{"id":3044,"date":"2024-11-01T22:35:41","date_gmt":"2024-11-01T22:35:41","guid":{"rendered":"https:\/\/securitybriefing.net\/?p=3044"},"modified":"2024-11-01T22:42:19","modified_gmt":"2024-11-01T22:42:19","slug":"wie-lange-bis-230","status":"publish","type":"post","link":"https:\/\/securitybriefing.net\/de\/daten\/wie-lange-bis-230\/","title":{"rendered":"Wie lange bis 2:30"},"content":{"rendered":"<div style=\"max-width: 800px; margin: 0 auto; padding: 20px; background-color: white; font-family: Arial, sans-serif;\">\n    <!-- Original Time Calculator Section --><\/p>\n<div style=\"margin-bottom: 30px;\">\n<h2 style=\"color: #061851;\">Zeit bis 2:30<\/h2>\n<p>        <!-- Border, shadow, and padding added to this container --><\/p>\n<div style=\"background-color: #f8f9fa; padding: 20px; border-radius: 5px; box-shadow: 0 4px 8px rgba(0, 0, 0, 0.1); border: 2px solid #e0e0e0;\">\n            <label for=\"targetTime\" style=\"display: block; margin-bottom: 10px; font-size: 18px;\">Geben Sie die Zielzeit ein (z. B. 14:30 Uhr):<\/label><br \/>\n            <input type=\"time\" id=\"targetTime\" value=\"14:30\" style=\"width: 100%; padding: 10px; margin-bottom: 15px; border-radius: 4px; border: 1px solid #ced4da; font-size: 16px;\"><br \/>\n            <button onclick=\"calculateTimeUntil()\" style=\"background-color: #061851; color: white; border: none; padding: 10px 15px; font-size: 16px; cursor: pointer; border-radius: 5px; transition: background-color 0.3s;\">Berechnen Sie<\/button><\/p>\n<p id=\"result\" style=\"font-size: 16px; margin-top: 10px;\">Die verbleibende Zeit wird hier angezeigt.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<p>    <!-- New Detailed Calculation Section with Steps --><\/p>\n<div style=\"margin-bottom: 30px;\">\n<h2 style=\"color: #061851; margin-top: 50px;\">Zeitberechnung - Schritt f\u00fcr Schritt<\/h2>\n<div style=\"background-color: #f8f9fa; padding: 20px; border-radius: 5px; box-shadow: 0 4px 8px rgba(0, 0, 0, 0.1); border: 2px solid #e0e0e0;\">\n<p style=\"font-size: 18px; font-weight: bold; position: relative;\">\n                L\u00f6sungsans\u00e4tze<br \/>\n                <span style=\"display: block; height: 4px; background-color: #061851; margin-top: 8px; border-radius: 2px;\"><\/span>\n            <\/p>\n<div style=\"border: 1px dashed #061851; padding: 10px; margin-top: 20px;\">\n<h3 style=\"font-size: 20px;\">L\u00f6sungsans\u00e4tze<\/h3>\n<p><strong>Aktuelle Uhrzeit:<\/strong> Dadurch wird automatisch die aktuelle Uhrzeit Ihres Systems verwendet.<\/p>\n<p><strong>Zielzeit:<\/strong> 14:30 Uhr (14:30 Uhr im 24-Stunden-Format)<\/p>\n<p><strong>Kalkulation:<\/strong> Ziehen Sie die aktuelle Uhrzeit von 14:30 Uhr ab, um die verbleibenden Stunden und Minuten zu ermitteln.<\/p>\n<p style=\"font-weight: bold;\">Ergebnis: Zeigt die verbleibende Zeit bis 14:30 Uhr an.<\/p>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<p>    <!-- Explanation of the Time Calculation Process --><\/p>\n<div style=\"margin-bottom: 30px;\">\n<h2 style=\"color: #061851; margin-top: 50px;\">Erl\u00e4uterung der Zeitberechnung<\/h2>\n<p>Dieses Tool berechnet die verbleibende Zeit bis 14:30 Uhr ausgehend von der aktuellen Uhrzeit. Die aktuelle Zeit wird von Ihrer Systemuhr abgerufen, und wenn Sie eine Zielzeit eingeben, liefert die Berechnung die genauen Stunden und Minuten, die noch verbleiben.<\/p>\n<\/p><\/div>\n<p>    <!-- Applications Section --><\/p>\n<div style=\"margin-bottom: 30px;\">\n<h2 style=\"color: #061851; margin-top: 50px;\">Anwendungen der Zeitberechnung<\/h2>\n<p>Die Kenntnis der verbleibenden Zeit bis zu einer bestimmten Stunde ist in verschiedenen Zusammenh\u00e4ngen n\u00fctzlich, z. B.:<\/p>\n<ul style=\"margin-top: 10px; list-style-type: disc; padding-left: 20px;\">\n<li><strong>Terminplanung:<\/strong> Verfolgung der verbleibenden Zeit vor Sitzungen oder Terminen.<\/li>\n<li><strong>Planung von Veranstaltungen:<\/strong> Hilft bei der Koordinierung von Aktivit\u00e4ten, indem er die verbleibenden Stunden bis zu den Startzeiten berechnet.<\/li>\n<li><strong>Zeitmanagement:<\/strong> Ein n\u00fctzliches Werkzeug zur Maximierung der Produktivit\u00e4t und zum Setzen von Erinnerungen.<\/li>\n<\/ul><\/div>\n<\/div>\n<p><!-- JavaScript for the Time Calculator --><br \/>\n<script>\nfunction calculateTimeUntil() {\n    const targetTimeInput = document.getElementById(\"targetTime\").value;\n    const [targetHours, targetMinutes] = targetTimeInput.split(\":\").map(Number);<\/p>\n<p>    const now = new Date();\n    const currentHours = now.getHours();\n    const currentMinutes = now.getMinutes();<\/p>\n<p>    const target = new Date();\n    target.setHours(targetHours, targetMinutes, 0);<\/p>\n<p>    const differenceMs = target - now;\n    if (differenceMs < 0) {\n        document.getElementById(\"result\").textContent = \"The target time has already passed for today.\";\n    } else {\n        const hours = Math.floor(differenceMs \/ (1000 * 60 * 60));\n        const minutes = Math.floor((differenceMs % (1000 * 60 * 60)) \/ (1000 * 60));\n        document.getElementById(\"result\").textContent = `${hours} hours and ${minutes} minutes remaining until 2:30.