{"id":10198,"date":"2022-10-20T07:00:00","date_gmt":"2022-10-20T00:00:00","guid":{"rendered":"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/"},"modified":"2022-10-20T07:00:00","modified_gmt":"2022-10-20T00:00:00","slug":"electronic-data-area-security","status":"publish","type":"post","link":"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/","title":{"rendered":"Electronic Data Area Security"},"content":{"rendered":"

Virtual info room security is of vital importance today, as businesses have to deal with enormous amounts of data and must ensure their secureness. A data flow can cost a small business a lot of money, it will also harm the reputation of the brand. To safeguard this info, you must work with secure organization software to make certain it is kept safe online. A virtual data room can be one such software that is necessary for secure report exchange. <\/p>\n

A VDR that offers multiple levels of data security will help ensure data honesty. It will also provide features like “view as” tools so you can guarantee users can easily access specified documents. Furthermore, a protected VDR may have an taxation log that shows all the activities that occur in that. With this info, you can decide who has used the information https:\/\/clouddataworld.org\/virtual-data-room-security\/<\/a> and for how long. <\/p>\n

One of the biggest risks to online data bedroom security is certainly human mistake. When employees access the info, they may endanger the data. To reduce this risk, you should put into practice a robust info category system and implement a limited access control system. Recognize an attack limit access to the data room software plus the operator control buttons. <\/p>\n

A good virtual info room security policy will incorporate an IP-address restriction feature. This characteristic lets you control who can gain access to specific papers and can even control the IP addresses that users are able to use to sign in. It also has a virus coverage system that scans incoming documents and protects important computer data from not authorized users. Another good feature is certainly screenshot coverage, which will secures documents when users capture their screen. <\/p>\n","protected":false},"excerpt":{"rendered":"

