A small tool to view real-world ActivityPub objects as JSON! Enter a URL
or username from Mastodon or a similar service below, and we'll send a
request with
the right
Accept
header
to the server to view the underlying object.
{
"@context": [
"https://www.w3.org/ns/activitystreams",
{
"ostatus": "http://ostatus.org#",
"atomUri": "ostatus:atomUri",
"inReplyToAtomUri": "ostatus:inReplyToAtomUri",
"conversation": "ostatus:conversation",
"sensitive": "as:sensitive",
"toot": "http://joinmastodon.org/ns#",
"votersCount": "toot:votersCount",
"litepub": "http://litepub.social/ns#",
"directMessage": "litepub:directMessage",
"Hashtag": "as:Hashtag"
}
],
"id": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942",
"type": "Note",
"summary": null,
"inReplyTo": null,
"published": "2023-05-23T10:13:17Z",
"url": "https://infosec.exchange/@Decypher2/110417464375528942",
"attributedTo": "https://infosec.exchange/users/Decypher2",
"to": [
"https://www.w3.org/ns/activitystreams#Public"
],
"cc": [
"https://infosec.exchange/users/Decypher2/followers"
],
"sensitive": false,
"atomUri": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942",
"inReplyToAtomUri": null,
"conversation": "tag:infosec.exchange,2023-05-23:objectId=66554648:objectType=Conversation",
"content": "<p>Great list of free courses you will definitely gain value from: <br />1. Cloud Computing Security<br /><a href=\"https://lnkd.in/gdwCUiN2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gdwCUiN2</span><span class=\"invisible\"></span></a></p><p>2. Cloud Security - For Leaders<br /><a href=\"https://lnkd.in/gEbAgH_5\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gEbAgH_5</span><span class=\"invisible\"></span></a></p><p>3. Cryptocurrency for Law Enforcement for the Public<br /><a href=\"https://lnkd.in/g9Bu--_F\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g9Bu--_F</span><span class=\"invisible\"></span></a></p><p>4. Cyber Supply Chain Risk Management for the Public<br /><a href=\"https://lnkd.in/gimMgH2F\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gimMgH2F</span><span class=\"invisible\"></span></a></p><p>5. Cyber essentials<br /><a href=\"https://lnkd.in/ge7Jpj7y\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/ge7Jpj7y</span><span class=\"invisible\"></span></a></p><p>6. Don’t Wake Up to a Ransomware Attack<br /><a href=\"https://lnkd.in/gqnauxyS\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gqnauxyS</span><span class=\"invisible\"></span></a></p><p>7. Foundations of Cybersecurity for Managers<br /><a href=\"https://lnkd.in/g-Yxxdxp\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g-Yxxdxp</span><span class=\"invisible\"></span></a></p><p>8. Fundamentals of Cyber Risk Management<br /><a href=\"https://lnkd.in/gbV8P5m2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gbV8P5m2</span><span class=\"invisible\"></span></a></p><p>9. Introduction to Cyber Intelligence <br /><a href=\"https://lnkd.in/gCDd5rFr\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gCDd5rFr</span><span class=\"invisible\"></span></a></p><p>10. Securing Internet-Accessible Systems<br /><a href=\"https://lnkd.in/gz7cnEwi\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gz7cnEwi</span><span class=\"invisible\"></span></a></p><p>11. Understanding DNS Attack<br /><a href=\"https://lnkd.in/g5FEKCsJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g5FEKCsJ</span><span class=\"invisible\"></span></a></p><p>12. Understanding Web and Email Server Security<br /><a href=\"https://lnkd.in/gGB2zJZG\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gGB2zJZG</span><span class=\"invisible\"></span></a></p><p>13. 101 Coding for the Public <a href=\"https://lnkd.in/gpAVr_GM\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gpAVr_GM</span><span class=\"invisible\"></span></a></p><p>14. 101 Reverse Engineering for the Public <a href=\"https://lnkd.in/gq6MP-uJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gq6MP-uJ</span><span class=\"invisible\"></span></a></p><p>15. Introduction to Cyber Attacks at NYU<br /><a href=\"https://lnkd.in/gT6psJjU\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gT6psJjU</span><span class=\"invisible\"></span></a></p><p>16. Cryptography I at Stanford<br /><a href=\"https://lnkd.in/gQCt4B7D\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gQCt4B7D</span><span class=\"invisible\"></span></a></p><p>17. Hardware Security at University of Maryland<br /><a href=\"https://lnkd.in/gzCm_VRb\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gzCm_VRb</span><span class=\"invisible\"></span></a></p><p>18. Network and Security Foundations at