{"id":922,"date":"2015-10-06T13:20:35","date_gmt":"2015-10-06T07:50:35","guid":{"rendered":"https:\/\/www.mailxaminer.com\/blog\/?p=922"},"modified":"2025-05-21T16:13:58","modified_gmt":"2025-05-21T10:43:58","slug":"apple-mac-dmg-file-forensics","status":"publish","type":"post","link":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/","title":{"rendered":"DMG File Forensics Using MailXaminer"},"content":{"rendered":"<p>DMG is an acronym for Disk Image File that is created on Macintosh operating system. A DMG file is denoted with the extension .dmg. These files were created with the aim of transferring Mac applications over the internet. They are used as mountable disk images that are accessed with a default file manager of Mac machine. The DMG files can be created in accordance with the structure of Universal Disk Image Format (UDIF) or other file systems like HFS, HFS+, and FAT.<\/p>\n<p>In addition to this, it can also use New Disk Image Format (NDIF) for its structure. When it comes to the security of these DMG files, they can be protected by AES-256 and AES-128 encryption. Moreover, they can be compressed by compression formats like ADC, bzip2 and Zlib. Thus, the compression and security imposed on these DMG files have made it an ideal disk image format for sharing data (distribution of software) over the internet.<\/p>\n<h2>Different Kinds Of DMG Files<\/h2>\n<p>Before we learn that how to view DMG files in Windows, it is to be noted that there are different kinds of DMG files available. We have listed only a few DMG files that a user can mostly come across:<\/p>\n<p><strong>Read Only<\/strong><\/p>\n<p>This type of DMG file will prevent the users from making any alterations in the content of the file. When this read-only DMG file is created, the free space of the original file is not omitted. Therefore, the volume header will assume the size of the DMG file to be larger than it originally is.<\/p>\n<p><strong>Compressed<\/strong><\/p>\n<p>The data residing in the read-only file when compressed is referred as the Compressed DMG files. Although, this compressed DMG file is not as secure as the read-only file since there is no protection to the data stored in it.<\/p>\n<p><strong>Read\/Write<\/strong><\/p>\n<p>This DMG File will contain both the data and the free space of the original file from which it was taken. This type of DMG file is similar to that of a raw disk drive image. You can even rename the .dmg file to .dd and vice versa.<\/p>\n<p><strong>Hybrid Image<\/strong><\/p>\n<p>This is a cross platform image that contains fore file systems. The data of the image is saved between all the four files equally. The data, which remains unique to each file system, is the directory information and the volume data.<\/p>\n<h2>Deep Analysis of A DMG \u2013 DMG File Forensics<\/h2>\n<p>When it comes to forensically analyze the structure of DMG files, the first step is to mount them in order to view the contents residing in the file. Moreover, the content can only be viewed if the forensicators have access to a Finder that enables to read this file. Before accessing these DMG file, the files need to be locked first in order to maintain their authenticity and protect them from any changes from the forensicator\u2019s end. The biggest challenge, which the examiners face, is that a DMG file cannot be accessed on Windows machine. Therefore, in order to perform an effectual forensic analysis of DMG file, the forensicators usually deploy professional forensic tool such as <a href=\"https:\/\/www.mailxaminer.com\/\">MailXaminer<\/a>.<\/p>\n<p>The software enables dedicated forensic analysis of DMG files even when the message storage source has been deleted permanently. This is the strongest feature of the software that enables the forensicators to restore the DMG file data, view DMG files in Windows and perform further investigation on it. The forensic experts can recover the data and build the artifacts in their native form, without compromising with the data integrity at any stage of the investigation.<\/p>\n<h3>Adding DMG File<\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-923 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/1.png\" alt=\"dmg file forensics\" width=\"687\" height=\"506\" \/><\/p>\n<h3>Scanning of DMG File<\/h3>\n<p>Once the DMG file is selected, it is completely scanned by the software.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-924\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/2.png\" alt=\"view dmg files in windows 8\" width=\"761\" height=\"424\" \/><\/p>\n<h3>Root Structure of DMG File<\/h3>\n<p>Once the DMG file is successfully scanned, the software displays the entire root structure of the DMG file on the left pane. All the kinds of files stored in the DMG fie can be previewed and selected from the root structure.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-925 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/3.png\" alt=\"Structure of DMG File\" width=\"718\" height=\"400\" \/><\/p>\n<h3>Select &amp; View the Embedded Files of DMG in Windows<\/h3>\n<p>In the generated preview, you can see the EML and MBOX files being shown separately. If you click on MBOX and EML, the entire IPM Root AND IPM-SUBTREE structure is displayed.