{"id":6257,"date":"2016-09-04T12:59:29","date_gmt":"2016-09-04T12:59:29","guid":{"rendered":"http:\/\/beginfromhere.com\/site\/?p=6257"},"modified":"2016-09-18T05:03:38","modified_gmt":"2016-09-18T05:03:38","slug":"top-5-genius-hackers-who-wrote-the-history","status":"publish","type":"post","link":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/","title":{"rendered":"Top 5 Genius Hackers Who Wrote the History"},"content":{"rendered":"<p>In our list, we are exhibiting the 5 most well known individuals, which can be portrayed as a programmer. They entered either in PC or phone frameworks and utilized these frameworks as indicated by their own desires, because of their insight and specialized aptitudes.<\/p>\n<h2>1. Steve Wozniak<\/h2>\n<p><a href=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"6258\" data-permalink=\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/attachment\/441\/\" data-orig-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441.jpg?fit=597%2C350&amp;ssl=1\" data-orig-size=\"597,350\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"441\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441.jpg?fit=300%2C176&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441.jpg?fit=597%2C350&amp;ssl=1\" class=\"alignnone size-medium wp-image-6258\" src=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-300x176.jpg?resize=300%2C176\" alt=\"441\" width=\"300\" height=\"176\" srcset=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441.jpg?resize=300%2C176&amp;ssl=1 300w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441.jpg?resize=150%2C88&amp;ssl=1 150w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441.jpg?w=597&amp;ssl=1 597w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Wozniak is a contemporary of John Draper and knew phreaking too. After Draper distributed on a PC club meeting the points of interest of his Blue Box, Wozniak fabricated his own form.<\/p>\n<p>Steve Jobs perceived the business sector capability of the gadget and the two Steves began their first organization. From the offer of Wozniak HP mini-computers they sufficiently increased income to assemble the Apple I.<\/p>\n<h2>2. Mark \u201cPhiberOptik\u201d Abene<\/h2>\n<p><a href=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"6259\" data-permalink=\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/10520911_482041731937072_8400296630169410681_n\/\" data-orig-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n.jpg?fit=604%2C403&amp;ssl=1\" data-orig-size=\"604,403\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"10520911_482041731937072_8400296630169410681_n\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n.jpg?fit=300%2C200&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n.jpg?fit=604%2C403&amp;ssl=1\" class=\"alignnone size-medium wp-image-6259\" src=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n-300x200.jpg?resize=300%2C200\" alt=\"10520911_482041731937072_8400296630169410681_n\" width=\"300\" height=\"200\" srcset=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n.jpg?resize=150%2C100&amp;ssl=1 150w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n.jpg?w=604&amp;ssl=1 604w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Most PCs specialists presumably know Mark Abene,. He had the telephone organization AT &amp;T. As an individual from the programmer bunch Masters of Deception Abene played frequently around at the AT and T frameworks.<\/p>\n<p>Through his hacking abilities, he slammed the AT&amp; T framework and 60,000 clients stayed without a telephone for around 9 hours, Abene was immediately recognized as the offender. The Secret Service seized his hardware. AT and T needed to later concede that the accident was because of a blunder. By the by, Abene was sentenced and arrived for a year in jail.He was the principal programmer who was confined.<\/p>\n<h2>3. Kevin \u201cDark Dante\u201d Poulsen<\/h2>\n<p><a href=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/14192656_10153849862953779_5888064331901116609_n.png\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"6260\" data-permalink=\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/14192656_10153849862953779_5888064331901116609_n\/\" data-orig-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/14192656_10153849862953779_5888064331901116609_n.png?fit=863%2C648&amp;ssl=1\" data-orig-size=\"863,648\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"14192656_10153849862953779_5888064331901116609_n\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/14192656_10153849862953779_5888064331901116609_n.png?fit=300%2C225&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/14192656_10153849862953779_5888064331901116609_n.png?fit=800%2C601&amp;ssl=1\" class=\"alignnone size-medium wp-image-6260\" src=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/14192656_10153849862953779_5888064331901116609_n-300x225.png?resize=300%2C225\" alt=\"14192656_10153849862953779_5888064331901116609_n\" width=\"300\" height=\"225\" srcset=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/14192656_10153849862953779_5888064331901116609_n.png?resize=300%2C225&amp;ssl=1 300w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/14192656_10153849862953779_5888064331901116609_n.png?resize=768%2C577&amp;ssl=1 768w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/14192656_10153849862953779_5888064331901116609_n.png?resize=150%2C113&amp;ssl=1 150w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/14192656_10153849862953779_5888064331901116609_n.png?w=863&amp;ssl=1 863w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Poulsen drove by one of the coolest hacks ever. All the radio lines of L.A radio station KIIS-FM. This radio station guaranteed the 102nd guest of the project would win a Porsche 944 S2.