{"id":345,"date":"2018-06-28T15:31:46","date_gmt":"2018-06-28T15:31:46","guid":{"rendered":"https:\/\/codesupply.co\/?page_id=345"},"modified":"2018-06-28T15:31:46","modified_gmt":"2018-06-28T15:31:46","slug":"inline-posts","status":"publish","type":"page","link":"https:\/\/nootherjake.com\/blog\/inline-posts\/","title":{"rendered":"Inline Posts"},"content":{"rendered":"\n<div class=\"cnvs-block-alert cnvs-block-alert-1569596272800 is-style-cnvs-block-alert-warning\" >\n\t<div class=\"cnvs-block-alert-inner\">\n\t\t\n\n<h6 id=\"please-note\" class=\"wp-block-heading\">Please Note<\/h6>\n\n\n\n<p>You need to install and activate <a href=\"https:\/\/wordpress.org\/plugins\/canvas\/\">Canvas<\/a> to make this feature work. <\/p>\n\n\t<\/div>\n\t<\/div>\n\n\n\n<div class=\"cnvs-block-toc cnvs-block-toc-1569597447269\" >\n\t<\/div>\n\n\n\n<p>Tempus ante condimentum sem hendrerit eu phasellus vidi et quis orci arcu quam augue. Hendrerit amet id a condimentum semper felis. Donec sed lorem feugiat aenean ante cras elementum pede. Quis eget blandit felis et.<\/p>\n\n\n\n<h2 id=\"list\" class=\"wp-block-heading\">List<\/h2>\n\n\n\n<p>Vici ac felis tellus in pretium. Etiam dui pretium eget vel laoreet cras rhoncus aenean imperdiet.<\/p>\n\n\n\t<div class=\"cnvs-block-posts cnvs-block-featured-posts-1569596324572 cnvs-block-posts-layout-horizontal-type-1\" data-layout=\"horizontal-type-1\" data-min-height=\"\">\n\t\t<div class=\"cs-posts-area\" data-posts-area=\"\">\n\t\t\t<div class=\"cs-posts-area__outer\">\n\t\t\t\t<div class=\"cs-posts-area__main cs-block-posts-layout-horizontal-type-1 cs-display-column cs-posts-area__image-width-half\">\n\t\t\t\t\t\n<article class=\"post-260 post type-post status-publish format-video has-post-thumbnail category-grc tag-critical-security-controls-version-8 tag-access-control tag-accesscontrol tag-account-management tag-accountmanagement tag-anti-malware tag-antimalware tag-antivirus tag-application-security tag-applicationsecurity tag-audit-log-management tag-auditlogmanagement tag-business-continuity tag-businesscontinuity tag-center-for-internet-security-cis-controls tag-cis-controls tag-cis-controls-18 tag-cis-controls-framework tag-cis-controls-list tag-cis-controls-v8 tag-ciscontrols tag-cloud-security-various-standards-like-csa-star tag-common-criteria-for-information-technology-security-evaluation tag-configuration-management tag-configurationmanagement tag-controlled-unclassified-information-cui-framework tag-cybersecurity tag-data-protection tag-data-recovery tag-data-security tag-dataprotection tag-datarecovery tag-datasecurity tag-defense-federal-acquisition-regulation-supplement-dfars-cybersecurity-requirements tag-disaster-recovery tag-disasterrecovery tag-email-protection tag-emailprotection tag-environmental-security tag-environmentalsecurity tag-etc tag-federal-information-security-management-act-fisma tag-federal-risk-and-authorization-management-program-fedramp tag-fedramp tag-general-data-protection-regulation-gdpr tag-hardware-control tag-hardware-inventory tag-hardwarecontrol tag-hardwareinventory tag-health-information-trust-alliance-hitrust-common-security-framework tag-health-insurance-portability-and-accountability-act-hipaa-security-rule tag-incident-response tag-incidentresponse tag-information-security-controls tag-international-electrotechnical-commission-iec-62443-industrial-automation-and-control-systems-security tag-international-traffic-in-arms-regulations-itar tag-intrusion-detection tag-intrusion-prevention tag-intrusiondetection tag-intrusionprevention tag-isms tag-isms-contosl tag-isms-security tag-isms-standards tag-iso-iec-270012013-information-security-management-system tag-malware-defense tag-malwaredefense