{"id":55,"date":"2021-01-16T09:22:52","date_gmt":"2021-01-16T09:22:52","guid":{"rendered":"https:\/\/www.cybersecuritynotepad.com\/?page_id=55"},"modified":"2021-02-08T06:56:20","modified_gmt":"2021-02-08T06:56:20","slug":"contact","status":"publish","type":"page","link":"https:\/\/www.cybersecuritynotepad.com\/index.php\/contact\/","title":{"rendered":"Contact"},"content":{"rendered":"\n<p>The  email address listed in the footer of the page can be used for contact purposes and to report any issues with the website.<\/p>\n\n\n\n<p>The privacy policy and information about cookies can be found <a href=\"https:\/\/www.cybersecuritynotepad.com\/index.php\/privacy-policy\/\">here<\/a>.<\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The email address listed in the footer of the page can be used for contact purposes and to report any issues with the website. The privacy policy and information about cookies can be found here.<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-55","page","type-page","status-publish","hentry","entry"],"yoast_head":"<title>Contact - Cyber Security Notepad<\/title>\n<meta name=\"description\" content=\"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Contact - Cyber Security Notepad\" \/>\n<meta property=\"og:description\" content=\"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cybersecuritynotepad.com\/index.php\/contact\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyber Security Notepad\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-08T06:56:20+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/contact\\\/\",\"url\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/contact\\\/\",\"name\":\"Contact - Cyber Security Notepad\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/#website\"},\"datePublished\":\"2021-01-16T09:22:52+00:00\",\"dateModified\":\"2021-02-08T06:56:20+00:00\",\"description\":\"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/contact\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/contact\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/index.php\\\/contact\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Contact\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/#website\",\"url\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/\",\"name\":\"Cyber Security Notepad\",\"description\":\"Cyber and Information Security News, Trends, Guides and Tools\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cybersecuritynotepad.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"}]}<\/script>","yoast_head_json":{"title":"Contact - Cyber Security Notepad","description":"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_GB","og_type":"article","og_title":"Contact - Cyber Security Notepad","og_description":"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information","og_url":"https:\/\/www.cybersecuritynotepad.com\/index.php\/contact\/","og_site_name":"Cyber Security Notepad","article_modified_time":"2021-02-08T06:56:20+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/contact\/","url":"https:\/\/www.cybersecuritynotepad.com\/index.php\/contact\/","name":"Contact - Cyber Security Notepad","isPartOf":{"@id":"https:\/\/www.cybersecuritynotepad.com\/#website"},"datePublished":"2021-01-16T09:22:52+00:00","dateModified":"2021-02-08T06:56:20+00:00","description":"cyber security, cyber security notepad, Windows, Linux, 0-day research, exploit development, tools, references, cyber, security, information","breadcrumb":{"@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/contact\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cybersecuritynotepad.com\/index.php\/contact\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.cybersecuritynotepad.com\/index.php\/contact\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cybersecuritynotepad.com\/"},{"@type":"ListItem","position":2,"name":"Contact"}]},{"@type":"WebSite","@id":"https:\/\/www.cybersecuritynotepad.com\/#website","url":"https:\/\/www.cybersecuritynotepad.com\/","name":"Cyber Security Notepad","description":"Cyber and Information Security News, Trends, Guides and Tools","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cybersecuritynotepad.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"}]}},"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/pages\/55","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/comments?post=55"}],"version-history":[{"count":17,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/pages\/55\/revisions"}],"predecessor-version":[{"id":110,"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/pages\/55\/revisions\/110"}],"wp:attachment":[{"href":"https:\/\/www.cybersecuritynotepad.com\/index.php\/wp-json\/wp\/v2\/media?parent=55"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}