{"id":323,"date":"2022-12-09T15:00:31","date_gmt":"2022-12-09T15:00:31","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/nir\/?p=323"},"modified":"2022-12-09T15:00:39","modified_gmt":"2022-12-09T15:00:39","slug":"journal-8","status":"publish","type":"post","link":"https:\/\/sites.wp.odu.edu\/nir\/2022\/12\/09\/journal-8\/","title":{"rendered":"Journal 8"},"content":{"rendered":"\n<p>After watching the video on hacking and cybersecurity and how it\u2019s portrayed in the movies, I have to say that it\u2019s laughable to say the least. While I\u2019ve never hacked anything before, I can safely say that hacking is not as glamorous as movies make it out to be. They make hackers in movies seem like they&#8217;re some sort of genius or computer god, typing away at the keyboard at lightning fast pace while outsmarting the enemy hackers. But in reality it usually plays out with a person sitting hunched over a keyboard typing away at a computer for hours trying to crack someone else&#8217;s password in the most exciting of scenarios. But most of the time the hackers in the real world are just script kiddies, downloading lines of code to cheat in a video game, or using social engineering tactics to gain the upper hand on individuals, who are not tech savvy to understand a real email from a false email.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>After watching the video on hacking and cybersecurity and how it\u2019s portrayed in the movies, I have to say that it\u2019s laughable to say the least. While I\u2019ve never hacked anything before, I can safely say that hacking is not as glamorous as movies make it out to be. They make hackers in movies seem&#8230; <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/nir\/2022\/12\/09\/journal-8\/\">Read More<\/a><\/div>\n","protected":false},"author":24833,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","wds_primary_category":0},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/posts\/323"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/users\/24833"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/comments?post=323"}],"version-history":[{"count":2,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/posts\/323\/revisions"}],"predecessor-version":[{"id":347,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/posts\/323\/revisions\/347"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/media?parent=323"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/categories?post=323"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/nir\/wp-json\/wp\/v2\/tags?post=323"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}