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-926 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/4.png\" alt=\"View Embedded Files\" width=\"698\" height=\"372\" \/><\/p>\n<p><strong>Note: IPMRoot<\/strong> is the main root folder that contains the root structure of the selected file. The <strong>IPM_SUBTREE <\/strong>contains folders like inbox, outbox, sent items, etc. We can say it is the child folder of IPM Root folder and folders like inbox, outbox, etc. are its grandchildren folders which contains messages.<\/p>\n<h4>MD5 &amp; SHA1 Hash Values<\/h4>\n<p>The software generates a MDF and SHA1 hash values of each message stored in the MD5 file. These hash values enable the forensicators to prove that no fiddling has been done with the evidence during the investigation.<\/p>\n<figure class=\"wp-block-image\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-5561 alignnone\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/51.png\" alt=\"forensic analysis of apple mac dmg file\" width=\"500\" height=\"266\" \/><\/figure>\n<h4>Examining Embedded Attachments<\/h4>\n<p>With the software, you can separately examine the associated attachments of the messages stored in the DMG file. All the attached emails, videos, images, audios, etc. are listed along with their count.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-928 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/6.png\" alt=\"view dmg files in windows 7 &amp; 8\" width=\"426\" height=\"515\" \/><\/p>\n<h4>Suspected Attachment<\/h4>\n<p>MailXaminer lists all the suspected videos and images under a separate option, Suspected Attachments. All the Videos and images, which contain information related to the suspect, are enlisted here according to the level of sensitivity.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-929 size-full\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/7.png\" alt=\"dmg file forensics\" width=\"261\" height=\"429\" \/><\/p>\n<h5>Search for Evidence \u2013 In &#8211; Depth DMG File Forensics<\/h5>\n<p>The search feature embedded in the software enables the user to perform deep searching of the DMG file to get hold of the evidence in a time efficient manner. The different search options provided, assures successful search of the evidence.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-930\" src=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/8.png\" alt=\"8\" width=\"442\" height=\"279\" \/><\/p>\n<p>MailXaminer enables the forensicators to perform a full-fledged forensic analysis of the Apple DMG file. The variety of options provided by the software enables to get access to the evidence in a timely and precise manner.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>DMG is an acronym for Disk Image File that is created on Macintosh operating system. A DMG file is denoted <a href=\"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/\" >Read More&#8230;<\/a><\/p>\n","protected":false},"author":8,"featured_media":932,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"class_list":["post-922","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-forensics"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>DMG File Forensics \u2013 Analyze &amp; View DMG Files in Windows<\/title>\n<meta name=\"description\" content=\"DMG file forensics has been discussed by forensic experts. Conduct Mac Disk Image DMG file forensics and view DMG in Windows operating system instantly.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DMG File Forensics \u2013 Analyze &amp; View DMG Files in Windows\" \/>\n<meta property=\"og:description\" content=\"DMG file forensics has been discussed by forensic experts. Conduct Mac Disk Image DMG file forensics and view DMG in Windows operating system instantly.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/\" \/>\n<meta property=\"og:site_name\" content=\"MailXaminer Official Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-06T07:50:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-21T10:43:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/dmg.png\" \/>\n\t<meta property=\"og:image:width\" content=\"190\" \/>\n\t<meta property=\"og:image:height\" content=\"130\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Mansi Joshi\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mansi Joshi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/\"},\"author\":{\"name\":\"Mansi Joshi\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"headline\":\"DMG File Forensics Using MailXaminer\",\"datePublished\":\"2015-10-06T07:50:35+00:00\",\"dateModified\":\"2025-05-21T10:43:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/\"},\"wordCount\":957,\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/dmg.png\",\"articleSection\":[\"Forensics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/\",\"name\":\"DMG File Forensics \u2013 Analyze & View DMG Files in Windows\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/dmg.png\",\"datePublished\":\"2015-10-06T07:50:35+00:00\",\"dateModified\":\"2025-05-21T10:43:58+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\"},\"description\":\"DMG file forensics has been discussed by forensic experts. Conduct Mac Disk Image DMG file forensics and view DMG in Windows operating system instantly.