{"id":196,"date":"2019-03-12T01:21:00","date_gmt":"2019-03-11T23:21:00","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=196"},"modified":"2020-05-31T01:45:38","modified_gmt":"2020-05-30T23:45:38","slug":"10-common-web-application-security-mistakes","status":"publish","type":"post","link":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/","title":{"rendered":"10 Common Web Application Security Mistakes"},"content":{"rendered":"<p style=\"text-align: justify;\"><strong>Most Common Web Security Mistakes to Avoid When Developing a Web Application<\/strong><\/p>\n<p style=\"text-align: justify;\">Web application development is a long process as it involves creating a user-friendly app from scratch and one that is capable of simultaneously maintaining high performance and web security. For all developers, web application security is one area that functions partially beyond the creator\u2019s control as it is just not possible to even guess who is on the other end of the HTTP connection.<\/p>\n<p style=\"text-align: justify;\">Hence, one will have to combat with too many web security concerns in order to establish a secure and safe app. Some of these concerns include data safety and the possibility of fake data entering the database.\u00a0 Given below are 10 of the most common\u00a0<a href=\"https:\/\/cwatch.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">web security<\/a>\u00a0vulnerabilities users can avoid.<\/p>\n<p style=\"text-align: justify;\"><strong>1. Permitting Invalid Data to Enter the Database<\/strong><\/p>\n<p style=\"text-align: justify;\">All input provided by your users will have to be taken with all defensiveness. Failing to validate what you receive could result in you paying a high price for possible cross-site scripting, SQL injection,\u00a0 command injection or another similar security threat.<\/p>\n<p style=\"text-align: justify;\"><strong>2. Focusing on the System as a Whole<\/strong><\/p>\n<p style=\"text-align: justify;\">This is evident when considering large custom projects in which a team of developers divide the work in order to secure varied areas of the app. Things are in fact not very clear with the project as a whole even though individual security of those parts could be leading the class. This is indeed a popular way to cause several handoffs which results in your data becoming extremely vulnerable to attackers. You will thus have to ensure that your app continues to be secure even when all its components are brought together.<\/p>\n<p style=\"text-align: justify;\"><strong>3. Establishing Personally Developed Security Methods<\/strong><\/p>\n<p style=\"text-align: justify;\">Developers mostly assume that they will do better by using a homegrown algorithm or method. This is because they believe that if it is more authentic it could be increasingly safer as it will be unfamiliar to hackers. However, in reality, authentication is not just more of an expensive process, but it also increases the chances of creating security holes that can be discovered very easily. Well-tested libraries are thus considered to be the best way for this whole process.<\/p>\n<p style=\"text-align: justify;\"><strong>4. Treating Security to be Your Last Step<\/strong><\/p>\n<p style=\"text-align: justify;\">Security is not a simple thing that can be included towards the end of a process. It has to be built in as the very foundation of the whole project and should not be ignored as just another feature that can be developed any time. It is under such scenarios that your application becomes prone to misconfigurations and other such vulnerabilities like SQL injections.<\/p>\n<p style=\"text-align: justify;\"><strong>5. Developing Plain Text Password Storage<\/strong><\/p>\n<p style=\"text-align: justify;\">Web security can be further enhanced by using a safe way to store passwords. Plain text password storage is considered to be the most common and dangerous mistake and should be avoided. Only passwords and important data should be stored in the database.<\/p>\n<p style=\"text-align: justify;\"><strong>6. Creating Weak Passwords<\/strong><\/p>\n<p style=\"text-align: justify;\">If you are a developer concerned about the safety of the app, then you will have to create clear rules for passwords.<\/p>\n<p style=\"text-align: justify;\"><strong>7. Storing Unencrypted Data in the Database<\/strong><\/p>\n<p style=\"text-align: justify;\">The unencrypted storage of all significant details is one of the common mistakes linked to data storage. This leads to putting user data at a great risk whenever your database is compromised. When your database is attacked, encryption is considered to be the only way that will help prevent a huge loss of information. All developers should keep in mind that hackers are capable of attacking everything that is stored online.<\/p>\n<p style=\"text-align: justify;\"><strong>8. Depending Excessively on the Client Side<\/strong><\/p>\n<p style=\"text-align: justify;\">Depending to a great extent on the client side code results in a developer losing its influence over the critical functions of the app, thus taking away a huge portion of the control over security.<\/p>\n<p style=\"text-align: justify;\"><strong>9. Being Too Optimistic<\/strong><\/p>\n<p style=\"text-align: justify;\">A good developer should always be aware of the fact that web security development is a never-ending process due to the consistent possibility of having security holes. With this in mind, a good developer should constantly be ready to search and fix the mistake.<\/p>\n<p style=\"text-align: justify;\"><strong>10. Permitting Variables via the URL Path Name<\/strong><\/p>\n<p style=\"text-align: justify;\">Placing variables in the URL is a very grave mistake that anyone can make since it usually provides an allowance to freely download any file containing important data that your app keeps.<\/p>\n<p style=\"text-align: justify;\">These common web security vulnerabilities establish the fact that security should be the prime concern for all developers whether they are working on a startup or in the process of developing a huge business-related project.