{"id":307,"date":"2024-08-22T21:03:51","date_gmt":"2024-08-22T19:03:51","guid":{"rendered":"https:\/\/hacking.museum\/?page_id=307"},"modified":"2024-08-22T21:13:12","modified_gmt":"2024-08-22T19:13:12","slug":"blog-post","status":"publish","type":"page","link":"http:\/\/hacking.museum\/index.php\/blog-post\/","title":{"rendered":"Blog Post"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">Recent post<\/h2>\n\n\n<ul class=\"wp-block-latest-posts__list wp-block-latest-posts\"><li><a class=\"wp-block-latest-posts__post-title\" href=\"http:\/\/hacking.museum\/index.php\/2025\/09\/07\/booting-stuff-1976-style-on-a-real-altair-8800-retrocomputer\/\">Booting stuff 1976 style on a real Altair 8800 retrocomputer<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"http:\/\/hacking.museum\/index.php\/2025\/06\/05\/teletype-model-33-precision-horology-for-the-computer-age-aka-the-clackety-clack-that-time-forgot\/\">Teletype Model 33: Precision Horology for the Computer Age (aka, the Clackety-Clack That Time Forgot)<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"http:\/\/hacking.museum\/index.php\/2024\/11\/07\/code-protection-battle-1980s-style-how-to-turn-basic-into-a-fortress-or-a-maze-of-despair\/\">Code Protection Battle: 1980s Style! How to Turn BASIC Into a Fortress (or a Maze of Despair)<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"http:\/\/hacking.museum\/index.php\/2024\/08\/22\/atari-modems-and-the-accidental-hacker-a-journey-back-to-1985\/\">Atari, Modems, and the \u201cAccidental\u201d Hacker: A Journey Back to 1985<\/a><\/li>\n<li><a class=\"wp-block-latest-posts__post-title\" href=\"http:\/\/hacking.museum\/index.php\/2024\/08\/20\/ping-google-from-a-computer-older-than-the-internet-because-why-not\/\">Ping Google from a Computer Older than the Internet: Because Why Not?<\/a><\/li>\n<\/ul>\n\n\n<h2 class=\"wp-block-heading\">Archive<\/h2>\n\n\n<ul class=\"wp-block-archives-list wp-block-archives\">\t<li><a href='http:\/\/hacking.museum\/index.php\/2025\/09\/'>September 2025<\/a><\/li>\n\t<li><a href='http:\/\/hacking.museum\/index.php\/2025\/06\/'>June 2025<\/a><\/li>\n\t<li><a href='http:\/\/hacking.museum\/index.php\/2024\/11\/'>November 2024<\/a><\/li>\n\t<li><a href='http:\/\/hacking.museum\/index.php\/2024\/08\/'>August 2024<\/a><\/li>\n<\/ul>\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Recent post Archive<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"class_list":["post-307","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/hacking.museum\/index.php\/wp-json\/wp\/v2\/pages\/307","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/hacking.museum\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/hacking.museum\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/hacking.museum\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/hacking.museum\/index.php\/wp-json\/wp\/v2\/comments?post=307"}],"version-history":[{"count":4,"href":"http:\/\/hacking.museum\/index.php\/wp-json\/wp\/v2\/pages\/307\/revisions"}],"predecessor-version":[{"id":314,"href":"http:\/\/hacking.museum\/index.php\/wp-json\/wp\/v2\/pages\/307\/revisions\/314"}],"wp:attachment":[{"href":"http:\/\/hacking.museum\/index.php\/wp-json\/wp\/v2\/media?parent=307"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}