ActivityPub Viewer

A small tool to view real-world ActivityPub objects as JSON! Enter a URL or username from Mastodon or a similar service below, and we'll send a request with the right Accept header to the server to view the underlying object.

Open in browser →
{ "@context": [ "https://www.w3.org/ns/activitystreams", { "ostatus": "http://ostatus.org#", "atomUri": "ostatus:atomUri", "inReplyToAtomUri": "ostatus:inReplyToAtomUri", "conversation": "ostatus:conversation", "sensitive": "as:sensitive", "toot": "http://joinmastodon.org/ns#", "votersCount": "toot:votersCount", "litepub": "http://litepub.social/ns#", "directMessage": "litepub:directMessage", "Hashtag": "as:Hashtag" } ], "id": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942", "type": "Note", "summary": null, "inReplyTo": null, "published": "2023-05-23T10:13:17Z", "url": "https://infosec.exchange/@Decypher2/110417464375528942", "attributedTo": "https://infosec.exchange/users/Decypher2", "to": [ "https://www.w3.org/ns/activitystreams#Public" ], "cc": [ "https://infosec.exchange/users/Decypher2/followers" ], "sensitive": false, "atomUri": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942", "inReplyToAtomUri": null, "conversation": "tag:infosec.exchange,2023-05-23:objectId=66554648:objectType=Conversation", "content": "<p>Great list of free courses you will definitely gain value from: <br />1. Cloud Computing Security<br /><a href=\"https://lnkd.in/gdwCUiN2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gdwCUiN2</span><span class=\"invisible\"></span></a></p><p>2. Cloud Security - For Leaders<br /><a href=\"https://lnkd.in/gEbAgH_5\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gEbAgH_5</span><span class=\"invisible\"></span></a></p><p>3. Cryptocurrency for Law Enforcement for the Public<br /><a href=\"https://lnkd.in/g9Bu--_F\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g9Bu--_F</span><span class=\"invisible\"></span></a></p><p>4. Cyber Supply Chain Risk Management for the Public<br /><a href=\"https://lnkd.in/gimMgH2F\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gimMgH2F</span><span class=\"invisible\"></span></a></p><p>5. Cyber essentials<br /><a href=\"https://lnkd.in/ge7Jpj7y\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/ge7Jpj7y</span><span class=\"invisible\"></span></a></p><p>6. Don’t Wake Up to a Ransomware Attack<br /><a href=\"https://lnkd.in/gqnauxyS\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gqnauxyS</span><span class=\"invisible\"></span></a></p><p>7. Foundations of Cybersecurity for Managers<br /><a href=\"https://lnkd.in/g-Yxxdxp\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g-Yxxdxp</span><span class=\"invisible\"></span></a></p><p>8. Fundamentals of Cyber Risk Management<br /><a href=\"https://lnkd.in/gbV8P5m2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gbV8P5m2</span><span class=\"invisible\"></span></a></p><p>9. Introduction to Cyber Intelligence <br /><a href=\"https://lnkd.in/gCDd5rFr\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gCDd5rFr</span><span class=\"invisible\"></span></a></p><p>10. Securing Internet-Accessible Systems<br /><a href=\"https://lnkd.in/gz7cnEwi\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gz7cnEwi</span><span class=\"invisible\"></span></a></p><p>11. Understanding DNS Attack<br /><a href=\"https://lnkd.in/g5FEKCsJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g5FEKCsJ</span><span class=\"invisible\"></span></a></p><p>12. Understanding Web and Email Server Security<br /><a href=\"https://lnkd.in/gGB2zJZG\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gGB2zJZG</span><span class=\"invisible\"></span></a></p><p>13. 101 Coding for the Public <a href=\"https://lnkd.in/gpAVr_GM\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gpAVr_GM</span><span class=\"invisible\"></span></a></p><p>14. 101 Reverse Engineering for the Public <a href=\"https://lnkd.in/gq6MP-uJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gq6MP-uJ</span><span class=\"invisible\"></span></a></p><p>15. Introduction to Cyber Attacks at NYU<br /><a href=\"https://lnkd.in/gT6psJjU\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gT6psJjU</span><span class=\"invisible\"></span></a></p><p>16. Cryptography I at Stanford<br /><a href=\"https://lnkd.in/gQCt4B7D\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gQCt4B7D</span><span class=\"invisible\"></span></a></p><p>17. Hardware Security at University of Maryland<br /><a href=\"https://lnkd.in/gzCm_VRb\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gzCm_VRb</span><span class=\"invisible\"></span></a></p><p>18. Network and Security Foundations at Western Governors University<br /><a