Western Governors University<br /><a href=\"https://lnkd.in/ghVX7rgX\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/ghVX7rgX</span><span class=\"invisible\"></span></a></p><p>19. Internet History, Technology, and Security at University of Michigan<br /><a href=\"https://lnkd.in/gjD_BeGg\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gjD_BeGg</span><span class=\"invisible\"></span></a></p><p>20. Network and Computer Security at MIT<br /><a href=\"https://lnkd.in/gWbzUpq2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gWbzUpq2</span><span class=\"invisible\"></span></a></p><p>21. Computer Networks at MIT<br /><a href=\"https://lnkd.in/g6pGYsRJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g6pGYsRJ</span><span class=\"invisible\"></span></a></p><p>22. System Issues in Cloud Computing Specialization at Georgia Tech<br /><a href=\"https://lnkd.in/gRMSuJs9\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gRMSuJs9</span><span class=\"invisible\"></span></a></p><p>23. Cybersecurity Management at Charles Sturt University<br /><a href=\"https://lnkd.in/gasd7-Sz\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gasd7-Sz</span><span class=\"invisible\"></span></a></p><p>24. Certified Information Systems Security Professional at Charles Sturt University<br /><a href=\"https://lnkd.in/giX4pV7j\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/giX4pV7j</span><span class=\"invisible\"></span></a></p><p>25. Pen Testing at Charles Sturt University<br /><a href=\"https://lnkd.in/gd8VwMrC\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gd8VwMrC</span><span class=\"invisible\"></span></a></p><p>26. Introduction to Cybersecurity on Udacity<br /><a href=\"https://lnkd.in/gkF9YQPy\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gkF9YQPy</span><span class=\"invisible\"></span></a></p><p>27. Security Engineer on Udacity<br /><a href=\"https://lnkd.in/gc6PQJcP\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gc6PQJcP</span><span class=\"invisible\"></span></a><br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/itsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>itsecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybertraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybertraining</span></a> <a href=\"https://infosec.exchange/tags/freecourses\" class=\"mention hashtag\" rel=\"tag\">#<span>freecourses</span></a></p>",
"contentMap": {
"en": "<p>Great list of free courses you will definitely gain value from: <br />1. Cloud Computing Security<br /><a href=\"https://lnkd.in/gdwCUiN2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gdwCUiN2</span><span class=\"invisible\"></span></a></p><p>2. Cloud Security - For Leaders<br /><a href=\"https://lnkd.in/gEbAgH_5\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gEbAgH_5</span><span class=\"invisible\"></span></a></p><p>3. Cryptocurrency for Law Enforcement for the Public<br /><a href=\"https://lnkd.in/g9Bu--_F\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g9Bu--_F</span><span class=\"invisible\"></span></a></p><p>4. Cyber Supply Chain Risk Management for the Public<br /><a href=\"https://lnkd.in/gimMgH2F\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gimMgH2F</span><span class=\"invisible\"></span></a></p><p>5. Cyber essentials<br /><a href=\"https://lnkd.in/ge7Jpj7y\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/ge7Jpj7y</span><span class=\"invisible\"></span></a></p><p>6. Don’t Wake Up to a Ransomware Attack<br /><a href=\"https://lnkd.in/gqnauxyS\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gqnauxyS</span><span class=\"invisible\"></span></a></p><p>7. Foundations of Cybersecurity for Managers<br /><a href=\"https://lnkd.in/g-Yxxdxp\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g-Yxxdxp</span><span class=\"invisible\"></span></a></p><p>8. Fundamentals of Cyber Risk Management<br /><a href=\"https://lnkd.in/gbV8P5m2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gbV8P5m2</span><span class=\"invisible\"></span></a></p><p>9. Introduction to Cyber Intelligence <br /><a href=\"https://lnkd.in/gCDd5rFr\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gCDd5rFr</span><span class=\"invisible\"></span></a></p><p>10. Securing Internet-Accessible Systems<br /><a href=\"https://lnkd.in/gz7cnEwi\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gz7cnEwi</span><span class=\"invisible\"></span></a></p><p>11. Understanding DNS Attack<br /><a href=\"https://lnkd.in/g5FEKCsJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g5FEKCsJ</span><span class=\"invisible\"></span></a></p><p>12. Understanding Web and Email Server Security<br /><a href=\"https://lnkd.in/gGB2zJZG\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gGB2zJZG</span><span class=\"invisible\"></span></a></p><p>13. 