<\/p>\n<p>Poulsen assumed control over all phone lines and the transmitter and therefore guaranteed that his call was the right one. The phone line went out later on amid the communicate.<\/p>\n<p>Later, he remained in isolation and was needed by the FBI. He even arrived in the American alleged unsolved &#8220;Record number XY \u2026 unsolved.&#8221; . 1991 Poulsen will be taken into custody for further judgment and various offenses against him conceded.<\/p>\n<p>Later he made a 180-degree turn and worked for the clarification of numerous PC wrongdoings.<\/p>\n<h2>4. Richard Stallman<\/h2>\n<p><a href=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"6262\" data-permalink=\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/441-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?fit=1200%2C1200&amp;ssl=1\" data-orig-size=\"1200,1200\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"441\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?fit=300%2C300&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?fit=800%2C800&amp;ssl=1\" class=\"alignnone size-medium wp-image-6262\" src=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1-300x300.jpg?resize=300%2C300\" alt=\"441\" width=\"300\" height=\"300\" srcset=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?resize=300%2C300&amp;ssl=1 300w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?resize=150%2C150&amp;ssl=1 150w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?resize=768%2C768&amp;ssl=1 768w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?resize=1024%2C1024&amp;ssl=1 1024w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?resize=50%2C50&amp;ssl=1 50w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?resize=144%2C144&amp;ssl=1 144w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?resize=900%2C900&amp;ssl=1 900w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/441-1.jpg?w=1200&amp;ssl=1 1200w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Stallman was an understudy and developer at the MIT Artificial Intelligence Lab. He was at that point open source and countered at MIT against the confinement of PC use in the lab. In the college a secret word ensured PC framework was set up for understudies. He unscrambled the passwords and sent to the clients in plain content, and proposed to surrender the secret key to again later on to empower unknown access.<\/p>\n<p>Later Stallman built up the GPL General Public License and the GNU working framework, a totally free Unix framework.<\/p>\n<h2>5. Linus Torvalds<\/h2>\n<p><a href=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n-1.jpg\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" data-attachment-id=\"6261\" data-permalink=\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/10520911_482041731937072_8400296630169410681_n-2\/\" data-orig-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n-1.jpg?fit=618%2C361&amp;ssl=1\" data-orig-size=\"618,361\" data-comments-opened=\"0\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"10520911_482041731937072_8400296630169410681_n\" data-image-description=\"\" data-image-caption=\"\" data-medium-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n-1.jpg?fit=300%2C175&amp;ssl=1\" data-large-file=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n-1.jpg?fit=618%2C361&amp;ssl=1\" class=\"alignnone size-medium wp-image-6261\" src=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n-1-300x175.jpg?resize=300%2C175\" alt=\"10520911_482041731937072_8400296630169410681_n\" width=\"300\" height=\"175\" srcset=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n-1.jpg?resize=300%2C175&amp;ssl=1 300w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n-1.jpg?resize=150%2C88&amp;ssl=1 150w, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/10520911_482041731937072_8400296630169410681_n-1.jpg?w=618&amp;ssl=1 618w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n<p>Linus Torvalds started his hacking vocation on an old Commodore VIC-20 and the Sinclair QL, which he enormously made strides. On the QL, he modified his own particular Text Editor and even a Pac-Man clone named Cool Man.<\/p>\n<p>In 1991, he got hold of an Intel 80386 PC and began chipping away at Linux, which he initially distributed under its own particular permit, yet later, under the GNU GPL. He was the central power behind the advancement of Linux Kernel.