{"id":51982,"date":"2022-08-04T06:40:23","date_gmt":"2022-08-04T06:40:23","guid":{"rendered":"https:\/\/dbtut.com\/?p=51982"},"modified":"2022-08-04T06:41:07","modified_gmt":"2022-08-04T06:41:07","slug":"authorized_keys-linux","status":"publish","type":"post","link":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/","title":{"rendered":"Authorized_Keys Linux"},"content":{"rendered":"<p>In today&#8217;s article I will tell you about Authorized_Keys Linux.<\/p>\n<p>We said that everything in Linux consists of files, what are the authorities on these files, what kind of authorizations are there, and what permissions should we give when we create a new file? I will talk about them in this article.<\/p>\n<p>In Linux, we can use the ls -l command to view the contents and permissions of our files.<\/p>\n<p>For more details on the ls command<\/p>\n<p>In Linux, you can look at my ls -l list of files (ls command) in the directory.<\/p>\n<p>In Linux, there is also a basic job authorization.<\/p>\n<p>Read-Read(r) : Permission to view folder list and file content (read privilege)<\/p>\n<p>Write-Write(w) : Authorization required to make changes on file and folder (write authorization)<\/p>\n<p>Execute-Execute(x): Authorization required to run the file and access the folder (Execute authorization)<\/p>\n<p>Let&#8217;s see what we mentioned above by listing the files in the directory with the ls -l command.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkiler1.png\" \/><\/p>\n<p>As you can see in the picture above, we have two files. Let&#8217;s continue with the area marked in red.<\/p>\n<p>We see that our first file starts with \u201cd\u201d and the other with \u201c-\u201d. \u201cd\u201d indicates a directory. In order to examine the privileges in Linux, we need to divide them into groups of three and examine them over them.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkiler2.png\" \/><\/p>\n<p>In the picture above, we explained the \u201cd\u201d and \u201c-\u201d parameters. The red area gives information about the permissions for the frk user, the yellow area gives information about the group, the gray area gives information about the necessary permissions for other users.<\/p>\n<p>The area marked in red<br \/>\nFor the file, linuxogreniyorum means that the user can read, write, run.<\/p>\n<p>For linuxogrannytext, it means that the user cannot read, write, or execute.<\/p>\n<p>The area marked in yellow<\/p>\n<p>For the file, linuxogreniyorum means that the group can read, write, run.<\/p>\n<p>For linuxogrannytext, it means that the group cannot read, write, or execute.<\/p>\n<p>Area marked in gray<\/p>\n<p>linuxogreniyorum means that other users can read, write or run the file.<\/p>\n<p>For linuxogrannytext, it means that the user cannot read, write, or execute.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"http:\/\/www.farukerdem.com\/wp-content\/uploads\/2020\/12\/yetkiler3.png\" \/><\/p>\n<p>In the above picture, the part marked in blue is the group, the yellow marked the users, the gray marked the last modified information.<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_51982\" class=\"pvc_stats all  \" data-element-id=\"51982\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>In today&#8217;s article I will tell you about Authorized_Keys Linux. We said that everything in Linux consists of files, what are the authorities on these files, what kind of authorizations are there, and what permissions should we give when we create a new file? I will talk about them in this article. In Linux, we &hellip;<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_51982\" class=\"pvc_stats all  \" data-element-id=\"51982\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/dbtut.com\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":366,"featured_media":51986,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[299],"tags":[],"class_list":["post-51982","post","type-post","status-publish","format-standard","has-post-thumbnail","","category-linux"],"aioseo_notices":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Authorized_Keys Linux - Database Tutorials<\/title>\n<meta name=\"description\" content=\"In today&#039;s article I will tell you about Authorized_Keys Linux.We said that everything in Linux consists of files\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Authorized_Keys Linux - Database Tutorials\" \/>\n<meta property=\"og:description\" content=\"In today&#039;s article I will tell you about Authorized_Keys Linux.We said that everything in Linux consists of files\" \/>\n<meta property=\"og:url\" content=\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/\" \/>\n<meta property=\"og:site_name\" content=\"Database Tutorials\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-04T06:40:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-08-04T06:41:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png\" \/>\n\t<meta property=\"og:image:width\" content=\"685\" \/>\n\t<meta property=\"og:image:height\" content=\"387\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Faruk Erdem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Faruk Erdem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/\"},\"author\":{\"name\":\"Faruk Erdem\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/a7dfc5684c116e536b4e93ee214ccbfb\"},\"headline\":\"Authorized_Keys Linux\",\"datePublished\":\"2022-08-04T06:40:23+00:00\",\"dateModified\":\"2022-08-04T06:41:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/\"},\"wordCount\":377,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png\",\"articleSection\":[\"Linux\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/\",\"url\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/\",\"name\":\"Authorized_Keys Linux - Database Tutorials\",\"isPartOf\":{\"@id\":\"https:\/\/dbtut.