Virtual info room security is of vital importance today […]<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[1],"tags":[],"yoast_head":"\nElectronic Data Area Security - \u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/capinter.net\/\u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e22\u0e37\u0e14\/electronic-data-area-security\/\" \/>\n<meta property=\"og:locale\" content=\"th_TH\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Electronic Data Area Security - \u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER\" \/>\n<meta property=\"og:description\" content=\"Virtual info room security is of vital importance today […]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/capinter.net\/\u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e22\u0e37\u0e14\/electronic-data-area-security\/\" \/>\n<meta property=\"og:site_name\" content=\"\u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-20T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"19sangsuwan.s@skrealtyplus.co.th\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"19sangsuwan.s@skrealtyplus.co.th\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 \u0e19\u0e32\u0e17\u0e35\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/\"},\"author\":{\"name\":\"19sangsuwan.s@skrealtyplus.co.th\",\"@id\":\"https:\/\/capinter.net\/#\/schema\/person\/2d60290c4cc22274728d95bbb4225cb0\"},\"headline\":\"Electronic Data Area Security\",\"datePublished\":\"2022-10-20T00:00:00+00:00\",\"dateModified\":\"2022-10-20T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/\"},\"wordCount\":291,\"publisher\":{\"@id\":\"https:\/\/capinter.net\/#organization\"},\"articleSection\":[\"\u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e22\u0e37\u0e14\"],\"inLanguage\":\"th\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/\",\"url\":\"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/\",\"name\":\"Electronic Data Area Security - \u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER\",\"isPartOf\":{\"@id\":\"https:\/\/capinter.net\/#website\"},\"datePublished\":\"2022-10-20T00:00:00+00:00\",\"dateModified\":\"2022-10-20T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/#breadcrumb\"},\"inLanguage\":\"th\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/capinter.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Electronic Data Area Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/capinter.net\/#website\",\"url\":\"https:\/\/capinter.net\/\",\"name\":\"\u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER\",\"description\":\"\u0e42\u0e23\u0e07\u0e07\u0e32\u0e19\u0e1c\u0e25\u0e34\u0e15\u0e2b\u0e21\u0e27\u0e01\u0e41\u0e25\u0e30\u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e1c\u0e49\u0e32\u0e0a\u0e31\u0e49\u0e19\u0e19\u0e33 \u0e2b\u0e21\u0e27\u0e01\u0e41\u0e01\u0e47\u0e1b \u0e2b\u0e21\u0e27\u0e01\u0e1c\u0e49\u0e32 \u0e2b\u0e21\u0e27\u0e01\u0e1b\u0e35\u0e01\u0e23\u0e2d\u0e1a \u0e2b\u0e21\u0e27\u0e01\u0e22\u0e35\u0e19\u0e2a\u0e4c \u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e04\u0e2d\u0e01\u0e23\u0e21 \u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e42\u0e1b\u0e42\u0e25\",\"publisher\":{\"@id\":\"https:\/\/capinter.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/capinter.net\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"th\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/capinter.net\/#organization\",\"name\":\"\u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER\",\"url\":\"https:\/\/capinter.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"th\",\"@id\":\"https:\/\/capinter.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/capinter.net\/wp-content\/uploads\/2021\/04\/Logo.png\",\"contentUrl\":\"https:\/\/capinter.net\/wp-content\/uploads\/2021\/04\/Logo.png\",\"width\":224,\"height\":46,\"caption\":\"\u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER\"},\"image\":{\"@id\":\"https:\/\/capinter.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/capinter.net\/#\/schema\/person\/2d60290c4cc22274728d95bbb4225cb0\",\"name\":\"19sangsuwan.s@skrealtyplus.co.th\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"th\",\"@id\":\"https:\/\/capinter.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bd1404c0df74c4acdf59be17e2104e22?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bd1404c0df74c4acdf59be17e2104e22?s=96&d=mm&r=g\",\"caption\":\"19sangsuwan.s@skrealtyplus.co.th\"},\"sameAs\":[\"https:\/\/capinter.net\/\"],\"url\":\"https:\/\/capinter.net\/author\/19sangsuwan-sskrealtyplus-co-th\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Electronic Data Area Security - \u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/capinter.net\/\u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e22\u0e37\u0e14\/electronic-data-area-security\/","og_locale":"th_TH","og_type":"article","og_title":"Electronic Data Area Security - \u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER","og_description":"Virtual info room security is of vital importance today […]","og_url":"https:\/\/capinter.net\/\u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e22\u0e37\u0e14\/electronic-data-area-security\/","og_site_name":"\u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER","article_published_time":"2022-10-20T00:00:00+00:00","author":"19sangsuwan.s@skrealtyplus.co.th","twitter_card":"summary_large_image","twitter_misc":{"Written by":"19sangsuwan.s@skrealtyplus.co.th","Est. reading time":"1 \u0e19\u0e32\u0e17\u0e35"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/#article","isPartOf":{"@id":"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/"},"author":{"name":"19sangsuwan.s@skrealtyplus.co.th","@id":"https:\/\/capinter.net\/#\/schema\/person\/2d60290c4cc22274728d95bbb4225cb0"},"headline":"Electronic Data Area Security","datePublished":"2022-10-20T00:00:00+00:00","dateModified":"2022-10-20T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/"},"wordCount":291,"publisher":{"@id":"https:\/\/capinter.net\/#organization"},"articleSection":["\u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e22\u0e37\u0e14"],"inLanguage":"th"},{"@type":"WebPage","@id":"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/","url":"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/","name":"Electronic Data Area Security - \u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER","isPartOf":{"@id":"https:\/\/capinter.net\/#website"},"datePublished":"2022-10-20T00:00:00+00:00","dateModified":"2022-10-20T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/#breadcrumb"},"inLanguage":"th","potentialAction":[{"@type":"ReadAction","target":["https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/capinter.net\/%e0%b9%80%e0%b8%aa%e0%b8%b7%e0%b9%89%e0%b8%ad%e0%b8%a2%e0%b8%b7%e0%b8%94\/electronic-data-area-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/capinter.net\/"},{"@type":"ListItem","position":2,"name":"Electronic Data Area Security"}]},{"@type":"WebSite","@id":"https:\/\/capinter.net\/#website","url":"https:\/\/capinter.net\/","name":"\u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER","description":"\u0e42\u0e23\u0e07\u0e07\u0e32\u0e19\u0e1c\u0e25\u0e34\u0e15\u0e2b\u0e21\u0e27\u0e01\u0e41\u0e25\u0e30\u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e1c\u0e49\u0e32\u0e0a\u0e31\u0e49\u0e19\u0e19\u0e33 \u0e2b\u0e21\u0e27\u0e01\u0e41\u0e01\u0e47\u0e1b \u0e2b\u0e21\u0e27\u0e01\u0e1c\u0e49\u0e32 \u0e2b\u0e21\u0e27\u0e01\u0e1b\u0e35\u0e01\u0e23\u0e2d\u0e1a \u0e2b\u0e21\u0e27\u0e01\u0e22\u0e35\u0e19\u0e2a\u0e4c \u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e04\u0e2d\u0e01\u0e23\u0e21 \u0e40\u0e2a\u0e37\u0e49\u0e2d\u0e42\u0e1b\u0e42\u0e25","publisher":{"@id":"https:\/\/capinter.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/capinter.net\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"th"},{"@type":"Organization","@id":"https:\/\/capinter.net\/#organization","name":"\u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER","url":"https:\/\/capinter.net\/","logo":{"@type":"ImageObject","inLanguage":"th","@id":"https:\/\/capinter.net\/#\/schema\/logo\/image\/","url":"https:\/\/capinter.net\/wp-content\/uploads\/2021\/04\/Logo.png","contentUrl":"https:\/\/capinter.net\/wp-content\/uploads\/2021\/04\/Logo.png","width":224,"height":46,"caption":"\u0e41\u0e04\u0e1b\u0e2a\u0e4c \u0e2d\u0e34\u0e19\u0e40\u0e15\u0e2d\u0e23\u0e4c\u0e40\u0e19\u0e0a\u0e31\u0e48\u0e19\u0e41\u0e19\u0e25\u0e42\u0e1b\u0e23\u0e14\u0e31\u0e01\u0e2a\u0e4c | CAPINTER"},"image":{"@id":"https:\/\/capinter.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/capinter.net\/#\/schema\/person\/2d60290c4cc22274728d95bbb4225cb0","name":"19sangsuwan.s@skrealtyplus.co.th","image":{"@type":"ImageObject","inLanguage":"th","@id":"https:\/\/capinter.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bd1404c0df74c4acdf59be17e2104e22?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd1404c0df74c4acdf59be17e2104e22?s=96&d=mm&r=g","caption":"19sangsuwan.s@skrealtyplus.co.th"},"sameAs":["https:\/\/capinter.net\/"],"url":"https:\/\/capinter.net\/author\/19sangsuwan-sskrealtyplus-co-th\/"}]}},"_links":{"self":[{"href":"https:\/\/capinter.net\/wp-json\/wp\/v2\/posts\/10198"}],"collection":[{"href":"https:\/\/capinter.net\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/capinter.net\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/capinter.net\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/capinter.net\/wp-json\/wp\/v2\/comments?post=10198"}],"version-history":[{"count":0,"href":"https:\/\/capinter.net\/wp-json\/wp\/v2\/posts\/10198\/revisions"}],"wp:attachment":[{"href":"https:\/\/capinter.net\/wp-json\/wp\/v2\/media?parent=10198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/capinter.net\/wp-json\/wp\/v2\/categories?post=10198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/capinter.net\/wp-json\/wp\/v2\/tags?post=10198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}