,"name":"Working with Keywords Using the MailXaminer Tool"}]},{"@type":"WebSite","@id":"https:\/\/www.mailxaminer.com\/blog\/#website","url":"https:\/\/www.mailxaminer.com\/blog\/","name":"MailXaminer Official Blog","description":"Tech Talks by Forensics Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailxaminer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95","name":"Mansi Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","caption":"Mansi Joshi"},"description":"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.","sameAs":["https:\/\/www.linkedin.com\/in\/mansi-joshi-54414524a\/","https:\/\/www.mailxaminer.com\/assets\/author\/mansi-joshi.png"],"url":"https:\/\/www.mailxaminer.com\/blog\/author\/mansi-joshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/1386","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/comments?post=1386"}],"version-history":[{"count":0,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/1386\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media\/5066"}],"wp:attachment":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media?parent=1386"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/categories?post=1386"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}