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png\",\"datePublished\":\"2022-08-04T06:40:23+00:00\",\"dateModified\":\"2022-08-04T06:41:07+00:00\",\"description\":\"In today's article I will tell you about Authorized_Keys Linux.We said that everything in Linux consists of files\",\"breadcrumb\":{\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#primaryimage\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png\",\"width\":685,\"height\":387},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/dbtut.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Authorized_Keys Linux\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/dbtut.com\/#website\",\"url\":\"https:\/\/dbtut.com\/\",\"name\":\"Database Tutorials\",\"description\":\"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux\",\"publisher\":{\"@id\":\"https:\/\/dbtut.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/dbtut.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/dbtut.com\/#organization\",\"name\":\"dbtut\",\"url\":\"https:\/\/dbtut.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"contentUrl\":\"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg\",\"width\":223,\"height\":36,\"caption\":\"dbtut\"},\"image\":{\"@id\":\"https:\/\/dbtut.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/a7dfc5684c116e536b4e93ee214ccbfb\",\"name\":\"Faruk Erdem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/dbtut.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ad1e61fb5a7c9a590e765f7cad8f2dc8332090f1ceb9a5ee2aa95c69213f0c50?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ad1e61fb5a7c9a590e765f7cad8f2dc8332090f1ceb9a5ee2aa95c69213f0c50?s=96&d=mm&r=g\",\"caption\":\"Faruk Erdem\"},\"url\":\"https:\/\/dbtut.com\/index.php\/author\/farukerdem\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Authorized_Keys Linux - Database Tutorials","description":"In today's article I will tell you about Authorized_Keys Linux.We said that everything in Linux consists of files","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/","og_locale":"en_US","og_type":"article","og_title":"Authorized_Keys Linux - Database Tutorials","og_description":"In today's article I will tell you about Authorized_Keys Linux.We said that everything in Linux consists of files","og_url":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/","og_site_name":"Database Tutorials","article_published_time":"2022-08-04T06:40:23+00:00","article_modified_time":"2022-08-04T06:41:07+00:00","og_image":[{"width":685,"height":387,"url":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png","type":"image\/png"}],"author":"Faruk Erdem","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Faruk Erdem","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#article","isPartOf":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/"},"author":{"name":"Faruk Erdem","@id":"https:\/\/dbtut.com\/#\/schema\/person\/a7dfc5684c116e536b4e93ee214ccbfb"},"headline":"Authorized_Keys Linux","datePublished":"2022-08-04T06:40:23+00:00","dateModified":"2022-08-04T06:41:07+00:00","mainEntityOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/"},"wordCount":377,"commentCount":0,"publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png","articleSection":["Linux"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/","url":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/","name":"Authorized_Keys Linux - Database Tutorials","isPartOf":{"@id":"https:\/\/dbtut.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#primaryimage"},"image":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#primaryimage"},"thumbnailUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png","datePublished":"2022-08-04T06:40:23+00:00","dateModified":"2022-08-04T06:41:07+00:00","description":"In today's article I will tell you about Authorized_Keys Linux.We said that everything in Linux consists of files","breadcrumb":{"@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#primaryimage","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2022\/08\/Ekran-goruntusu-2022-08-04-093939.png","width":685,"height":387},{"@type":"BreadcrumbList","@id":"https:\/\/dbtut.com\/index.php\/2022\/08\/04\/authorized_keys-linux\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/dbtut.com\/"},{"@type":"ListItem","position":2,"name":"Authorized_Keys Linux"}]},{"@type":"WebSite","@id":"https:\/\/dbtut.com\/#website","url":"https:\/\/dbtut.com\/","name":"Database Tutorials","description":"MSSQL, Oracle, PostgreSQL, MySQL, MariaDB, DB2, Sybase, Teradata, Big Data, NOSQL, MongoDB, Couchbase, Cassandra, Windows, Linux","publisher":{"@id":"https:\/\/dbtut.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/dbtut.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/dbtut.com\/#organization","name":"dbtut","url":"https:\/\/dbtut.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/","url":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","contentUrl":"https:\/\/dbtut.com\/wp-content\/uploads\/2021\/02\/dbtutlogo.jpg","width":223,"height":36,"caption":"dbtut"},"image":{"@id":"https:\/\/dbtut.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/dbtut.com\/#\/schema\/person\/a7dfc5684c116e536b4e93ee214ccbfb","name":"Faruk Erdem","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/dbtut.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ad1e61fb5a7c9a590e765f7cad8f2dc8332090f1ceb9a5ee2aa95c69213f0c50?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ad1e61fb5a7c9a590e765f7cad8f2dc8332090f1ceb9a5ee2aa95c69213f0c50?s=96&d=mm&r=g","caption":"Faruk Erdem"},"url":"https:\/\/dbtut.com\/index.php\/author\/farukerdem\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/51982","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/users\/366"}],"replies":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/comments?post=51982"}],"version-history":[{"count":0,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/posts\/51982\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media\/51986"}],"wp:attachment":[{"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/media?parent=51982"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/categories?post=51982"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/dbtut.com\/index.php\/wp-json\/wp\/v2\/tags?post=51982"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}