tag-national-institute-of-standards-and-technology-nist-cybersecurity-framework tag-network-monitoring tag-network-security tag-networkmonitoring tag-networksecurity tag-north-american-electric-reliability-corporation-nerc-critical-infrastructure-protection-cip tag-password-management tag-password-security tag-passwordmanagement tag-patch-management tag-patchmanagement tag-payment-card-industry-data-security-standard-pci-dss tag-penetration-testing tag-phishing tag-phishing-and-social-engineering tag-physical-security tag-physicalsecurity tag-port-security tag-portsecurity tag-privilege-management tag-privilegemanagement tag-protocol-security tag-protocolsecurity tag-sarbanes-oxley-act-sox tag-secure-computing-practices tag-secure-configuration tag-secureconfiguration tag-security-awareness-training tag-security-incident-management tag-security-logging tag-securityincidentmanagement tag-securitylogging tag-soc-1-audit tag-soc-2-audit tag-software-control tag-software-inventory tag-software-security tag-softwarecontrol tag-softwareinventory tag-softwaresecurity tag-system-and-organization-controls-soc-for-cybersecurity tag-vulnerability-management tag-vulnerabilitymanagement tag-web-browser-protection tag-webbrowserprotection tag-wi-fi-security tag-wi-fisecurity tag-wifi-security tag-wireless-security tag-wirelesssecurity post_format-post-format-video cs-entry cs-video-wrap\">\n\t<div class=\"cs-entry__outer\">\n\t\t\t\t<div class=\"cs-entry__inner cs-entry__thumbnail cs-entry__overlay cs-overlay-ratio cs-ratio-landscape-3-2\">\n\t\t\t<div class=\"cs-overlay-background cs-overlay-transparent\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"380\" height=\"280\" src=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/Screenshot-2023-05-22-101827-380x280.png\" class=\"attachment-csco-thumbnail size-csco-thumbnail wp-post-image\" alt=\"@nootherjake: Cybersecurity Engineer &amp; Information Security Specialist | Penetration Testing, Governance,\u00a0Risk, and Compliance. CIS Control 1: Inventory and Control of Enterprise Assets\" \/>\n\t\t\t\t\n\t\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<a class=\"cs-overlay-link\" href=\"https:\/\/nootherjake.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets-critical-security-controls-version-8\/\"><\/a>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"cs-entry__inner cs-entry__content\">\n\t\t\t<div class=\"cs-entry__content-inner\">\n\t\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-category\"><ul class=\"post-categories\">\n\t<li><a href=\"https:\/\/nootherjake.com\/blog\/category\/grc\/\" rel=\"category tag\">Governance, Risk &amp; Compliance<\/a><\/li><\/ul><\/div><\/div>\t\t\t\t<a href=\"https:\/\/nootherjake.com\/blog\/cis-control-1-inventory-and-control-of-enterprise-assets-critical-security-controls-version-8\/\" class=\"cs-entry__title-wrapper\">\n\t\t\t\t\t<span class=\"cs-entry__title-effect\">\n\t\t\t\t\t\t\t<h2 class=\"cs-entry__title \">\n\t\tCIS Control 1: Inventory and Control of Enterprise Assets\t<\/h2>\n\t\t\t\t<p class=\"cs-entry__excerpt\">\n\t\t\t\tA step-by-step guide for implementing Governance, Risk &amp; Compliance audits for\t\t\t<\/p>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/a>\n\t\t\t<\/div>\n\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-author\"><span class=\"cs-by\">by<\/span><a class=\"cs-meta-author-inner url fn n\" href=\"https:\/\/nootherjake.com\/blog\/author\/fxmafia\/\" title=\"View all posts by Jake Adebayo\"><span class=\"cs-author\">Jake Adebayo<\/span><\/a><\/div><div class=\"cs-meta-date\">May 22, 2023<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\n\n\n<p>Vitae integer tempus eget sem aenean amet leo pretium nam enim dui nulla sed. Rutrum dolor <em>sapien<\/em> aenean consequat mollis ut justo arcu pellentesque quisque dis natoque nec. Pretium vitae blandit vel elit faucibus vici amet ridiculus. Aenean natoque ipsum eget. Sem varius justo pede veni feugiat. Maecenas vitae feugiat pellentesque.