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most Common Web Security Mistakes to Avoid When Developing a Web Application Web application development is a long process as it involves creating a user-friendly app from scratch and one that is capable of simultaneously maintaining high performance and web security. For all developers, web application security is one area that functions partially beyond the creator\u2019s control as it is just not possible to even guess who is on the other end of the HTTP connection. Hence, one will have to combat with too many web security concerns in order to establish a secure and safe app. Some of these\u2026<\/p>\n","protected":false},"author":3,"featured_media":197,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-196","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":4}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>10 Common Web Application Security Mistakes - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Common Web Application Security Mistakes - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"Most Common Web Security Mistakes to Avoid When Developing a Web Application Web application development is a long process as it involves creating a user-friendly app from scratch and one that is capable of simultaneously maintaining high performance and web security. For all developers, web application security is one area that functions partially beyond the creator\u2019s control as it is just not possible to even guess who is on the other end of the HTTP connection. Hence, one will have to combat with too many web security concerns in order to establish a secure and safe app. Some of these\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/hackermoz\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-11T23:21:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:45:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/web-application-security-best-practices.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1460\" \/>\n\t<meta property=\"og:image:height\" content=\"730\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"10 Common Web Application Security Mistakes\",\"datePublished\":\"2019-03-11T23:21:00+00:00\",\"dateModified\":\"2020-05-30T23:45:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/\"},\"wordCount\":747,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/web-application-security-best-practices.png\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/\",\"name\":\"10 Common Web Application Security Mistakes - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/web-application-security-best-practices.png\",\"datePublished\":\"2019-03-11T23:21:00+00:00\",\"dateModified\":\"2020-05-30T23:45:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/web-application-security-best-practices.png\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/web-application-security-best-practices.png\",\"width\":1460,\"height\":730},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/website-security\\\/10-common-web-application-security-mistakes\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Common Web Application Security Mistakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367\",\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/wp-content\\\/litespeed\\\/avatar\\\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.com\",\"https:\\\/\\\/www.facebook.com\\\/hackermoz\\\/\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.com\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Common Web Application Security Mistakes - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/","og_locale":"en_US","og_type":"article","og_title":"10 Common Web Application Security Mistakes - MozDomains Blog","og_description":"Most Common Web Security Mistakes to Avoid When Developing a Web Application Web application development is a long process as it involves creating a user-friendly app from scratch and one that is capable of simultaneously maintaining high performance and web security. For all developers, web application security is one area that functions partially beyond the creator\u2019s control as it is just not possible to even guess who is on the other end of the HTTP connection. Hence, one will have to combat with too many web security concerns in order to establish a secure and safe app. Some of these\u2026","og_url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/","og_site_name":"MozDomains Blog","article_author":"https:\/\/www.facebook.com\/hackermoz\/","article_published_time":"2019-03-11T23:21:00+00:00","article_modified_time":"2020-05-30T23:45:38+00:00","og_image":[{"width":1460,"height":730,"url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/web-application-security-best-practices.png","type":"image\/png"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"10 Common Web Application Security Mistakes","datePublished":"2019-03-11T23:21:00+00:00","dateModified":"2020-05-30T23:45:38+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/"},"wordCount":747,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/web-application-security-best-practices.png","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/","name":"10 Common Web Application Security Mistakes - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/web-application-security-best-practices.png","datePublished":"2019-03-11T23:21:00+00:00","dateModified":"2020-05-30T23:45:38+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/#primaryimage","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/web-application-security-best-practices.png","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/web-application-security-best-practices.png","width":1460,"height":730},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.com\/blog\/en\/website-security\/10-common-web-application-security-mistakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.com\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"10 Common Web Application Security Mistakes"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#website","url":"https:\/\/www.mozdomains.com\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.com\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.com\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.com\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367","url":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367","contentUrl":"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/litespeed\/avatar\/28674fdd1e00d7f5f874e31e914df50c.jpg?ver=1775811367","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.com","https:\/\/www.facebook.com\/hackermoz\/","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.com\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/196","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/comments?post=196"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/posts\/196\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media\/197"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/media?parent=196"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/categories?post=196"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.com\/blog\/en\/wp-json\/wp\/v2\/tags?post=196"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}