{"id":245,"date":"2014-12-22T18:35:57","date_gmt":"2014-12-22T13:05:57","guid":{"rendered":"https:\/\/www.mailxaminer.com\/blog\/?p=245"},"modified":"2025-05-22T13:04:38","modified_gmt":"2025-05-22T07:34:38","slug":"mdaemon-email-messaging-server-forensics","status":"publish","type":"post","link":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/","title":{"rendered":"MDaemon Messaging Server Forensics"},"content":{"rendered":"<p><strong>MDaemon Messaging Server<\/strong>, pertinent messaging based email server software, meant for Windows Operating System can be considered as the most sufficed alternative to Microsoft Exchange. <em>MDaemon<\/em> Email Server\u00a0is a groupware server developed by <strong>Alt-N Technologies, <\/strong>located in Grapevine. Being one of the finest alternatives to Microsoft Exchange Server, MDaemon is now frequently used in most of the growing organizations as a messaging platform. This software application is not untouched in the email scam cases, and a number of cases often come up with the issue of cybercrimes with respect to MDaemon email messages.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-246 aligncenter\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/MDaemon.png\" alt=\"mdaemon-messaging-server\" width=\"452\" height=\"272\" \/><br \/>\n<a title=\"Email Forensics\" href=\"https:\/\/www.mailxaminer.com\/product\/\" target=\"_blank\" rel=\"noopener\">\u00a0<\/a><\/p>\n<h2>MDaemon Messaging Server \u2013 Forensic Analysis<\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-248 aligncenter\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/configuration.png\" alt=\"mdaemon-configuration-session\" width=\"471\" height=\"353\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Creation of User Account &#8211;<\/strong> For effective and complete usage of the <em>MDaemon<\/em> Email Server, the user is required to create a user account. After a valid creation of complete user account, the user mailbox gets created where all the mails get stored.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-251 aligncenter\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/account.png\" alt=\"account-details\" width=\"523\" height=\"411\" \/><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Applying Filter Rule &#8211;<\/strong> Investigators may also seem to be taking keen interest in understanding the filter rules created by the users. The content filter rule in MDaemon allows the users to place a copy of all messages in the <strong>MailStore account<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-256 aligncenter\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/enable.png\" alt=\"enable-settings\" width=\"528\" height=\"373\" \/><\/p>\n<p>&nbsp;<\/p>\n<h2>Set Up of Default Domain Name &amp; Servers &#8211;<\/h2>\n<p>The default Domain Name and Servers can be set by moving to the following location: &#8211;<\/p>\n<p><em>Setup <\/em><em>\u00e0<\/em><em>\u00a0Default Domain\/Servers <\/em><em>\u00e0<\/em><em> Public and Shared Folders <\/em><em>\u00e0<\/em><em> Public and Shared Folders <\/em><em>\u00e0<\/em><em> Folder Listings and ACLs<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-259 aligncenter\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/default-domain.png\" alt=\"default-domain-servers\" width=\"560\" height=\"427\" \/><\/p>\n<p>&nbsp;<\/p>\n<h3>MDaemon Messaging Server &#8211; Email Security<\/h3>\n<p>MDaemon Server provides one of the most versatile and robust security mechanisms. The layered security approach provided by the platform does not easily let the cyber stalkers create email \u2013 borne threats such as spam, viruses, malware and phishing.<\/p>\n<p>Some of the security mechanisms deployed by the tool include: &#8211;<\/p>\n<ul>\n<li>Spam filter: &#8211; The spam filter provides A class securities by making use of greylist processing technology for identifying spam signatures.<\/li>\n<li>SSL and TLS: &#8211; The Secure Sockets Layer (SSL) \/ Transport Layer Security (TLS) protocols have implemented by MDaemon.<\/li>\n<li>SMTP Authentication: &#8211; The SMTP authentication mechanism makes the network chaining more secure by connecting the criteria of providing the user credentials at the time of sending of emails.<\/li>\n<li>Bayesian Learning: &#8211; Bayesian Learning mechanism plays a vital role in spam filtering. The working of the Bayesian algorithms is experienced based. Using the Bayesian approach, MDaemon classifies the users as trusted or compromised.<\/li>\n<li>Content Filter: &#8211; A multi \u2013 threaded Content Filtering System allows the users to manage the behavior of the server towards the incoming and outgoing email messages.<\/li>\n<\/ul>\n<h3>Get a glimpse of the user emails: &#8211;<\/h3>\n<p>The default location where MDaemon store users&#8217; emails is: &#8211;<\/p>\n<p><em>c:\/MDaemon\/Users\/mdaemon.local\/<\/em><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-260 aligncenter\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/location.png\" alt=\"file-location\" width=\"728\" height=\"514\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>At the default location, the Forensicators can easily view that the default file in which the <em>MDaemon<\/em>\u00a0Email Server email data gets stored is\u00a0<em><strong>\u201c.msg\u201d<\/strong><\/em>. This MSG file can be read using tools such as <strong><a title=\"MDaemon Email Server Forensics\" href=\"https:\/\/www.mailxaminer.com\/product\/\">MailXaminer<\/a><\/strong>. Using this <strong><a href=\"https:\/\/www.mailxaminer.com\/product\/\" target=\"_blank\" rel=\"noopener\">email forensic tool<\/a><\/strong> investigator can view and analyze the email in multiple view options, such as Hex view, MIMIE view, RTF view, and also export the evidence into multiple output formats like <strong>PST<\/strong>,<strong> MSG<\/strong>, <strong>PDF<\/strong>, <strong>TIFF<\/strong>, etc.