{"id":5906,"date":"2025-08-24T12:39:30","date_gmt":"2025-08-24T09:39:30","guid":{"rendered":"https:\/\/kriminalbilisim.com\/mersin-digital-forensics-investigation\/"},"modified":"2025-09-23T01:01:16","modified_gmt":"2025-09-22T22:01:16","slug":"mersin-digital-forensics-investigation","status":"publish","type":"page","link":"https:\/\/kriminalbilisim.com\/en\/mersin-digital-forensics-investigation\/","title":{"rendered":"Mersin Digital Forensics Investigation"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"5906\" class=\"elementor elementor-5906 elementor-4491\" data-elementor-post-type=\"page\">\n\t\t\t\t<div class=\"elementor-element elementor-element-52e6933 e-flex e-con-boxed e-con e-parent\" data-id=\"52e6933\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-b9c4e03 elementor-widget elementor-widget-text-editor\" data-id=\"b9c4e03\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<h1 data-start=\"0\" data-end=\"69\"><span style=\"color: #000000;\">Mersin Digital Forensics Investigation \u2013 DNA Criminal and Computer Forensics Consulting<\/span><\/h1><p data-start=\"71\" data-end=\"485\"><span style=\"color: #000000;\"><strong data-start=\"71\" data-end=\"98\">Mersin digital forensics investigation<\/strong> provides end-to-end solutions for <strong data-start=\"160\" data-end=\"179\">cybercrime<\/strong>, <strong data-start=\"181\" data-end=\"207\">digital evidence analysis<\/strong>, and <strong data-start=\"211\" data-end=\"229\">cybersecurity<\/strong> needs in this port and logistics-focused city. <strong data-start=\"267\" data-end=\"312\">DNA Criminal and Computer Forensics Consulting<\/strong> produces court-admissible and traceable results through Mersin <strong data-start=\"324\" data-end=\"340\">computer forensics<\/strong>, <strong data-start=\"342\" data-end=\"359\">data recovery<\/strong>, <strong data-start=\"361\" data-end=\"385\">mobile device analysis<\/strong>, and <strong data-start=\"387\" data-end=\"422\">email and social media analysis<\/strong> services.<\/span><\/p><hr data-start=\"487\" data-end=\"490\"><h2 data-start=\"492\" data-end=\"573\"><span style=\"color: #000000;\">Why are Mersin Digital Forensics and Mersin Computer Forensics Services Necessary?<\/span><\/h2><ul data-start=\"574\" data-end=\"1168\"><li data-start=\"574\" data-end=\"752\"><p data-start=\"576\" data-end=\"752\"><span style=\"color: #000000;\"><strong data-start=\"576\" data-end=\"611\">Digital evidence collection &amp; analysis:<\/strong> <strong data-start=\"680\" data-end=\"698\">Forensic imaging<\/strong>, <strong data-start=\"700\" data-end=\"715\">log analysis<\/strong>, and <strong data-start=\"719\" data-end=\"749\">timeline<\/strong> from computers, servers, cloud accounts, mobile devices, and external media.<\/span><\/p><\/li><li data-start=\"753\" data-end=\"920\"><p data-start=\"755\" data-end=\"920\"><span style=\"color: #000000;\"><strong data-start=\"755\" data-end=\"780\">Cyber threat detection:<\/strong> Technical investigation of <strong data-start=\"781\" data-end=\"806\">phishing<\/strong>, <strong data-start=\"808\" data-end=\"827\">malware<\/strong>, <strong data-start=\"829\" data-end=\"856\">corporate data leaks<\/strong>, and <strong data-start=\"860\" data-end=\"887\">financial fraud<\/strong> cases.