href=\"https://lnkd.in/ghVX7rgX\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/ghVX7rgX</span><span class=\"invisible\"></span></a></p><p>19. Internet History, Technology, and Security at University of Michigan<br /><a href=\"https://lnkd.in/gjD_BeGg\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gjD_BeGg</span><span class=\"invisible\"></span></a></p><p>20. Network and Computer Security at MIT<br /><a href=\"https://lnkd.in/gWbzUpq2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gWbzUpq2</span><span class=\"invisible\"></span></a></p><p>21. Computer Networks at MIT<br /><a href=\"https://lnkd.in/g6pGYsRJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g6pGYsRJ</span><span class=\"invisible\"></span></a></p><p>22. System Issues in Cloud Computing Specialization at Georgia Tech<br /><a href=\"https://lnkd.in/gRMSuJs9\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gRMSuJs9</span><span class=\"invisible\"></span></a></p><p>23. Cybersecurity Management at Charles Sturt University<br /><a href=\"https://lnkd.in/gasd7-Sz\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gasd7-Sz</span><span class=\"invisible\"></span></a></p><p>24. Certified Information Systems Security Professional at Charles Sturt University<br /><a href=\"https://lnkd.in/giX4pV7j\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/giX4pV7j</span><span class=\"invisible\"></span></a></p><p>25. Pen Testing at Charles Sturt University<br /><a href=\"https://lnkd.in/gd8VwMrC\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gd8VwMrC</span><span class=\"invisible\"></span></a></p><p>26. Introduction to Cybersecurity on Udacity<br /><a href=\"https://lnkd.in/gkF9YQPy\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gkF9YQPy</span><span class=\"invisible\"></span></a></p><p>27. Security Engineer on Udacity<br /><a href=\"https://lnkd.in/gc6PQJcP\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gc6PQJcP</span><span class=\"invisible\"></span></a><br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/itsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>itsecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybertraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybertraining</span></a> <a href=\"https://infosec.exchange/tags/freecourses\" class=\"mention hashtag\" rel=\"tag\">#<span>freecourses</span></a></p>", "contentMap": { "en": "<p>Great list of free courses you will definitely gain value from: <br />1. Cloud Computing Security<br /><a href=\"https://lnkd.in/gdwCUiN2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gdwCUiN2</span><span class=\"invisible\"></span></a></p><p>2. Cloud Security - For Leaders<br /><a href=\"https://lnkd.in/gEbAgH_5\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gEbAgH_5</span><span class=\"invisible\"></span></a></p><p>3. Cryptocurrency for Law Enforcement for the Public<br /><a href=\"https://lnkd.in/g9Bu--_F\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g9Bu--_F</span><span class=\"invisible\"></span></a></p><p>4. Cyber Supply Chain Risk Management for the Public<br /><a href=\"https://lnkd.in/gimMgH2F\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gimMgH2F</span><span class=\"invisible\"></span></a></p><p>5. Cyber essentials<br /><a href=\"https://lnkd.in/ge7Jpj7y\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/ge7Jpj7y</span><span class=\"invisible\"></span></a></p><p>6. Don’t Wake Up to a Ransomware Attack<br /><a href=\"https://lnkd.in/gqnauxyS\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gqnauxyS</span><span class=\"invisible\"></span></a></p><p>7. Foundations of Cybersecurity for Managers<br /><a href=\"https://lnkd.in/g-Yxxdxp\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g-Yxxdxp</span><span class=\"invisible\"></span></a></p><p>8. Fundamentals of Cyber Risk Management<br /><a href=\"https://lnkd.in/gbV8P5m2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gbV8P5m2</span><span class=\"invisible\"></span></a></p><p>9. Introduction to Cyber Intelligence <br /><a href=\"https://lnkd.in/gCDd5rFr\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gCDd5rFr</span><span class=\"invisible\"></span></a></p><p>10. Securing Internet-Accessible Systems<br /><a href=\"https://lnkd.in/gz7cnEwi\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gz7cnEwi</span><span class=\"invisible\"></span></a></p><p>11. Understanding DNS Attack<br /><a href=\"https://lnkd.in/g5FEKCsJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g5FEKCsJ</span><span class=\"invisible\"></span></a></p><p>12. Understanding Web and Email Server Security<br /><a href=\"https://lnkd.in/gGB2zJZG\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gGB2zJZG</span><span class=\"invisible\"></span></a></p><p>13. 