<\/p>\n\n\n\n<h2 id=\"side-widget\" class=\"wp-block-heading\">Side Widget<\/h2>\n\n\n\n<p>Maecenas ridiculus lorem sit vitae eu. Justo sit vulputate etiam vel pede natoque enim consequat metus tellus massa feugiat hendrerit.<\/p>\n\n\n\n<div class=\"cnvs-block-row cnvs-block-row-1569596440193 cnvs-block-row-columns-2\" >\n\t<div class=\"cnvs-block-row-inner\">\n\t\t\n\n<div class=\"cnvs-block-column cnvs-block-column-1569662174459\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\n\t<div class=\"cnvs-block-posts cnvs-block-featured-posts-1569662174453 cnvs-block-posts-layout-standard-type-1\" data-layout=\"standard-type-1\" data-min-height=\"\">\n\t\t<div class=\"cs-posts-area\" data-posts-area=\"\">\n\t\t\t<div class=\"cs-posts-area__outer\">\n\t\t\t\t<div class=\"cs-posts-area__main cs-block-posts-layout-standard-type-1 cs-display-column\">\n\t\t\t\t\t\n<article class=\"post-262 post type-post status-publish format-gallery has-post-thumbnail category-pentest tag-31 tag-breach tag-data tag-target post_format-post-format-gallery cs-entry cs-video-wrap\">\n\t<div class=\"cs-entry__outer\">\n\t\t\t\t<div class=\"cs-entry__inner cs-entry__thumbnail cs-entry__overlay cs-overlay-ratio cs-ratio-landscape-3-2\">\n\t\t\t<div class=\"cs-overlay-background cs-overlay-transparent\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"380\" height=\"280\" src=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/target-data-breach-380x280.jpg\" class=\"attachment-csco-thumbnail size-csco-thumbnail wp-post-image\" alt=\"\" \/>\n\t\t\t\t\n\t\t\t\t\t\t\t<span class=\"cs-entry-format\">\n\t\t\t\t<a class=\"cs-format-icon cs-format-gallery\" href=\"https:\/\/nootherjake.com\/blog\/target-data-breach\/\">\n\t\t\t\t\t<span class=\"cs-format-count\">3<\/span>\t\t\t\t<\/a>\n\t\t\t<\/span>\n\t\t\t\t\t\t<\/div>\n\n\t\t\t\n\t\t\t<a class=\"cs-overlay-link\" href=\"https:\/\/nootherjake.com\/blog\/target-data-breach\/\"><\/a>\n\t\t<\/div>\n\t\t\n\t\t<div class=\"cs-entry__inner cs-entry__content\">\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-category\"><ul class=\"post-categories\">\n\t<li><a href=\"https:\/\/nootherjake.com\/blog\/category\/pentest\/\" rel=\"category tag\">Penetration Testing<\/a><\/li><\/ul><\/div><\/div>\t\t\t<a href=\"https:\/\/nootherjake.com\/blog\/target-data-breach\/\" class=\"cs-entry__title-wrapper\">\n\t\t\t\t<span class=\"cs-entry__title-effect\">\n\t\t\t\t\t\t<h2 class=\"cs-entry__title \">\n\t\tCase-study &#8211; Target Data Breach  2013\t<\/h2>\n\t\t\t\t\t<\/span>\n\t\t\t<\/a>\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-author\"><span class=\"cs-by\">by<\/span><a class=\"cs-meta-author-inner url fn n\" href=\"https:\/\/nootherjake.com\/blog\/author\/fxmafia\/\" title=\"View all posts by Jake Adebayo\"><span class=\"cs-author\">Jake Adebayo<\/span><\/a><\/div><div class=\"cs-meta-date\">October 24, 2022<\/div><\/div>\t\t<\/div>\n\t<\/div>\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"cnvs-block-column cnvs-block-column-1569662174489\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\n\n<p>Consequat tincidunt hendrerit eu odio vulputate luctus eleifend dolor ligula. Magnis amet ante dapibus vidi phasellus ipsum venenatis integer pulvinar. Felis curabitur eu ipsum dapibus nisi hendrerit. Nec adipiscing feugiat quam et dui libero nullam rhoncus.