`;\n    }\n}\n<\/script><\/p>","protected":false},"excerpt":{"rendered":"<p>Zeit bis 2:30 Geben Sie die Zielzeit ein (z. B. 14:30 Uhr): Die verbleibende Zeit wird hier angezeigt. Zeitberechnung - Schritt f\u00fcr Schritt L\u00f6sungsschritte L\u00f6sungsschritte Aktuelle Zeit: Diese wird automatisch... <a class=\"more-link\" href=\"https:\/\/securitybriefing.net\/de\/daten\/wie-lange-bis-230\/\"><span class=\"screen-reader-text\">Wie lange bis 2:30<\/span> read more<\/a><\/p>","protected":false},"author":3,"featured_media":3045,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[43],"tags":[],"class_list":["post-3044","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Long Until 2:30 | Security Briefing<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/securitybriefing.net\/de\/daten\/wie-lange-bis-230\/\" \/>\n<meta property=\"og:locale\" content=\"de_DE\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Long Until 2:30 | Security Briefing\" \/>\n<meta property=\"og:description\" content=\"Time Until 2:30 Enter target time (e.g., 2:30 PM): Calculate Time remaining will appear here. Time Calculation &#8211; Step by Step Solution Steps Solution Steps Current time: This will automatically&hellip; How Long Until 2:30 weiterlesen\" \/>\n<meta property=\"og:url\" content=\"https:\/\/securitybriefing.net\/de\/daten\/wie-lange-bis-230\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Briefing\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-01T22:35:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-11-01T22:42:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1265\" \/>\n\t<meta property=\"og:image:height\" content=\"422\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"C\u00e9sar Daniel Barreto\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Geschrieben von\" \/>\n\t<meta name=\"twitter:data1\" content=\"C\u00e9sar Daniel Barreto\" \/>\n\t<meta name=\"twitter:label2\" content=\"Gesch\u00e4tzte Lesezeit\" \/>\n\t<meta name=\"twitter:data2\" content=\"1\u00a0Minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/\"},\"author\":{\"name\":\"C\u00e9sar Daniel Barreto\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\"},\"headline\":\"How Long Until 2:30\",\"datePublished\":\"2024-11-01T22:35:41+00:00\",\"dateModified\":\"2024-11-01T22:42:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/\"},\"wordCount\":155,\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg\",\"articleSection\":[\"data\"],\"inLanguage\":\"de\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/\",\"url\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/\",\"name\":\"How Long Until 2:30 | Security Briefing\",\"isPartOf\":{\"@id\":\"https:\/\/securitybriefing.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg\",\"datePublished\":\"2024-11-01T22:35:41+00:00\",\"dateModified\":\"2024-11-01T22:42:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#breadcrumb\"},\"inLanguage\":\"de\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#primaryimage\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg\",\"width\":1265,\"height\":422,\"caption\":\"How Long Until 2:30\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/securitybriefing.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Long Until 2:30\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/securitybriefing.net\/#website\",\"url\":\"https:\/\/securitybriefing.net\/\",\"name\":\"Security Briefing\",\"description\":\"Your Gateway to Cyber Safety\",\"publisher\":{\"@id\":\"https:\/\/securitybriefing.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/securitybriefing.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"de\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/securitybriefing.net\/#organization\",\"name\":\"Security Briefing\",\"url\":\"https:\/\/securitybriefing.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"contentUrl\":\"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png\",\"width\":256,\"height\":70,\"caption\":\"Security Briefing\"},\"image\":{\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c\",\"name\":\"C\u00e9sar Daniel Barreto\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"de\",\"@id\":\"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g\",\"caption\":\"C\u00e9sar Daniel Barreto\"},\"description\":\"C\u00e9sar Daniel Barreto is an esteemed cybersecurity writer and expert, known for his in-depth knowledge and ability to simplify complex cyber security topics. With extensive experience in network security and data protection, he regularly contributes insightful articles and analysis on the latest cybersecurity trends, educating both professionals and the public.