<\/span><\/p><\/li><li data-start=\"921\" data-end=\"1072\"><p data-start=\"923\" data-end=\"1072\"><span style=\"color: #000000;\"><strong data-start=\"923\" data-end=\"948\">Legal process support:<\/strong> <strong data-start=\"949\" data-end=\"983\">Expert witness qualified forensic reports<\/strong>, <strong data-start=\"985\" data-end=\"1015\">chain of custody<\/strong> management, and court-admissible documentation.<\/span><\/p><\/li><li data-start=\"1073\" data-end=\"1168\"><p data-start=\"1075\" data-end=\"1168\"><span style=\"color: #000000;\"><strong data-start=\"1075\" data-end=\"1090\">KVKK compliance:<\/strong> <strong data-start=\"1125\" data-end=\"1156\">Cybersecurity consulting<\/strong> and auditing in compliance with <strong data-start=\"1091\" data-end=\"1099\">KVKK<\/strong> and related regulations.<\/span><\/p><\/li><\/ul><p data-start=\"1170\" data-end=\"1367\"><span style=\"color: #000000;\">As <strong data-start=\"1170\" data-end=\"1202\">DNA Criminal and Computer Forensics<\/strong>, we conduct <strong data-start=\"1211\" data-end=\"1238\">Mersin digital forensics investigation<\/strong> processes for both individuals and organizations using a methodology that is fast, traceable, and preserves <strong data-start=\"1307\" data-end=\"1328\">evidence integrity<\/strong>.<\/span><\/p><hr data-start=\"1369\" data-end=\"1372\"><h2 data-start=\"1374\" data-end=\"1416\"><span style=\"color: #000000;\">Mersin Digital Forensics Investigation \u2013 our Services<\/span><\/h2><h3 data-start=\"1418\" data-end=\"1467\"><span style=\"color: #000000;\">Mersin Computer Forensics and Digital Evidence Analysis<\/span><\/h3><ul data-start=\"1468\" data-end=\"1753\"><li data-start=\"1468\" data-end=\"1566\"><p data-start=\"1470\" data-end=\"1566\"><span style=\"color: #000000;\">Analysis of <strong data-start=\"1534\" data-end=\"1552\">forensic images<\/strong> acquired on-site by law enforcement or in laboratory<\/span><\/p><\/li><li data-start=\"1567\" data-end=\"1681\"><p data-start=\"1569\" data-end=\"1681\"><span style=\"color: #000000;\">Deep analysis of <strong data-start=\"1569\" data-end=\"1589\">file systems<\/strong>, <strong data-start=\"1591\" data-end=\"1612\">email archives<\/strong>, <strong data-start=\"1614\" data-end=\"1634\">chat logs<\/strong>, and <strong data-start=\"1638\" data-end=\"1657\">cloud accounts<\/strong><\/span><\/p><\/li><li data-start=\"1682\" data-end=\"1753\"><p data-start=\"1684\" data-end=\"1753\"><span style=\"color: #000000;\"><strong data-start=\"1684\" data-end=\"1720\">Expert witness standard reporting<\/strong> and <strong data-start=\"1737\" data-end=\"1753\">expert opinion<\/strong> when required<\/span><\/p><\/li><\/ul><h3 data-start=\"1755\" data-end=\"1787\"><span style=\"color: #000000;\">Mersin Data Recovery and Mersin Forensic Analysis<\/span><\/h3><ul data-start=\"1788\" data-end=\"1964\"><li data-start=\"1788\" data-end=\"1873\"><p data-start=\"1790\" data-end=\"1873\"><span style=\"color: #000000;\"><strong data-start=\"1790\" data-end=\"1815\">Data recovery Mersin:<\/strong> recovery from deleted, encrypted, or damaged media<\/span><\/p><\/li><li data-start=\"1874\" data-end=\"1964\"><p data-start=\"1876\" data-end=\"1964\"><span style=\"color: #000000;\"><strong data-start=\"1932\" data-end=\"1948\">Verification<\/strong> and reporting of recovered data according to <strong>Mersin computer forensics<\/strong> criteria<\/span><\/p><\/li><\/ul><h3 data-start=\"1966\" data-end=\"2008\"><span style=\"color: #000000;\">Mersin Cybersecurity Consulting and Testing<\/span><\/h3><ul