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In our list, we are exhibiting the 5 most well known individuals, which can be portrayed as a programmer. They<\/p>\n","protected":false},"author":2980,"featured_media":6326,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[43],"tags":[4,375,378,380,377,379,376],"class_list":["post-6257","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-programming-2","tag-begin-from-here","tag-hackers","tag-kevin-dark-dante-poulsen","tag-linus-torvalds","tag-phiberoptik","tag-richard-stallman","tag-steve-wozniak"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 5 Genius Hackers Who Wrote the History - begin from here<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Genius Hackers Who Wrote the History - begin from here\" \/>\n<meta property=\"og:description\" content=\"In our list, we are exhibiting the 5 most well known individuals, which can be portrayed as a programmer. They\" \/>\n<meta property=\"og:url\" content=\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/\" \/>\n<meta property=\"og:site_name\" content=\"begin from here\" \/>\n<meta property=\"article:published_time\" content=\"2016-09-04T12:59:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-09-18T05:03:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"519\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"zed_prod\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"zed_prod\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/\"},\"author\":{\"name\":\"zed_prod\",\"@id\":\"https:\/\/beginfromhere.com\/site\/#\/schema\/person\/c6c202f05ccf4b8f48f343ba58f104fc\"},\"headline\":\"Top 5 Genius Hackers Who Wrote the History\",\"datePublished\":\"2016-09-04T12:59:29+00:00\",\"dateModified\":\"2016-09-18T05:03:38+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/\"},\"wordCount\":520,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1\",\"keywords\":[\"begin from here\",\"hackers\",\"Kevin \u201cDark Dante\u201d Poulsen\",\"Linus Torvalds\",\"PhiberOptik\",\"Richard Stallman\",\"Steve Wozniak\"],\"articleSection\":[\"Programming\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/\",\"url\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/\",\"name\":\"Top 5 Genius Hackers Who Wrote the History - begin from here\",\"isPartOf\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1\",\"datePublished\":\"2016-09-04T12:59:29+00:00\",\"dateModified\":\"2016-09-18T05:03:38+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1\",\"width\":900,\"height\":519,\"caption\":\"Top 5 hackers in the world\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/beginfromhere.com\/site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 5 Genius Hackers Who Wrote the History\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/beginfromhere.com\/site\/#website\",\"url\":\"https:\/\/beginfromhere.com\/site\/\",\"name\":\"BeginFromHere\",\"description\":\"Begin From Here\",\"publisher\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/beginfromhere.com\/site\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/beginfromhere.com\/site\/#organization\",\"name\":\"Begin From Here\",\"url\":\"https:\/\/beginfromhere.com\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beginfromhere.com\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/06\/cropped-logo-begin-from-here-square.jpg?fit=512%2C512&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/06\/cropped-logo-begin-from-here-square.jpg?fit=512%2C512&ssl=1\",\"width\":512,\"height\":512,\"caption\":\"Begin From Here\"},\"image\":{\"@id\":\"https:\/\/beginfromhere.com\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.instagram.com\/beginfromhere\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/beginfromhere.com\/site\/#\/schema\/person\/c6c202f05ccf4b8f48f343ba58f104fc\",\"name\":\"zed_prod\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/beginfromhere.com\/site\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e30a6ce18217db3a3115abb318b08e6e331b4ebfc8fd13802c20e96c89a6f02a?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e30a6ce18217db3a3115abb318b08e6e331b4ebfc8fd13802c20e96c89a6f02a?s=96&d=identicon&r=g\",\"caption\":\"zed_prod\"},\"url\":\"https:\/\/beginfromhere.com\/site\/author\/zed_prod\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Genius Hackers Who Wrote the History - begin from here","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Genius Hackers Who Wrote the History - begin from here","og_description":"In our list, we are exhibiting the 5 most well known individuals, which can be portrayed as a programmer. They","og_url":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/","og_site_name":"begin from here","article_published_time":"2016-09-04T12:59:29+00:00","article_modified_time":"2016-09-18T05:03:38+00:00","og_image":[{"width":900,"height":519,"url":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1","type":"image\/jpeg"}],"author":"zed_prod","twitter_card":"summary_large_image","twitter_misc":{"Written by":"zed_prod","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#article","isPartOf":{"@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/"},"author":{"name":"zed_prod","@id":"https:\/\/beginfromhere.com\/site\/#\/schema\/person\/c6c202f05ccf4b8f48f343ba58f104fc"},"headline":"Top 5 Genius Hackers Who Wrote the History","datePublished":"2016-09-04T12:59:29+00:00","dateModified":"2016-09-18T05:03:38+00:00","mainEntityOfPage":{"@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/"},"wordCount":520,"commentCount":2,"publisher":{"@id":"https:\/\/beginfromhere.com\/site\/#organization"},"image":{"@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1","keywords":["begin from here","hackers","Kevin \u201cDark Dante\u201d Poulsen","Linus Torvalds","PhiberOptik","Richard Stallman","Steve Wozniak"],"articleSection":["Programming"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/","url":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/","name":"Top 5 Genius Hackers Who