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/dmg.png\",\"contentUrl\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/dmg.png\",\"width\":190,\"height\":130},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/apple-mac-dmg-file-forensics\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog Home\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Forensics\",\"item\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/category\\\/forensics\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"DMG File Forensics Using MailXaminer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/\",\"name\":\"MailXaminer Official Blog\",\"description\":\"Tech Talks by Forensics Experts\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/#\\\/schema\\\/person\\\/c9207395234d7178f353e02c45490a95\",\"name\":\"Mansi Joshi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g\",\"caption\":\"Mansi Joshi\"},\"description\":\"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.\",\"sameAs\":[\"https:\\\/\\\/www.linkedin.com\\\/in\\\/mansi-joshi-54414524a\\\/\",\"https:\\\/\\\/www.mailxaminer.com\\\/assets\\\/author\\\/mansi-joshi.png\"],\"url\":\"https:\\\/\\\/www.mailxaminer.com\\\/blog\\\/author\\\/mansi-joshi\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DMG File Forensics \u2013 Analyze & View DMG Files in Windows","description":"DMG file forensics has been discussed by forensic experts. Conduct Mac Disk Image DMG file forensics and view DMG in Windows operating system instantly.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/","og_locale":"en_US","og_type":"article","og_title":"DMG File Forensics \u2013 Analyze & View DMG Files in Windows","og_description":"DMG file forensics has been discussed by forensic experts. Conduct Mac Disk Image DMG file forensics and view DMG in Windows operating system instantly.","og_url":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/","og_site_name":"MailXaminer Official Blog","article_published_time":"2015-10-06T07:50:35+00:00","article_modified_time":"2025-05-21T10:43:58+00:00","og_image":[{"width":190,"height":130,"url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/dmg.png","type":"image\/png"}],"author":"Mansi Joshi","twitter_misc":{"Written by":"Mansi Joshi","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/#article","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/"},"author":{"name":"Mansi Joshi","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"headline":"DMG File Forensics Using MailXaminer","datePublished":"2015-10-06T07:50:35+00:00","dateModified":"2025-05-21T10:43:58+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/"},"wordCount":957,"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/dmg.png","articleSection":["Forensics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/","url":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/","name":"DMG File Forensics \u2013 Analyze & View DMG Files in Windows","isPartOf":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/#primaryimage"},"image":{"@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/dmg.png","datePublished":"2015-10-06T07:50:35+00:00","dateModified":"2025-05-21T10:43:58+00:00","author":{"@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95"},"description":"DMG file forensics has been discussed by forensic experts. Conduct Mac Disk Image DMG file forensics and view DMG in Windows operating system instantly.","breadcrumb":{"@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/#primaryimage","url":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/dmg.png","contentUrl":"https:\/\/www.mailxaminer.com\/blog\/wp-content\/uploads\/2015\/10\/dmg.png","width":190,"height":130},{"@type":"BreadcrumbList","@id":"https:\/\/www.mailxaminer.com\/blog\/apple-mac-dmg-file-forensics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog Home","item":"https:\/\/www.mailxaminer.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Forensics","item":"https:\/\/www.mailxaminer.com\/blog\/category\/forensics\/"},{"@type":"ListItem","position":3,"name":"DMG File Forensics Using MailXaminer"}]},{"@type":"WebSite","@id":"https:\/\/www.mailxaminer.com\/blog\/#website","url":"https:\/\/www.mailxaminer.com\/blog\/","name":"MailXaminer Official Blog","description":"Tech Talks by Forensics Experts","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mailxaminer.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.mailxaminer.com\/blog\/#\/schema\/person\/c9207395234d7178f353e02c45490a95","name":"Mansi Joshi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4a54472a1711bb8296f5bf3df3d4f5a01f1667ce788bdb2e834f92f9d7133ac2?s=96&d=mm&r=g","caption":"Mansi Joshi"},"description":"Tech enthusiast &amp; cyber expert for the past 5 years. Love to solve complicated scenarios to counter cyber crimes with in-depth technical knowledge.","sameAs":["https:\/\/www.linkedin.com\/in\/mansi-joshi-54414524a\/","https:\/\/www.mailxaminer.com\/assets\/author\/mansi-joshi.png"],"url":"https:\/\/www.mailxaminer.com\/blog\/author\/mansi-joshi\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/922","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/comments?post=922"}],"version-history":[{"count":2,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/922\/revisions"}],"predecessor-version":[{"id":6380,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/posts\/922\/revisions\/6380"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media\/932"}],"wp:attachment":[{"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/media?parent=922"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mailxaminer.com\/blog\/wp-json\/wp\/v2\/categories?post=922"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}