{"id":94,"date":"2019-03-08T22:57:48","date_gmt":"2019-03-08T20:57:48","guid":{"rendered":"https:\/\/www.mozdomains.com\/blog\/en\/?p=94"},"modified":"2020-05-31T01:40:09","modified_gmt":"2020-05-30T23:40:09","slug":"what-is-session-hijacking","status":"publish","type":"post","link":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/","title":{"rendered":"What is Session Hijacking?"},"content":{"rendered":"<p style=\"text-align: justify;\">In the computer world, a session refers to the temporary interaction between a user and the website. In other words, the in-between time of the log-in and log-off during the operation of an account is called a session.<\/p>\n<p style=\"text-align: justify;\">Session hijacking happens when online criminal places himself in between the\u00a0 computer and the website\u2019s server without revealing the identity to both endpoints gains access to information by impersonating.<\/p>\n<p style=\"text-align: justify;\">At this juncture, the intruder monitors and tries to capture everything from the online user&#8217;s account. Sometimes, they take full control of the connection and even neutralize the legitimate user by denying them access to their own account.<\/p>\n<p style=\"text-align: justify;\">During session hijacking, a hacker simply enters the server and accesses the info without the need to use a registered account. Besides these activities, the hacker may also make changes to the existing codes, modify server settings or install new programs that will support to steal valuable data and provide back-door entry whenever it is required.<\/p>\n<p style=\"text-align: justify;\"><strong>How Does Session Hijacking Works?<\/strong><\/p>\n<p style=\"text-align: justify;\">Technically, the\u00a0<strong>HTTP communication<\/strong>\u00a0uses many TCP connections, thereby, it becomes mandatory for the server to recognize every user\u2019s connections with the help of a specific method. The most common one in use is the authentication process, once it is completed the server forwards a token to the client browser. The token is formed of a set of variable width and it could be used in different ways \u2013 say like, in the header of HTTP requisition as a cookie, in other parts of the header of the HTTP request, in the body of the HTTP requisition or in the URL. The hacker exploits the session token by robbing or predicting a valid session token to gain an unofficial access to the web server. The session token compromising can happen in different ways.<\/p>\n<p style=\"text-align: justify;\">In layman terms, the hacker without revealing the true identity tactfully enters the conversation and gains access to key information which is being communicated.\u00a0 After taking control, the hacker has the ability to intercept, send and receive information without the knowledge of the sender and receiver.\u00a0<strong>Session Hijacking<\/strong>\u00a0happen two ways and, they are:<\/p>\n<p style=\"text-align: justify;\"><strong>Different Ways Of Session Hijacking<\/strong><\/p>\n<p style=\"text-align: justify;\"><strong>Session Sniffing<\/strong><\/p>\n<p style=\"text-align: justify;\">As mentioned above, the tokens help the hacker to intrude in a valid session. So, the online attacker first gets the session id. Sniffing is also known as Packet Sniffing is used to get the session id. When this is accomplished, the gains full unauthorized access to the web server.<\/p>\n<p style=\"text-align: justify;\">\u00a0<strong>The Cross-Site Script Attack<\/strong><\/p>\n<p style=\"text-align: justify;\">For a hacker, the\u00a0<strong>cross-site script attack<\/strong>\u00a0is the best way to acquire a session id without running any malicious codes or script from the client side.\u00a0 The victim is not targeted directly, however, the online fraudster compromises the weak points on the website and uses it to deliver a malicious script to the victim\u2019s browser.<\/p>\n<p style=\"text-align: justify;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-95 size-full\" src=\"https:\/\/www.mozdomains.com\/blog\/en\/wp-content\/uploads\/2019\/03\/download.png\" alt=\"\" width=\"771\" height=\"331\" srcset=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/download.png 771w, https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/download-300x129.png 300w, https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/download-768x330.png 768w\" sizes=\"auto, (max-width: 771px) 100vw, 771px\" \/><\/p>\n<p style=\"text-align: justify;\"><strong>Tips To Prevent Session Hijacking<\/strong><\/p>\n<p style=\"text-align: justify;\">Usually, a session hijacking attacker steals the session id with the help of a malicious code on the client website. Thereby, it is essential to enable the protection from the client side. Few preventive methods up ahead the road can help steer clear of all the dangers. Installing robust antivirus, anti-malware software, helps a lot, at the same time remember to keep the existing software up to date.