<\/p>\n\n\n\n<p>Nullam penatibus ut. Nam elit natoque <strong>imperdiet<\/strong> fringilla vidi quis. Eu venenatis eleifend natoque orci ultricies sit eros ac nullam quam. Massa pede ridiculus tellus. <\/p>\n\n\n\n<p>Vel nam massa mus eget ligula porttitor et. Maecenas imperdiet dolor.Tempus ante condimentum sem hendrerit eu phasellus vidi et quis orci arcu quam augue. Hendrerit amet id a condimentum semper felis. Donec sed lorem feugiat aenean ante cras elementum pede. Quis eget blandit felis et.<\/p>\n\n\n\n<p>Sem aliquet aenean blandit libero faucibus nam mollis nulla ut eleifend. Vel vivamus rhoncus tempus ante nec amet imperdiet venenatis vitae.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n<\/div>\n\n\n\n<p>Massa a eleifend quis nunc mus justo nisi aenean penatibus nulla. Tempus pulvinar amet eget. In varius orci eget. Enim nulla etiam et nam id mollis nullam sit consectetuer magnis eu. Tempus ante lorem pede imperdiet nam etiam felis viverra. Nam et nec natoque aenean <strong>vivamus<\/strong> sapien amet vulputate ligula curabitur.<\/p>\n\n\n\n<h2 id=\"grid\" class=\"wp-block-heading\">Grid<\/h2>\n\n\n\n<p>Leo nec enim eget pulvinar sem ridiculus etiam elementum vitae. Ridiculus integer id pretium sit justo etiam curabitur orci pulvinar adipiscing vel.<\/p>\n\n\n\n<div class=\"wp-block-group\"><div class=\"wp-block-group__inner-container is-layout-flow wp-block-group-is-layout-flow\">\n<div class=\"cnvs-block-row cnvs-block-row-1584017270273 cnvs-block-row-columns-2\" >\n\t<div class=\"cnvs-block-row-inner\">\n\t\t\n\n<div class=\"cnvs-block-column cnvs-block-column-1584627172865\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\n\t<div class=\"cnvs-block-posts cnvs-block-posts-1584627172737 cnvs-block-posts-layout-tile-type-1\" data-layout=\"tile-type-1\" data-min-height=\"100%\">\n\t\t<div class=\"cs-posts-area\" data-posts-area=\"\">\n\t\t\t<div class=\"cs-posts-area__outer\">\n\t\t\t\t<div class=\"cs-posts-area__main cs-block-posts-layout-tile-type-1 cs-display-column\">\n\t\t\t\t\t\n<article class=\"post-277 post type-post status-publish format-gallery has-post-thumbnail category-pentest tag-buffer-overflow-attack-real-life-example tag-buffer-overflow-c tag-buffer-overflow-c-example tag-buffer-overflow-code-injection-example tag-buffer-overflow-command-line tag-buffer-overflow-example tag-how-to-avoid-buffer-overflow-in-c tag-how-to-check-buffer-overflow-in-c post_format-post-format-gallery cs-entry cs-video-wrap\">\n\t<div class=\"cs-entry__outer cs-entry__overlay cs-overlay-ratio cs-ratio-stretch\" data-scheme=\"inverse\">\n\t\t\t\t\t\t\t<div class=\"cs-entry__inner cs-entry__thumbnail\">\n\t\t\t\t\t<div class=\"cs-overlay-background\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"600\" src=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/program-C-error-output-find-buffer-overfiow-integer-array-injection-avoid-code-example-stack-2.png\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Buffer Overflow Attack Real-life Example, Buffer Overflow C, Buffer Overflow C Example, Buffer Overflow Code Injection Example, Buffer Overflow Command Line, Buffer Overflow Example, How To Avoid Buffer Overflow In C, How To Check Buffer Overflow In C\" srcset=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/program-C-error-output-find-buffer-overfiow-integer-array-injection-avoid-code-example-stack-2.png 600w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/program-C-error-output-find-buffer-overfiow-integer-array-injection-avoid-code-example-stack-2-300x300.png 300w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/program-C-error-output-find-buffer-overfiow-integer-array-injection-avoid-code-example-stack-2-150x150.png 150w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/program-C-error-output-find-buffer-overfiow-integer-array-injection-avoid-code-example-stack-2-80x80.png 