{"id":307,"date":"2024-10-11T08:29:43","date_gmt":"2024-10-11T08:29:43","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/?page_id=307"},"modified":"2024-10-11T21:44:42","modified_gmt":"2024-10-11T21:44:42","slug":"ethical-manipulation-and-protection","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/sample-page-2\/skills-2\/ethical-manipulation-and-protection\/","title":{"rendered":"Ethical Manipulation and Protection"},"content":{"rendered":"\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2024\/10\/SGiorgi-CYSE-301-Assignment-4.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of SGiorgi-CYSE-301-Assignment-4.\"><\/object><a id=\"wp-block-file--media-5e8a7695-ec9b-4377-9df3-bb991248f3f3\" href=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2024\/10\/SGiorgi-CYSE-301-Assignment-4.pdf\">SGiorgi-CYSE-301-Assignment-4<\/a><\/div>\n\n\n\n<div data-wp-interactive=\"\" class=\"wp-block-file\"><object data-wp-bind--hidden=\"!selectors.core.file.hasPdfPreview\" hidden class=\"wp-block-file__embed\" data=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2024\/10\/Assignment-6-Digital-Steganography-1.pdf\" type=\"application\/pdf\" style=\"width:100%;height:600px\" aria-label=\"Embed of Assignment-6-Digital-Steganography-1.\"><\/object><a id=\"wp-block-file--media-83893d15-5c1a-4d3e-a584-6aaf430678ac\" href=\"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-content\/uploads\/sites\/30494\/2024\/10\/Assignment-6-Digital-Steganography-1.pdf\">Assignment-6-Digital-Steganography-1<\/a><\/div>\n\n\n\n<p><a href=\"https:\/\/drive.google.com\/file\/d\/1ZAYvBLv4otW9Sov5BDtdUSZKgoewzhfn\/view?usp=drive_link\" data-type=\"link\" data-id=\"https:\/\/drive.google.com\/file\/d\/1ZAYvBLv4otW9Sov5BDtdUSZKgoewzhfn\/view?usp=drive_link\">Password Cracking (File too large for site)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Password Cracking (File too large for site)<\/p>\n","protected":false},"author":24556,"featured_media":0,"parent":218,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/pages\/307"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/users\/24556"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":5,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/pages\/307\/revisions"}],"predecessor-version":[{"id":340,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/pages\/307\/revisions\/340"}],"up":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/pages\/218"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/stephen-giorgi1\/wp-json\/wp\/v2\/media?parent=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}