101 Coding for the Public <a href=\"https://lnkd.in/gpAVr_GM\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gpAVr_GM</span><span class=\"invisible\"></span></a></p><p>14. 101 Reverse Engineering for the Public <a href=\"https://lnkd.in/gq6MP-uJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gq6MP-uJ</span><span class=\"invisible\"></span></a></p><p>15. Introduction to Cyber Attacks at NYU<br /><a href=\"https://lnkd.in/gT6psJjU\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gT6psJjU</span><span class=\"invisible\"></span></a></p><p>16. Cryptography I at Stanford<br /><a href=\"https://lnkd.in/gQCt4B7D\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gQCt4B7D</span><span class=\"invisible\"></span></a></p><p>17. Hardware Security at University of Maryland<br /><a href=\"https://lnkd.in/gzCm_VRb\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gzCm_VRb</span><span class=\"invisible\"></span></a></p><p>18. Network and Security Foundations at Western Governors University<br /><a href=\"https://lnkd.in/ghVX7rgX\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/ghVX7rgX</span><span class=\"invisible\"></span></a></p><p>19. Internet History, Technology, and Security at University of Michigan<br /><a href=\"https://lnkd.in/gjD_BeGg\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gjD_BeGg</span><span class=\"invisible\"></span></a></p><p>20. Network and Computer Security at MIT<br /><a href=\"https://lnkd.in/gWbzUpq2\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gWbzUpq2</span><span class=\"invisible\"></span></a></p><p>21. Computer Networks at MIT<br /><a href=\"https://lnkd.in/g6pGYsRJ\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/g6pGYsRJ</span><span class=\"invisible\"></span></a></p><p>22. System Issues in Cloud Computing Specialization at Georgia Tech<br /><a href=\"https://lnkd.in/gRMSuJs9\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gRMSuJs9</span><span class=\"invisible\"></span></a></p><p>23. Cybersecurity Management at Charles Sturt University<br /><a href=\"https://lnkd.in/gasd7-Sz\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gasd7-Sz</span><span class=\"invisible\"></span></a></p><p>24. Certified Information Systems Security Professional at Charles Sturt University<br /><a href=\"https://lnkd.in/giX4pV7j\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/giX4pV7j</span><span class=\"invisible\"></span></a></p><p>25. Pen Testing at Charles Sturt University<br /><a href=\"https://lnkd.in/gd8VwMrC\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gd8VwMrC</span><span class=\"invisible\"></span></a></p><p>26. Introduction to Cybersecurity on Udacity<br /><a href=\"https://lnkd.in/gkF9YQPy\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gkF9YQPy</span><span class=\"invisible\"></span></a></p><p>27. Security Engineer on Udacity<br /><a href=\"https://lnkd.in/gc6PQJcP\" target=\"_blank\" rel=\"nofollow noopener\" translate=\"no\"><span class=\"invisible\">https://</span><span class=\"\">lnkd.in/gc6PQJcP</span><span class=\"invisible\"></span></a><br /><a href=\"https://infosec.exchange/tags/cybersecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>cybersecurity</span></a> <a href=\"https://infosec.exchange/tags/itsecurity\" class=\"mention hashtag\" rel=\"tag\">#<span>itsecurity</span></a> <a href=\"https://infosec.exchange/tags/infosec\" class=\"mention hashtag\" rel=\"tag\">#<span>infosec</span></a> <a href=\"https://infosec.exchange/tags/cybertraining\" class=\"mention hashtag\" rel=\"tag\">#<span>cybertraining</span></a> <a href=\"https://infosec.exchange/tags/freecourses\" class=\"mention hashtag\" rel=\"tag\">#<span>freecourses</span></a></p>" }, "attachment": [], "tag": [ { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybersecurity", "name": "#cybersecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/itsecurity", "name": "#itsecurity" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/infosec", "name": "#infosec" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/cybertraining", "name": "#cybertraining" }, { "type": "Hashtag", "href": "https://infosec.exchange/tags/freecourses", "name": "#freecourses" } ], "replies": { "id": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/replies", "type": "Collection", "first": { "type": "CollectionPage", "next": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/replies?only_other_accounts=true&page=true", "partOf": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/replies", "items": [] } }, "likes": { "id": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/likes", "type": "Collection", "totalItems": 5 }, "shares": { "id": "https://infosec.exchange/users/Decypher2/statuses/110417464375528942/shares", "type": "Collection", "totalItems": 1 } }