80w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/program-C-error-output-find-buffer-overfiow-integer-array-injection-avoid-code-example-stack-2-110x110.png 110w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/program-C-error-output-find-buffer-overfiow-integer-array-injection-avoid-code-example-stack-2-380x380.png 380w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"cs-entry__inner cs-overlay-content cs-entry__content\">\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-category\"><ul class=\"post-categories\">\n\t<li><a href=\"https:\/\/nootherjake.com\/blog\/category\/pentest\/\" rel=\"category tag\">Penetration Testing<\/a><\/li><\/ul><\/div><\/div>\t\t\t<div class=\"cs-entry__content-inner\">\n\t\t\t\t<a href=\"https:\/\/nootherjake.com\/blog\/buffer-overflow-stack-overflow-c-programming-lab-project\/\" class=\"cs-entry__title-wrapper\">\n\t\t\t\t\t<span class=\"cs-entry__title-effect\">\n\t\t\t\t\t\t\t<h2 class=\"cs-entry__title \">\n\t\tBuffer Overflow &#8211; Stack overflow &#8211; C Programming  Lab Project\t<\/h2>\n\t\t\t\t<p class=\"cs-entry__excerpt\">\n\t\t\t\tCongratulations, you have mitigated the overflow!\t\t\t<\/p>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/a>\n\t\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-author\"><span class=\"cs-by\">by<\/span><a class=\"cs-meta-author-inner url fn n\" href=\"https:\/\/nootherjake.com\/blog\/author\/fxmafia\/\" title=\"View all posts by Jake Adebayo\"><span class=\"cs-author\">Jake Adebayo<\/span><\/a><\/div><div class=\"cs-meta-date\">February 24, 2020<\/div><\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<a href=\"https:\/\/nootherjake.com\/blog\/buffer-overflow-stack-overflow-c-programming-lab-project\/\" class=\"cs-overlay-link\"><\/a>\n\t<\/div>\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\n\n<div class=\"cnvs-block-column cnvs-block-column-1584627172954\" >\n\t<div class=\"cnvs-block-column-inner\">\n\t\t<div>\n\t\t\t\n\t<div class=\"cnvs-block-posts cnvs-block-posts-1584627172924 cnvs-block-posts-layout-tile-type-1\" data-layout=\"tile-type-1\" data-min-height=\"100%\">\n\t\t<div class=\"cs-posts-area\" data-posts-area=\"\">\n\t\t\t<div class=\"cs-posts-area__outer\">\n\t\t\t\t<div class=\"cs-posts-area__main cs-block-posts-layout-tile-type-1 cs-display-column\">\n\t\t\t\t\t\n<article class=\"post-281 post type-post status-publish format-standard has-post-thumbnail category-incident-response tag-buffer-overflow-attack-real-life-example tag-buffer-overflow-c tag-buffer-overflow-c-example tag-buffer-overflow-code-injection-example tag-buffer-overflow-command-line tag-buffer-overflow-example tag-how-to-avoid-buffer-overflow-in-c tag-how-to-check-buffer-overflow-in-c cs-entry cs-video-wrap\">\n\t<div class=\"cs-entry__outer cs-entry__overlay cs-overlay-ratio cs-ratio-stretch\" data-scheme=\"inverse\">\n\t\t\t\t\t\t\t<div class=\"cs-entry__inner cs-entry__thumbnail\">\n\t\t\t\t\t<div class=\"cs-overlay-background\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" width=\"768\" height=\"440\" src=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/c-pogramming-language-768x440.jpeg\" class=\"attachment-medium_large size-medium_large wp-post-image\" alt=\"Buffer Overflow Attack Real-life Example, Buffer Overflow C, Buffer Overflow C Example, Buffer Overflow Code Injection Example, Buffer Overflow Command Line, Buffer Overflow Example, How To Avoid Buffer Overflow In C, How To Check Buffer Overflow In C\" srcset=\"https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/c-pogramming-language-768x440.jpeg 768w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/c-pogramming-language-300x172.jpeg 300w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/c-pogramming-language-1024x587.jpeg 