Wrote the History - begin from here","isPartOf":{"@id":"https:\/\/beginfromhere.com\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#primaryimage"},"image":{"@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1","datePublished":"2016-09-04T12:59:29+00:00","dateModified":"2016-09-18T05:03:38+00:00","breadcrumb":{"@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#primaryimage","url":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1","contentUrl":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1","width":900,"height":519,"caption":"Top 5 hackers in the world"},{"@type":"BreadcrumbList","@id":"https:\/\/beginfromhere.com\/site\/top-5-genius-hackers-who-wrote-the-history\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/beginfromhere.com\/site\/"},{"@type":"ListItem","position":2,"name":"Top 5 Genius Hackers Who Wrote the History"}]},{"@type":"WebSite","@id":"https:\/\/beginfromhere.com\/site\/#website","url":"https:\/\/beginfromhere.com\/site\/","name":"BeginFromHere","description":"Begin From Here","publisher":{"@id":"https:\/\/beginfromhere.com\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/beginfromhere.com\/site\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/beginfromhere.com\/site\/#organization","name":"Begin From Here","url":"https:\/\/beginfromhere.com\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beginfromhere.com\/site\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/06\/cropped-logo-begin-from-here-square.jpg?fit=512%2C512&ssl=1","contentUrl":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/06\/cropped-logo-begin-from-here-square.jpg?fit=512%2C512&ssl=1","width":512,"height":512,"caption":"Begin From Here"},"image":{"@id":"https:\/\/beginfromhere.com\/site\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.instagram.com\/beginfromhere\/"]},{"@type":"Person","@id":"https:\/\/beginfromhere.com\/site\/#\/schema\/person\/c6c202f05ccf4b8f48f343ba58f104fc","name":"zed_prod","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/beginfromhere.com\/site\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e30a6ce18217db3a3115abb318b08e6e331b4ebfc8fd13802c20e96c89a6f02a?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e30a6ce18217db3a3115abb318b08e6e331b4ebfc8fd13802c20e96c89a6f02a?s=96&d=identicon&r=g","caption":"zed_prod"},"url":"https:\/\/beginfromhere.com\/site\/author\/zed_prod\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_top-5-hackers.jpg?fit=900%2C519&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p7FJuH-1CV","jetpack-related-posts":[{"id":7411,"url":"https:\/\/beginfromhere.com\/site\/how-to-protect-your-website-from-attacks\/","url_meta":{"origin":6257,"position":0},"title":"How To Protect Your Website From Attacks ?","author":"Nina Redstone","date":"October 15, 2016","format":false,"excerpt":"Just because you have a good service provider, doesn't mean you won't get hacked. Web security is something you should be always think about. Begin from here with these steps, they are easy, free and they don't take time. 1.Make your access control harder The admin level of your website\u2026","rel":"","context":"In &quot;Build your website&quot;","block_context":{"text":"Build your website","link":"https:\/\/beginfromhere.com\/site\/category\/build-your-website\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/10\/How-To-Protect-Your-Website-From-Attacks.jpg?fit=900%2C504&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/10\/How-To-Protect-Your-Website-From-Attacks.jpg?fit=900%2C504&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/10\/How-To-Protect-Your-Website-From-Attacks.jpg?fit=900%2C504&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/10\/How-To-Protect-Your-Website-From-Attacks.jpg?fit=900%2C504&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6162,"url":"https:\/\/beginfromhere.com\/site\/a-new-eye-on-the-middle-ear\/","url_meta":{"origin":6257,"position":1},"title":"A new eye on the middle ear","author":"zed_prod","date":"August 29, 2016","format":"image","excerpt":"\u00a0 Another gadget created by analysts at MIT and a doctor at Connecticut Children's Medical Center could enormously enhance specialists' capacity to precisely analyze ear contamination. That could definitely decrease the assessed 2 million cases for each year in the United States where such diseases are erroneously analyzed and superfluous\u2026","rel":"","context":"In &quot;health&quot;","block_context":{"text":"health","link":"https:\/\/beginfromhere.com\/site\/category\/health\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/08\/A-new-eye-on-the-middle-ear1.jpg?fit=800%2C445&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/08\/A-new-eye-on-the-middle-ear1.jpg?fit=800%2C445&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/08\/A-new-eye-on-the-middle-ear1.jpg?fit=800%2C445&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/08\/A-new-eye-on-the-middle-ear1.jpg?fit=800%2C445&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":7187,"url":"https:\/\/beginfromhere.com\/site\/top-6-new-halloween-apps-for-android-and-ios\/","url_meta":{"origin":6257,"position":2},"title":"Top 6 New Halloween Apps for Android and iOS","author":"Richard Heath","date":"October 15, 2016","format":false,"excerpt":"The Halloween\u00a0holidays have come and when\u00a0everyone is busy\u00a0with\u00a0costume\u00a0parties and coming back home to their