<\/p>\n<p style=\"text-align: justify;\">The latest technique makes use of an engine that fingerprints all requests of a session. Besides tracking the IP address and SSL session id, it also keeps a record of the HTTP headers. Any change in the header adds penalty points to the session and the session gets canceled when the points surpass a definite limit. Not worry, the limit can be configured. This is sufficient enough to tackle the situation because when the intrusion happens, it will have a different HTTP header order.<\/p>\n<p style=\"text-align: justify;\"><strong>How cWatch Can Prevent Session Hijacking<\/strong><\/p>\n<p style=\"text-align: justify;\">Comodo cWatch delivers Managed Security Service to protect websites and its applications by integrating Web Application Firewall (WAF) over a Secure Content Delivery Network (CDN). The Comodo Security Operations Center (CSOC) identifies threats and unknown files and analyses them and then performs the necessary actions. It provides continuous\u00a0<a href=\"https:\/\/cwatch.comodo.com\/\">24\/7 website surveillance<\/a>\u2013 an effective approach to prevent a range of hacking attempts like session hijacking, session sniffing, and from other suspicious threats from entering the websites.<\/p>\n<p style=\"text-align: justify;\">It ensures real-time web traffic monitoring and incident identification and hence prevents session hijacking \u2013 where the hacker attempts to impose an attack through active computer sessions.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In the computer world, a session refers to the temporary interaction between a user and the website. In other words, the in-between time of the log-in and log-off during the operation of an account is called a session. Session hijacking happens when online criminal places himself in between the\u00a0 computer and the website\u2019s server without revealing the identity to both endpoints gains access to information by impersonating. At this juncture, the intruder monitors and tries to capture everything from the online user&#8217;s account. Sometimes, they take full control of the connection and even neutralize the legitimate user by denying them\u2026<\/p>\n","protected":false},"author":3,"featured_media":96,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":["post-94","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"blocksy_meta":{"styles_descriptor":{"styles":{"desktop":"","tablet":"","mobile":""},"google_fonts":[],"version":5}},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Session Hijacking? - MozDomains Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Session Hijacking? - MozDomains Blog\" \/>\n<meta property=\"og:description\" content=\"In the computer world, a session refers to the temporary interaction between a user and the website. In other words, the in-between time of the log-in and log-off during the operation of an account is called a session. Session hijacking happens when online criminal places himself in between the\u00a0 computer and the website\u2019s server without revealing the identity to both endpoints gains access to information by impersonating. At this juncture, the intruder monitors and tries to capture everything from the online user&#8217;s account. Sometimes, they take full control of the connection and even neutralize the legitimate user by denying them\u2026\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/\" \/>\n<meta property=\"og:site_name\" content=\"MozDomains Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-03-08T20:57:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-30T23:40:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/476620-636269207211688564-16x9.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Momed Jussub\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Momed Jussub\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/\"},\"author\":{\"name\":\"Momed Jussub\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\"},\"headline\":\"What is Session Hijacking?\",\"datePublished\":\"2019-03-08T20:57:48+00:00\",\"dateModified\":\"2020-05-30T23:40:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/\"},\"wordCount\":740,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/476620-636269207211688564-16x9.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/\",\"name\":\"What is Session Hijacking? - MozDomains Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/476620-636269207211688564-16x9.jpg\",\"datePublished\":\"2019-03-08T20:57:48+00:00\",\"dateModified\":\"2020-05-30T23:40:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/476620-636269207211688564-16x9.jpg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/476620-636269207211688564-16x9.jpg\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/website-security\\\/what-is-session-hijacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Session Hijacking?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"name\":\"MozDomains Blog\",\"description\":\"Tutorials and Tips\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#organization\",\"name\":\"MozDomains Blog\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"contentUrl\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/wp-content\\\/uploads\\\/2021\\\/05\\\/mozdomains-logo.svg\",\"caption\":\"MozDomains Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/#\\\/schema\\\/person\\\/53ab8153fe48257d7e1210e28064b6e6\",\"name\":\"Momed Jussub\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g\",\"caption\":\"Momed Jussub\"},\"description\":\"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \\\/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.