data-start=\"2009\" data-end=\"2240\"><li data-start=\"2009\" data-end=\"2101\"><p data-start=\"2011\" data-end=\"2101\"><span style=\"color: #000000;\"><strong data-start=\"2011\" data-end=\"2053\">Penetration testing Mersin<\/strong>, vulnerability scanning, <strong data-start=\"2073\" data-end=\"2099\">configuration audit<\/strong><\/span><\/p><\/li><li data-start=\"2102\" data-end=\"2189\"><p data-start=\"2104\" data-end=\"2189\"><span style=\"color: #000000;\"><strong data-start=\"2104\" data-end=\"2126\">Incident response (IR)<\/strong>, <strong data-start=\"2128\" data-end=\"2149\">forensic log management<\/strong>, <strong data-start=\"2151\" data-end=\"2187\">threat hunting<\/strong><\/span><\/p><\/li><li data-start=\"2190\" data-end=\"2240\"><p data-start=\"2192\" data-end=\"2240\"><span style=\"color: #000000;\">Technical and administrative measure recommendations focused on <strong data-start=\"2192\" data-end=\"2200\">Mersin KVKK<\/strong><\/span><\/p><\/li><\/ul><h3 data-start=\"2242\" data-end=\"2266\"><span style=\"color: #000000;\">Mersin Mobile Device Analysis<\/span><\/h3><ul data-start=\"2267\" data-end=\"2459\"><li data-start=\"2267\" data-end=\"2381\"><p data-start=\"2269\" data-end=\"2381\"><span style=\"color: #000000;\"><strong data-start=\"2362\" data-end=\"2379\">Forensic extraction<\/strong> of <strong data-start=\"2297\" data-end=\"2338\">WhatsApp, Telegram, SMS, location data<\/strong> and media content from <strong data-start=\"2269\" data-end=\"2284\">iOS\/Android<\/strong> devices<\/span><\/p><\/li><li data-start=\"2382\" data-end=\"2459\"><p data-start=\"2384\" data-end=\"2459\"><span style=\"color: #000000;\">Analysis of application data, configuration elements and <strong data-start=\"2427\" data-end=\"2451\">residual artifacts<\/strong><\/span><\/p><\/li><\/ul><h3 data-start=\"2461\" data-end=\"2496\"><span style=\"color: #000000;\">Email and Social Media Analysis<\/span><\/h3><ul data-start=\"2497\" data-end=\"2666\"><li data-start=\"2497\" data-end=\"2595\"><p data-start=\"2499\" data-end=\"2595\"><span style=\"color: #000000;\">Investigation of <strong data-start=\"2499\" data-end=\"2533\">email spoofing<\/strong>, phishing, fake accounts and <strong data-start=\"2560\" data-end=\"2582\">reputation attacks<\/strong><\/span><\/p><\/li><li data-start=\"2596\" data-end=\"2666\"><p data-start=\"2598\" data-end=\"2666\"><span style=\"color: #000000;\"><strong data-start=\"2598\" data-end=\"2620\">Social engineering<\/strong> traces and archiving compliant with <strong data-start=\"2631\" data-end=\"2650\">chain of evidence<\/strong><\/span><\/p><\/li><\/ul><blockquote data-start=\"2668\" data-end=\"2920\"><p data-start=\"2670\" data-end=\"2920\"><span style=\"color: #000000;\"><strong data-start=\"2670\" data-end=\"2698\">Natural keywords:<\/strong> <em data-start=\"2699\" data-end=\"2920\">Mersin digital forensics investigation, Mersin computer forensics, digital evidence analysis Mersin, cybersecurity consulting Mersin, data recovery Mersin, mobile device analysis Mersin, penetration testing Mersin, expert report, KVKK compliance.