{"id":129,"date":"2019-03-09T10:20:12","date_gmt":"2019-03-09T08:20:12","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=129"},"modified":"2020-05-31T01:43:43","modified_gmt":"2020-05-30T23:43:43","slug":"achieving-the-web-applications-security","status":"publish","type":"post","link":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/","title":{"rendered":"Achieving The Web Applications Security"},"content":{"rendered":"<p style=\"text-align: justify;\">Web applications play a critical role in half of all breaches that happen around the world. With all this going around for a while now, a meager of 10% of companies secure all their critical applications and have the applications reviewed on security stance before and during production.<\/p>\n<p style=\"text-align: justify;\">Of late, the need arises for the companies to be clear on their\u00a0web application security\u00a0agenda. There is a dire need to replace fragmented, manual pen testing with ongoing, automated scanning. By doing so, they can defend their global application infrastructures. And this would also do away with the need for hiring extra consultants, installation of more servers and scanning tools.<\/p>\n<p style=\"text-align: justify;\"><strong>What Is\u00a0Web Application Security?<\/strong><\/p>\n<p style=\"text-align: justify;\">Web application security\u00a0refers to the methodology of securing websites and internet services against various\u00a0security threatsthat make use of vulnerabilities in an application\u2019s code. The most common victims of web application attacks are content management systems like WordPress, database administration tools like phpMyAdmin, and SaaS applications.<\/p>\n<p style=\"text-align: justify;\"><strong>Notable Reasons To Why Cyber-attackers Target Web Applications<\/strong><\/p>\n<p style=\"text-align: justify;\">Web Applications have become the simplistic route for comfortable attacks to be carried on by cyber-attackers as they prove to be least resistant. The below-mentioned reasons attribute for remaining as their prime target:<\/p>\n<p style=\"text-align: justify;\">\u00a0\u00a0\u00a0 \u2022 The web applications as the terminology suggest is continually exposed to the Internet. So, it is a bit easy to penetrate by external attackers using open tools that look for common vulnerabilities such as\u00a0<strong>SQL Injection<\/strong>.<br \/>\n\u2022 It is easy to attack usual targets like the network and host operating system layers which have their security tightened over time. In addition to this,\u00a0 the operating systems and networks are secured by mitigating controls like the IDS\/IPS systems and next-gen firewalls.<br \/>\n\u2022 When the time is insufficient and the need to deliver the product is creeping up then the testing phase may skip a few procedures. This might lead to vulnerabilities being exposed as the security concerns being overlooked.<br \/>\n\u2022 The critical vulnerabilities may arise when the applications are compiled from hybrid code a mix of in-house development, outsourced code, and open source. This is due to the lack of proper visibility into the mechanisms and components.<br \/>\n\u2022 The Web 2.0 technologies that incorporate complex client-side logic such as JavaScript (AJAX) and Adobe Flash present a larger attack surface.<\/p>\n<p style=\"text-align: justify;\"><strong>The Comodo cWatch<\/strong>\u00a0&#8211;\u00a0 A\u00a0Complete Website Security Software\u00a0Solution Which Discovers and Continuously Monitors All Your Web Applications<\/p>\n<p style=\"text-align: justify;\">Most of us tend to neglect to append website protection and security when we build our website. It is a really bad idea to miss out on the guidelines in today&#8217;s evolving threat landscape. So, it is important for you to add security features and to protect your site from online dangers.<\/p>\n<p style=\"text-align: justify;\"><strong>Web application security<\/strong>\u00a0is a significant factor in the success of any web-based business. If the security of your web-based applications gets knocked-down, then it will negatively affect the company and its growth. So positively, add the key features to your website design strategy, and prevent the hacker from getting hold of important digital files and images on your website.<\/p>\n<p style=\"text-align: justify;\">Comodo cWatch is a comprehensive website security tool for websites and applications. It features a powerful\u00a0<strong>Web Application Firewall<\/strong>\u00a0(WAF) provisioned over a Secure\u00a0<strong>Content Delivery Network<\/strong>\u00a0(CDN). It is backed by a 24\/7\u00a0<strong>Cyber Security Operation Center<\/strong>\u00a0(CSOC) with certified security experts. It leverages data from over 85 million endpoints to detect and mitigate threats before they occur.<\/p>\n<p style=\"text-align: justify;\">Comodo cWatch also includes\u00a0<strong>malware scanning<\/strong>, detection and removal services to enable organizations to take a proactive approach in protecting their businesses and brand reputation from cyber attacks.