{"id":1,"name":"admini","url":"http:\/\/198.71.63.42\/blog","description":"","link":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/author\/admini\/","slug":"admini","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/2a29e3f6682c386302bc23751d39b21be750e5485e155e8d09b9a615ffd36e9a?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/2a29e3f6682c386302bc23751d39b21be750e5485e155e8d09b9a615ffd36e9a?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/2a29e3f6682c386302bc23751d39b21be750e5485e155e8d09b9a615ffd36e9a?s=96&d=mm&r=g","128":"https:\/\/secure.gravatar.com\/avatar\/2a29e3f6682c386302bc23751d39b21be750e5485e155e8d09b9a615ffd36e9a?s=128&d=mm&r=g"},"meta":[],"_links":{"self":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users\/1","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecurityinstitute.com\/blog\/index.php\/wp-json\/wp\/v2\/users"}]}}