1024w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/c-pogramming-language-380x218.jpeg 380w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/c-pogramming-language-800x459.jpeg 800w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/c-pogramming-language-1160x665.jpeg 1160w, https:\/\/nootherjake.com\/blog\/wp-content\/uploads\/2020\/02\/c-pogramming-language.jpeg 1200w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"cs-entry__inner cs-overlay-content cs-entry__content\">\n\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-category\"><ul class=\"post-categories\">\n\t<li><a href=\"https:\/\/nootherjake.com\/blog\/category\/incident-response\/\" rel=\"category tag\">Incident Response<\/a><\/li><\/ul><\/div><\/div>\t\t\t<div class=\"cs-entry__content-inner\">\n\t\t\t\t<a href=\"https:\/\/nootherjake.com\/blog\/c-program-to-compare-the-two-strings\/\" class=\"cs-entry__title-wrapper\">\n\t\t\t\t\t<span class=\"cs-entry__title-effect\">\n\t\t\t\t\t\t\t<h2 class=\"cs-entry__title \">\n\t\tC Program to Compare the Two Strings\t<\/h2>\n\t\t\t\t<p class=\"cs-entry__excerpt\">\n\t\t\t\tWrite a program to compare two strings by passing them to a function\t\t\t<\/p>\n\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t<\/a>\n\t\t\t\t<div class=\"cs-entry__post-meta\" ><div class=\"cs-meta-author\"><span class=\"cs-by\">by<\/span><a class=\"cs-meta-author-inner url fn n\" href=\"https:\/\/nootherjake.com\/blog\/author\/fxmafia\/\" title=\"View all posts by Jake Adebayo\"><span class=\"cs-author\">Jake Adebayo<\/span><\/a><\/div><div class=\"cs-meta-date\">February 23, 2020<\/div><\/div>\t\t\t<\/div>\n\t\t<\/div>\n\t\t<a href=\"https:\/\/nootherjake.com\/blog\/c-program-to-compare-the-two-strings\/\" class=\"cs-overlay-link\"><\/a>\n\t<\/div>\n<\/article>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\n\t\t\t\t\t<\/div>\n\n\t\t\t<\/div>\n\t\n\t\t<\/div>\n\t<\/div>\n<\/div>\n\n\t<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<p>Enim tellus quam vici phasellus nam elit. Donec libero leo nam ante sem eget condimentum nec veni felis enim quisque vitae. Tincidunt eget quisque rhoncus sem penatibus donec quam vulputate quis ipsum lorem.<\/p>\n\n\n\n<p>Eu nunc donec. Orci etiam lorem nisi eu fringilla eget vel dis dapibus ultricies justo. Curabitur <em>tincidunt cras<\/em> porttitor. Enim vidi dapibus aenean pretium quis et nullam etiam.<\/p>\n\n\n\n<p>Nam vici ut quis semper consectetuer tempus sit quam vitae enim. In parturient ipsum penatibus enim lorem vitae eget venenatis sit ligula. Dapibus maecenas ultricies enim ante ligula. Condimentum amet montes imperdiet aenean rhoncus donec etiam. Vivamus sit nec amet ipsum vitae nam viverra justo lorem vel. Pellentesque vulputate consectetuer amet.<\/p>\n","protected":false},"excerpt":{"rendered":"Tempus ante condimentum sem hendrerit eu phasellus vidi et quis orci arcu quam augue. Hendrerit amet id a&hellip;\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"csco_singular_sidebar":"default","csco_page_header_type":"default","csco_page_load_nextpost":"default","csco_post_video_location":[],"csco_post_video_url":"","csco_post_video_bg_start_time":0,"csco_post_video_bg_end_time":0,"footnotes":""},"class_list":{"0":"post-345","1":"page","2":"type-page","3":"status-publish","5":"cs-entry","6":"cs-video-wrap"},"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/pages\/345","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/comments?post=345"}],"version-history":[{"count":0,"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/pages\/345\/revisions"}],"wp:attachment":[{"href":"https:\/\/nootherjake.com\/blog\/wp-json\/wp\/v2\/media?parent=345"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}