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Web applications play a critical role in half of all breaches that happen around the world. With all this going around for a while now, a meager of 10% of companies secure all their critical applications and have the applications reviewed on security stance before and during production. Of late, the need arises for the companies to be clear on their\u00a0web application security\u00a0agenda. There is a dire need to replace fragmented, manual pen testing with ongoing, automated scanning. By doing so, they can defend their global application infrastructures. And this would also do away with the need for hiring extra\u2026<\/p>\n","protected":false},"author":3,"featured_media":130,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Achieving The Web Applications Security - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Achieving The Web Applications Security - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"Web applications play a critical role in half of all breaches that happen around the world. With all this going around for a while now, a meager of 10% of companies secure all their critical applications and have the applications reviewed on security stance before and during production. Of late, the need arises for the companies to be clear on their\u00a0web application security\u00a0agenda. There is a dire need to replace fragmented, manual pen testing with ongoing, automated scanning. By doing so, they can defend their global application infrastructures. And this would also do away with the need for hiring extra\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-09T08:20:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:43:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/Fotolia_59066357_M.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1628\" \/>\n\t<meta property=\"og:image:height\" content=\"1167\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"Achieving The Web Applications Security\",\"datePublished\":\"2019-03-09T08:20:12+00:00\",\"dateModified\":\"2020-05-30T23:43:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/\"},\"wordCount\":599,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Fotolia_59066357_M.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/\",\"name\":\"Achieving The Web Applications Security - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Fotolia_59066357_M.jpg\",\"datePublished\":\"2019-03-09T08:20:12+00:00\",\"dateModified\":\"2020-05-30T23:43:43+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Fotolia_59066357_M.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/Fotolia_59066357_M.jpg\",\"width\":1628,\"height\":1167},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/achieving-the-web-applications-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Achieving The Web Applications Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.co.mz\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Achieving The Web Applications Security - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/","og_locale":"en_US","og_type":"article","og_title":"Achieving The Web Applications Security - MozDomains Blog","og_description":"Web applications play a critical role in half of all breaches that happen around the world. With all this going around for a while now, a meager of 10% of companies secure all their critical applications and have the applications reviewed on security stance before and during production. Of late, the need arises for the companies to be clear on their\u00a0web application security\u00a0agenda. There is a dire need to replace fragmented, manual pen testing with ongoing, automated scanning. By doing so, they can defend their global application infrastructures. And this would also do away with the need for hiring extra\u2026","og_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/","og_site_name":"MozDomains Blog","article_published_time":"2019-03-09T08:20:12+00:00","article_modified_time":"2020-05-30T23:43:43+00:00","og_image":[{"width":1628,"height":1167,"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/Fotolia_59066357_M.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"Achieving The Web Applications Security","datePublished":"2019-03-09T08:20:12+00:00","dateModified":"2020-05-30T23:43:43+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/"},"wordCount":599,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/Fotolia_59066357_M.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/","name":"Achieving The Web Applications Security - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/Fotolia_59066357_M.jpg","datePublished":"2019-03-09T08:20:12+00:00","dateModified":"2020-05-30T23:43:43+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/#primaryimage","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/Fotolia_59066357_M.jpg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/Fotolia_59066357_M.jpg","width":1628,"height":1167},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/achieving-the-web-applications-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.co.mz\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"Achieving The Web Applications Security"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.co.mz\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.co.mz","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/comments?post=129"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/129\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media\/130"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media?parent=129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/categories?post=129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/tags?post=129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}