<\/em><\/span><\/p><\/blockquote><hr data-start=\"2922\" data-end=\"2925\"><h2 data-start=\"2927\" data-end=\"2970\"><span style=\"color: #000000;\">Mersin Digital Forensics Investigation, Mersin Computer Forensics,<\/span><\/h2><h2 data-start=\"2927\" data-end=\"2970\"><span style=\"color: #000000;\">Mersin Data Recovery<\/span><\/h2><ul data-start=\"2971\" data-end=\"3295\"><li data-start=\"2971\" data-end=\"3045\"><p data-start=\"2973\" data-end=\"3045\"><span style=\"color: #000000;\"><strong data-start=\"2973\" data-end=\"3000\">Corporate data breach<\/strong> and <strong data-start=\"3004\" data-end=\"3029\">intellectual property violation<\/strong> investigations<\/span><\/p><\/li><li data-start=\"3046\" data-end=\"3132\"><p data-start=\"3048\" data-end=\"3132\"><span style=\"color: #000000;\"><strong data-start=\"3048\" data-end=\"3077\">E-commerce fraud<\/strong>, payment fraud and <strong data-start=\"3101\" data-end=\"3115\">chargeback<\/strong> disputes<\/span><\/p><\/li><li data-start=\"3133\" data-end=\"3207\"><p data-start=\"3135\" data-end=\"3207\"><span style=\"color: #000000;\"><strong data-start=\"3135\" data-end=\"3157\">Employee misconduct<\/strong>, unfair competition and contract violation investigations<\/span><\/p><\/li><li data-start=\"3208\" data-end=\"3295\"><p data-start=\"3210\" data-end=\"3295\"><span style=\"color: #000000;\"><strong data-start=\"3264\" data-end=\"3295\">Digital evidence acquisition<\/strong> in <strong data-start=\"3210\" data-end=\"3225\">family law<\/strong> and <strong data-start=\"3229\" data-end=\"3251\">personal injury<\/strong> cases<\/span><\/p><\/li><\/ul><hr data-start=\"3297\" data-end=\"3300\"><h2 data-start=\"3302\" data-end=\"3376\"><span style=\"color: #000000;\">Mersin Computer Forensics, Our Methodology: Transparent, Traceable, Court-Admissible<\/span><\/h2><ol data-start=\"3377\" data-end=\"3799\"><li data-start=\"3377\" data-end=\"3461\"><p data-start=\"3380\" data-end=\"3461\"><span style=\"color: #000000;\"><strong data-start=\"3380\" data-end=\"3419\">Initial assessment &amp; scope definition<\/strong> \u2013 Clarification of needs and objectives<\/span><\/p><\/li><li data-start=\"3462\" data-end=\"3559\"><p data-start=\"3465\" data-end=\"3559\"><span style=\"color: #000000;\"><strong data-start=\"3465\" data-end=\"3484\">Evidence security<\/strong> \u2013 <strong data-start=\"3522\" data-end=\"3542\">Chain of custody<\/strong> documentation with gas bags, seals, and <strong data-start=\"3509\" data-end=\"3517\">hash<\/strong><\/span><\/p><\/li><li data-start=\"3560\" data-end=\"3634\"><p data-start=\"3563\" data-end=\"3634\"><span style=\"color: #000000;\"><strong data-start=\"3563\" data-end=\"3598\">Forensic imaging &amp; laboratory analysis<\/strong> \u2013 Working only with copies<\/span><\/p><\/li><li data-start=\"3635\" data-end=\"3724\"><p data-start=\"3638\" data-end=\"3724\"><span style=\"color: #000000;\"><strong data-start=\"3638\" data-end=\"3664\">Correlation of findings<\/strong> \u2013 Timeline, log matching, and event flow reconstruction<\/span><\/p><\/li><li data-start=\"3725\" data-end=\"3799\"><p data-start=\"3728\" data-end=\"3799\"><span style=\"color: #000000;\"><strong data-start=\"3728\" data-end=\"3746\">Report and presentation<\/strong> \u2013 Clear, technical and <strong data-start=\"3765\" data-end=\"3793\">court-admissible<\/strong> report<\/span><\/p><\/li><\/ol><hr data-start=\"3801\" data-end=\"3804\"><h2 data-start=\"3806\" data-end=\"3857\"><span style=\"color: #000000;\">Why DNA Criminal and Computer Forensics Consultancy?