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>MDaemon Messaging Server, pertinent messaging based email server software, meant for Windows Operating System can be considered as the most <a href=\"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/\" >Read More&#8230;<\/a><\/p>\n","protected":false},"author":8,"featured_media":271,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"class_list":["post-245","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>MDaemon Messaging Server \u2013 Forensic Email Analysis<\/title>\n<meta name=\"description\" content=\"MDaemon server email analysis shows that emails are stored in the MSG format. Investigators can view &amp; examine these MDaemon messages to carve evidence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"MDaemon Messaging Server \u2013 Forensic Email Analysis\" \/>\n<meta property=\"og:description\" content=\"MDaemon server email analysis shows that emails are stored in the MSG format. Investigators can view &amp; examine these MDaemon messages to carve evidence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"MailXaminer Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-22T13:05:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-22T07:34:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/mdaemon_email_server_logo.png\" \/>\n\t<meta property=\"og:image:width\" content=\"180\" \/>\n\t<meta property=\"og:image:height\" content=\"120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mansi Joshi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansi Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/\"},\"author\":{\"name\":\"Mansi Joshi\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"headline\":\"MDaemon Messaging Server Forensics\",\"datePublished\":\"2014-12-22T13:05:57+00:00\",\"dateModified\":\"2025-05-22T07:34:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/\"},\"wordCount\":515,\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/mdaemon_email_server_logo.png\",\"articleSection\":[\"Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/\",\"name\":\"MDaemon Messaging Server \u2013 Forensic Email Analysis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/mdaemon_email_server_logo.png\",\"datePublished\":\"2014-12-22T13:05:57+00:00\",\"dateModified\":\"2025-05-22T07:34:38+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"description\":\"MDaemon server email analysis shows that emails are stored in the MSG format. Investigators can view & examine these MDaemon messages to carve evidence.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/mdaemon_email_server_logo.png\",\"contentUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2014\\\/12\\\/mdaemon_email_server_logo.png\",\"width\":180,\"height\":120},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/mdaemon-email-messaging-server-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Home\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensics\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/category\\\/forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"MDaemon Messaging Server Forensics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\",\"name\":\"MailXaminer Official Blog\",\"description\":\"Tech Talks by Forensics Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\",\"name\":\"Mansi Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"caption\":\"Mansi Joshi\"},\"description\":\"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/mansi-joshi-54414524a\\\/\",\"https:\\\/\\\/www.mailxaminer.com\\\/assets\\\/author\\\/mansi-joshi.png\"],\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/author\\\/mansi-joshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"MDaemon Messaging Server \u2013 Forensic Email Analysis","description":"MDaemon server email analysis shows that emails are stored in the MSG format. Investigators can view & examine these MDaemon messages to carve evidence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/","og_locale":"en_US","og_type":"article","og_title":"MDaemon Messaging Server \u2013 Forensic Email Analysis","og_description":"MDaemon server email analysis shows that emails are stored in the MSG format. Investigators can view & examine these MDaemon messages to carve evidence.","og_url":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/","og_site_name":"MailXaminer Official Blog","article_published_time":"2014-12-22T13:05:57+00:00","article_modified_time":"2025-05-22T07:34:38+00:00","og_image":[{"width":180,"height":120,"url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/mdaemon_email_server_logo.png","type":"image\/png"}],"author":"Mansi Joshi","twitter_misc":{"Written by":"Mansi Joshi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/#article","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/"},"author":{"name":"Mansi Joshi","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"headline":"MDaemon Messaging Server Forensics","datePublished":"2014-12-22T13:05:57+00:00","dateModified":"2025-05-22T07:34:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/"},"wordCount":515,"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/mdaemon_email_server_logo.png","articleSection":["Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/","url":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/","name":"MDaemon Messaging Server \u2013 Forensic Email Analysis","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/mdaemon_email_server_logo.png","datePublished":"2014-12-22T13:05:57+00:00","dateModified":"2025-05-22T07:34:38+00:00","author":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"description":"MDaemon server email analysis shows that emails are stored in the MSG format. Investigators can view & examine these MDaemon messages to carve evidence.","breadcrumb":{"@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/#primaryimage","url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/mdaemon_email_server_logo.png","contentUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2014\/12\/mdaemon_email_server_logo.png","width":180,"height":120},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailxaminer.com\/blog\/mdaemon-email-messaging-server-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Home","item":"https:\/\/www.mailxaminer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensics","item":"https:\/\/www.mailxaminer.com\/blog\/category\/forensics\/"},{"@type":"ListItem","position":3,"name":"MDaemon Messaging Server Forensics"}]},{"@type":"WebSite","@id":"https:\/\/www.mailxaminer.com\/blog\/#website","url":"https:\/\/www.mailxaminer.com\/blog\/","name":"MailXaminer Official Blog","description":"Tech Talks by Forensics Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailxaminer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95","name":"Mansi Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","caption":"Mansi Joshi"},"description":"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.","sameAs":["https:\/\/www.linkedin.com\/in\/mansi-joshi-54414524a\/","https:\/\/www.mailxaminer.com\/assets\/author\/mansi-joshi.png"],"url":"https:\/\/www.mailxaminer.com\/blog\/author\/mansi-joshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/245","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/comments?post=245"}],"version-history":[{"count":3,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/245\/revisions"}],"predecessor-version":[{"id":6404,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/245\/revisions\/6404"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media\/271"}],"wp:attachment":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media?parent=245"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/categories?post=245"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}