families, you can't have enough time to play on your\u00a0PC or on your gaming console,\u00a0so you may want to play games while\u00a0you're traveling or when your\u00a0on spare time. In this article i picked up\u00a06\u00a0high quality mobile\u00a0games\u00a0that\u2026","rel":"","context":"In &quot;Android&quot;","block_context":{"text":"Android","link":"https:\/\/beginfromhere.com\/site\/category\/applications\/mobile\/android\/"},"img":{"alt_text":"happy haloween","src":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/10\/FeaturedPhoto_Haloween.jpg?fit=900%2C504&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/10\/FeaturedPhoto_Haloween.jpg?fit=900%2C504&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/10\/FeaturedPhoto_Haloween.jpg?fit=900%2C504&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/10\/FeaturedPhoto_Haloween.jpg?fit=900%2C504&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":7823,"url":"https:\/\/beginfromhere.com\/site\/10-top-websites-to-shop-on-for-cyber-monday-2016\/","url_meta":{"origin":6257,"position":3},"title":"10 Top Websites to Shop on for Cyber Monday 2016","author":"Nina Redstone","date":"November 25, 2016","format":false,"excerpt":"Cyber Monda is on November 28th in the United States, and its time to get the best deals with our list of the top websites\u00a0 stores) to shop from. 1-Deal Genius Daily deal sites might not be at the top of your list of priorities come Cyber Monday shopping, but\u2026","rel":"","context":"In &quot;Marketing&quot;","block_context":{"text":"Marketing","link":"https:\/\/beginfromhere.com\/site\/category\/marketing\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/11\/Cover-MBA-Programs-in-the-U.jpg?fit=900%2C504&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/11\/Cover-MBA-Programs-in-the-U.jpg?fit=900%2C504&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/11\/Cover-MBA-Programs-in-the-U.jpg?fit=900%2C504&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/11\/Cover-MBA-Programs-in-the-U.jpg?fit=900%2C504&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":6474,"url":"https:\/\/beginfromhere.com\/site\/top-10-educational-android-apps\/","url_meta":{"origin":6257,"position":4},"title":"Top 10 Educational Android Apps","author":"Richard Heath","date":"September 23, 2016","format":false,"excerpt":"If you are a student, emloyee, or whatever you do in life, these free apps will help you to be better at what you do. Duolingo Duolingo is a free app that helps you learn any language you want in a quick and easy way. It is one of the\u2026","rel":"","context":"In &quot;Android&quot;","block_context":{"text":"Android","link":"https:\/\/beginfromhere.com\/site\/category\/applications\/mobile\/android\/"},"img":{"alt_text":"Top 10 Educational Android Apps","src":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_Top_10_Educational_Android_Apps.jpg?fit=900%2C519&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_Top_10_Educational_Android_Apps.jpg?fit=900%2C519&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_Top_10_Educational_Android_Apps.jpg?fit=900%2C519&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/09\/bfh_Top_10_Educational_Android_Apps.jpg?fit=900%2C519&ssl=1&resize=700%2C400 2x"},"classes":[]},{"id":5558,"url":"https:\/\/beginfromhere.com\/site\/5-steps-to-learn-english-and-for-free\/","url_meta":{"origin":6257,"position":5},"title":"5 steps to learn English and for FREE","author":"David Brindson","date":"July 15, 2016","format":false,"excerpt":"Hello, Are you like millions of people who are trying to find a free way to learn English? Let me help you find the right online place to begin, and make the mission easy i have created 5 essential step for you to follows. There are so many websites where\u2026","rel":"","context":"In &quot;English&quot;","block_context":{"text":"English","link":"https:\/\/beginfromhere.com\/site\/category\/learning\/english\/"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/07\/BestWayToLearnEnglishForFree.jpg?fit=1178%2C590&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/07\/BestWayToLearnEnglishForFree.jpg?fit=1178%2C590&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/07\/BestWayToLearnEnglishForFree.jpg?fit=1178%2C590&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/07\/BestWayToLearnEnglishForFree.jpg?fit=1178%2C590&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/beginfromhere.com\/site\/wp-content\/uploads\/2016\/07\/BestWayToLearnEnglishForFree.jpg?fit=1178%2C590&ssl=1&resize=1050%2C600 3x"},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/posts\/6257","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/users\/2980"}],"replies":[{"embeddable":true,"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/comments?post=6257"}],"version-history":[{"count":3,"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/posts\/6257\/revisions"}],"predecessor-version":[{"id":6327,"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/posts\/6257\/revisions\/6327"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/media\/6326"}],"wp:attachment":[{"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/media?parent=6257"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/categories?post=6257"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/beginfromhere.com\/site\/wp-json\/wp\/v2\/tags?post=6257"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}