<\/span><\/h2><ul data-start=\"3858\" data-end=\"4203\"><li data-start=\"3858\" data-end=\"3937\"><p data-start=\"3860\" data-end=\"3937\"><span style=\"color: #000000;\"><strong data-start=\"3860\" data-end=\"3886\">Mersin-focused experience:<\/strong> Logistics, port, food, manufacturing, and SME ecosystem<\/span><\/p><\/li><li data-start=\"3938\" data-end=\"4045\"><p data-start=\"3940\" data-end=\"4045\"><span style=\"color: #000000;\"><strong data-start=\"3940\" data-end=\"3961\">Current toolset:<\/strong> Industry-standard <strong data-start=\"3981\" data-end=\"3997\">computer forensics<\/strong>, <strong data-start=\"3999\" data-end=\"4015\">mobile analysis<\/strong> and <strong data-start=\"4019\" data-end=\"4029\">SOC\/IR<\/strong> technologies<\/span><\/p><\/li><li data-start=\"4046\" data-end=\"4120\"><p data-start=\"4048\" data-end=\"4120\"><span style=\"color: #000000;\"><strong data-start=\"4048\" data-end=\"4065\">Quick access:<\/strong> <strong data-start=\"4098\" data-end=\"4118\">On-site response<\/strong> in central districts and surrounding provinces<\/span><\/p><\/li><li data-start=\"4121\" data-end=\"4203\"><p data-start=\"4123\" data-end=\"4203\"><span style=\"color: #000000;\"><strong data-start=\"4123\" data-end=\"4145\">Trust and confidentiality:<\/strong> Strict <strong data-start=\"4151\" data-end=\"4176\">non-disclosure agreements<\/strong>, <strong data-start=\"4178\" data-end=\"4186\">GDPR<\/strong> and <strong data-start=\"4190\" data-end=\"4198\">ethical<\/strong> compliance<\/span><\/p><\/li><\/ul><hr data-start=\"4205\" data-end=\"4208\"><h2 data-start=\"4210\" data-end=\"4255\"><span style=\"color: #000000;\">Mersin Digital Forensics Investigation and Mersin Computer Forensics Analysis<\/span><\/h2><p data-start=\"4256\" data-end=\"4495\"><span style=\"color: #000000;\"><strong data-start=\"4256\" data-end=\"4376\">Akdeniz, Toroslar, Yeni\u015fehir, Mezitli, Tarsus, Silifke, Erdemli, Anamur, Mut, G\u00fclnar, Bozyaz\u0131, Ayd\u0131nc\u0131k, \u00c7aml\u0131yayla.<\/strong><\/span><br data-start=\"4376\" data-end=\"4379\"><span style=\"color: #000000;\"><em data-start=\"4379\" data-end=\"4495\">Note: <strong data-start=\"4416\" data-end=\"4444\">On-site digital forensics<\/strong> and <strong data-start=\"4448\" data-end=\"4471\">remote forensic analysis<\/strong> options are available throughout Mersin and surrounding provinces.<\/em><\/span><\/p><hr data-start=\"4497\" data-end=\"4500\"><h2 data-start=\"4502\" data-end=\"4530\"><span style=\"color: #000000;\">Frequently Asked Questions (FAQ)<\/span><\/h2><p data-start=\"4532\" data-end=\"4717\"><span style=\"color: #000000;\"><strong data-start=\"4532\" data-end=\"4597\">How long does the Mersin digital forensics \/ computer forensics process take?<\/strong><\/span><br data-start=\"4597\" data-end=\"4600\"><span style=\"color: #000000;\">It depends on the case scope, data volume, and device type. A detailed work plan and schedule will be shared after initial assessment. <\/span><\/p><p data-start=\"4719\" data-end=\"4914\"><span style=\"color: #000000;\"><strong data-start=\"4719\" data-end=\"4765\">Can deleted data be fully recovered?<\/strong><\/span><br data-start=\"4765\" data-end=\"4768\"><span style=\"color: #000000;\">Success depends on device condition, new data overwrites, and file system. Maximum recovery is targeted using <strong data-start=\"4849\" data-end=\"4871\">forensic data recovery<\/strong> approach.<\/span><\/p><p data-start=\"4916\" data-end=\"5075\"><span style=\"color: #000000;\"><strong data-start=\"4916\" data-end=\"4955\">Are the reports valid in court?