\",\"sameAs\":[\"https:\\\/\\\/www.mozdomains.co.mz\",\"http:\\\/\\\/instagram.com\\\/momedjussub\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/momedjussub\"],\"url\":\"https:\\\/\\\/www.mozdomains.co.mz\\\/blog\\\/en\\\/author\\\/momed-jussub\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Session Hijacking? - MozDomains Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/","og_locale":"en_US","og_type":"article","og_title":"What is Session Hijacking? - MozDomains Blog","og_description":"In the computer world, a session refers to the temporary interaction between a user and the website. In other words, the in-between time of the log-in and log-off during the operation of an account is called a session. Session hijacking happens when online criminal places himself in between the\u00a0 computer and the website\u2019s server without revealing the identity to both endpoints gains access to information by impersonating. At this juncture, the intruder monitors and tries to capture everything from the online user&#8217;s account. Sometimes, they take full control of the connection and even neutralize the legitimate user by denying them\u2026","og_url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/","og_site_name":"MozDomains Blog","article_published_time":"2019-03-08T20:57:48+00:00","article_modified_time":"2020-05-30T23:40:09+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/476620-636269207211688564-16x9.jpg","type":"image\/jpeg"}],"author":"Momed Jussub","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Momed Jussub","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/#article","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/"},"author":{"name":"Momed Jussub","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6"},"headline":"What is Session Hijacking?","datePublished":"2019-03-08T20:57:48+00:00","dateModified":"2020-05-30T23:40:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/"},"wordCount":740,"commentCount":0,"publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/476620-636269207211688564-16x9.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/","name":"What is Session Hijacking? - MozDomains Blog","isPartOf":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/#primaryimage"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/476620-636269207211688564-16x9.jpg","datePublished":"2019-03-08T20:57:48+00:00","dateModified":"2020-05-30T23:40:09+00:00","breadcrumb":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/#primaryimage","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/476620-636269207211688564-16x9.jpg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2019\/03\/476620-636269207211688564-16x9.jpg","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/website-security\/what-is-session-hijacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mozdomains.co.mz\/blog\/en\/"},{"@type":"ListItem","position":2,"name":"What is Session Hijacking?"}]},{"@type":"WebSite","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#website","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","name":"MozDomains Blog","description":"Tutorials and Tips","publisher":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mozdomains.co.mz\/blog\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#organization","name":"MozDomains Blog","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","contentUrl":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-content\/uploads\/2021\/05\/mozdomains-logo.svg","caption":"MozDomains Blog"},"image":{"@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.mozdomains.co.mz\/blog\/en\/#\/schema\/person\/53ab8153fe48257d7e1210e28064b6e6","name":"Momed Jussub","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fce591b84b6638bb4c5ae8975e5c2046f67170c09684919a68970367459d9fae?s=96&d=mm&r=g","caption":"Momed Jussub"},"description":"Network Engineer (Cisco, Mikrotik, Juniper, Huawei, Ubiquiti, Fortigate, pfSense, Palo Alto), CCTV Engineer, IPTV Engineer, Virtualization Specialist OpenVZ, XEN, KVM and HyperV, Optical Fiber Network Specialist, System Administrator Windows \/Linux, PenTester, Full Stack Developer (HTML, CSS3, PHP, C # Desktop App, C # ASP.NET, MySQL, MSSQL) and Writer.","sameAs":["https:\/\/www.mozdomains.co.mz","http:\/\/instagram.com\/momedjussub","https:\/\/www.linkedin.com\/in\/momedjussub"],"url":"https:\/\/www.mozdomains.co.mz\/blog\/en\/author\/momed-jussub\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/94","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/comments?post=94"}],"version-history":[{"count":0,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/posts\/94\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media\/96"}],"wp:attachment":[{"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/media?parent=94"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/categories?post=94"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mozdomains.co.mz\/blog\/en\/wp-json\/wp\/v2\/tags?post=94"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}