101 Coding for the Public <a href=\"https://lnkd.in/gpAVr_GM\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gpAVr_GM</span><span class=\"invisible\"></span></a></p><p>14. 101 Reverse Engineering for the Public <a href=\"https://lnkd.in/gq6MP-uJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gq6MP-uJ</span><span class=\"invisible\"></span></a></p><p>15. Introduction to Cyber Attacks at NYU<br /><a href=\"https://lnkd.in/gT6psJjU\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gT6psJjU</span><span class=\"invisible\"></span></a></p><p>16. Cryptography I at Stanford<br /><a href=\"https://lnkd.in/gQCt4B7D\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gQCt4B7D</span><span class=\"invisible\"></span></a></p><p>17. Hardware Security at University of Maryland<br /><a href=\"https://lnkd.in/gzCm_VRb\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gzCm_VRb</span><span class=\"invisible\"></span></a></p><p>18. Network and Security Foundations at Western Governors University<br /><a href=\"https://lnkd.in/ghVX7rgX\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/ghVX7rgX</span><span class=\"invisible\"></span></a></p><p>19. Internet History, Technology, and Security at University of Michigan<br /><a href=\"https://lnkd.in/gjD_BeGg\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gjD_BeGg</span><span class=\"invisible\"></span></a></p><p>20. Network and Computer Security at MIT<br /><a href=\"https://lnkd.in/gWbzUpq2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gWbzUpq2</span><span class=\"invisible\"></span></a></p><p>21. Computer Networks at MIT<br /><a href=\"https://lnkd.in/g6pGYsRJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g6pGYsRJ</span><span class=\"invisible\"></span></a></p><p>22. System Issues in Cloud Computing Specialization at Georgia Tech<br /><a href=\"https://lnkd.in/gRMSuJs9\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gRMSuJs9</span><span class=\"invisible\"></span></a></p><p>23. Cybersecurity Management at Charles Sturt University<br /><a href=\"https://lnkd.in/gasd7-Sz\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gasd7-Sz</span><span class=\"invisible\"></span></a></p><p>24. Certified Information Systems Security Professional at Charles Sturt University<br /><a href=\"https://lnkd.in/giX4pV7j\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/giX4pV7j</span><span class=\"invisible\"></span></a></p><p>25. Pen Testing at Charles Sturt University<br /><a href=\"https://lnkd.in/gd8VwMrC\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gd8VwMrC</span><span class=\"invisible\"></span></a></p><p>26. Introduction to Cybersecurity on Udacity<br /><a href=\"https://lnkd.in/gkF9YQPy\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gkF9YQPy</span><span class=\"invisible\"></span></a></p><p>27. Security Engineer on Udacity<br /><a href=\"https://lnkd.in/gc6PQJcP\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gc6PQJcP</span><span class=\"invisible\"></span></a><br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/itsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>itsecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybertraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybertraining</span></a> <a href=\"https://infosec.exchange/tags/freecourses\" class=\"mention hashtag\" rel=\"tag\">#<span>freecourses</span></a></p>"
},
"attachment": [],
"tag": [
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybersecurity",
"name": "#cybersecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/itsecurity",
"name": "#itsecurity"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/infosec",
"name": "#infosec"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/cybertraining",
"name": "#cybertraining"
},
{
"type": "Hashtag",
"href": "https://infosec.exchange/tags/freecourses",
"name": "#freecourses"
}
],
"replies": {
"id": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/replies",
"type": "Collection",
"first": {
"type": "CollectionPage",
"next": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/replies?only_other_accounts=true&page=true",
"partOf": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/replies",
"items": []
}
},
"likes": {
"id": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/likes",
"type": "Collection",
"totalItems": 5
},
"shares": {
"id": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/shares",
"type": "Collection",
"totalItems": 1
}
}