\",\"url\":\"https:\/\/securitybriefing.net\/de\/author\/cesarbarreto\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Wie lange bis 2:30 | Sicherheitsbesprechung","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/securitybriefing.net\/de\/daten\/wie-lange-bis-230\/","og_locale":"de_DE","og_type":"article","og_title":"How Long Until 2:30 | Security Briefing","og_description":"Time Until 2:30 Enter target time (e.g., 2:30 PM): Calculate Time remaining will appear here. Time Calculation &#8211; Step by Step Solution Steps Solution Steps Current time: This will automatically&hellip; How Long Until 2:30 weiterlesen","og_url":"https:\/\/securitybriefing.net\/de\/daten\/wie-lange-bis-230\/","og_site_name":"Security Briefing","article_published_time":"2024-11-01T22:35:41+00:00","article_modified_time":"2024-11-01T22:42:19+00:00","og_image":[{"width":1265,"height":422,"url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg","type":"image\/jpeg"}],"author":"C\u00e9sar Daniel Barreto","twitter_card":"summary_large_image","twitter_misc":{"Geschrieben von":"C\u00e9sar Daniel Barreto","Gesch\u00e4tzte Lesezeit":"1\u00a0Minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#article","isPartOf":{"@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/"},"author":{"name":"C\u00e9sar Daniel Barreto","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c"},"headline":"How Long Until 2:30","datePublished":"2024-11-01T22:35:41+00:00","dateModified":"2024-11-01T22:42:19+00:00","mainEntityOfPage":{"@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/"},"wordCount":155,"publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"image":{"@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg","articleSection":["data"],"inLanguage":"de"},{"@type":"WebPage","@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/","url":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/","name":"Wie lange bis 2:30 | Sicherheitsbesprechung","isPartOf":{"@id":"https:\/\/securitybriefing.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#primaryimage"},"image":{"@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#primaryimage"},"thumbnailUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg","datePublished":"2024-11-01T22:35:41+00:00","dateModified":"2024-11-01T22:42:19+00:00","breadcrumb":{"@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#breadcrumb"},"inLanguage":"de","potentialAction":[{"@type":"ReadAction","target":["https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/"]}]},{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#primaryimage","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2024\/11\/How-Long-Until-230.jpg","width":1265,"height":422,"caption":"How Long Until 2:30"},{"@type":"BreadcrumbList","@id":"https:\/\/securitybriefing.net\/data\/how-long-until-2-30\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/securitybriefing.net\/"},{"@type":"ListItem","position":2,"name":"How Long Until 2:30"}]},{"@type":"WebSite","@id":"https:\/\/securitybriefing.net\/#website","url":"https:\/\/securitybriefing.net\/","name":"Sicherheitsbriefing","description":"Ihr Tor zur Cybersicherheit","publisher":{"@id":"https:\/\/securitybriefing.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/securitybriefing.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"de"},{"@type":"Organization","@id":"https:\/\/securitybriefing.net\/#organization","name":"Sicherheitsbriefing","url":"https:\/\/securitybriefing.net\/","logo":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/","url":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","contentUrl":"https:\/\/securitybriefing.net\/wp-content\/uploads\/2023\/06\/security-briefing-logo-5.png","width":256,"height":70,"caption":"Security Briefing"},"image":{"@id":"https:\/\/securitybriefing.net\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/164e5a0bfff5012ebfb8eb4d03c2c24c","name":"<\/section>","image":{"@type":"ImageObject","inLanguage":"de","@id":"https:\/\/securitybriefing.net\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9e709cab74f02e628ffc32849980d0ea51903be7d4bcb52e99250bac60f0b683?s=96&d=mm&r=g","caption":"C\u00e9sar Daniel Barreto"},"description":"C\u00e9sar Daniel Barreto ist ein gesch\u00e4tzter Cybersecurity-Autor und -Experte, der f\u00fcr sein fundiertes Wissen und seine F\u00e4higkeit bekannt ist, komplexe Cybersicherheitsthemen zu vereinfachen. Mit seiner umfassenden Erfahrung in den Bereichen Netzwerksicherheit und Datenschutz verfasst er regelm\u00e4\u00dfig aufschlussreiche Artikel und Analysen zu den neuesten Trends in der Cybersicherheit und informiert damit sowohl Fachleute als auch die \u00d6ffentlichkeit.","url":"https:\/\/securitybriefing.net\/de\/author\/cesarbarreto\/"}]}},"_links":{"self":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts\/3044","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/comments?post=3044"}],"version-history":[{"count":0,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/posts\/3044\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/media\/3045"}],"wp:attachment":[{"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/media?parent=3044"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/categories?post=3044"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/securitybriefing.net\/de\/wp-json\/wp\/v2\/tags?post=3044"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}