<\/strong><\/span><br data-start=\"4955\" data-end=\"4958\"><span style=\"color: #000000;\">Our reports are prepared according to <strong data-start=\"4971\" data-end=\"4987\">computer forensics<\/strong> standards, supported by <strong data-start=\"5020\" data-end=\"5039\">evidence integrity<\/strong> and methodology documentation.<\/span><\/p><p data-start=\"5077\" data-end=\"5232\"><span style=\"color: #000000;\"><strong data-start=\"5077\" data-end=\"5116\">Can you perform remote analysis?<\/strong><\/span><br data-start=\"5116\" data-end=\"5119\"><span style=\"color: #000000;\">Yes. <strong data-start=\"5141\" data-end=\"5172\">Remote collection and examination<\/strong> is performed in suitable cases; supported by <strong data-start=\"5195\" data-end=\"5215\">on-site intervention<\/strong> when necessary. <\/span><\/p><h2><span style=\"color: #333399;\">Contact<\/span><\/h2><p><span style=\"color: #000000;\"><strong><img decoding=\"async\" class=\"emoji\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f3af.svg\" alt=\"\ud83c\udfaf\" title=\"\"><\/strong>  For technical support, forensic reporting, and professional defense;<\/span><\/p><p data-start=\"1307\" data-end=\"1415\"><span style=\"color: #0000ff;\"><img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4e9.svg\" alt=\"\ud83d\udce9\" width=\"21\" height=\"21\" title=\"\"> <strong data-start=\"1388\" data-end=\"1415\"><a style=\"color: #0000ff;\" href=\"http:\/\/www.kriminalbilisim.com\" target=\"_blank\" rel=\"noopener\" data-start=\"1390\" data-end=\"1413\">www.kriminalbilisim.com<\/a><\/strong><\/span><\/p><p data-start=\"1417\" data-end=\"1463\"><span style=\"color: #0000ff;\"> <a style=\"color: #0000ff;\" href=\"https:\/\/api.whatsapp.com\/send\/?phone=905526761100&amp;text&amp;type=phone_number&amp;app_absent=0\" target=\"_blank\" rel=\"noopener nofollow\"><img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4de.svg\" alt=\"\ud83d\udcde\" width=\"24\" height=\"24\" title=\"\"><strong> 0552 676 11 00<\/strong><\/a> \u2013 <img decoding=\"async\" class=\"\" role=\"img\" draggable=\"false\" src=\"https:\/\/s.w.org\/images\/core\/emoji\/16.0.1\/svg\/1f4e7.svg\" alt=\"\ud83d\udce7\" width=\"22\" height=\"22\" title=\"\"> <a style=\"color: #0000ff;\" href=\"https:\/\/mail.google.com\/mail\/u\/0\/?fs=1&amp;tf=cm&amp;source=mailto&amp;to=dna@kriminalbilisim.com\" target=\"_blank\" rel=\"noopener\" data-start=\"1440\" data-end=\"1463\">dna@kriminalbilisim.com<\/a> <\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Mersin Digital Forensics Investigation \u2013 DNA Criminal and Computer Forensics Consulting Mersin digital forensics investigation provides end-to-end solutions for cybercrime, digital evidence analysis, and cybersecurity needs in this port and logistics-focused city. DNA Criminal and Computer Forensics Consulting produces court-admissible and traceable results through Mersin computer forensics, data recovery, mobile device analysis, and email and [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-5906","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/5906","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/comments?post=5906"}],"version-history":[{"count":0,"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/pages\/5906\/revisions"}],"wp:attachment":[{"href":"https:\/\/kriminalbilisim.com\/en\/wp-json\/wp\/v2\/media?parent=5906"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}