MediaWiki API result

This is the HTML representation of the JSON format. HTML is good for debugging, but is unsuitable for application use.

Specify the format parameter to change the output format. To see the non-HTML representation of the JSON format, set format=json.

See the complete documentation, or the API help for more information.

{
    "batchcomplete": "",
    "continue": {
        "aicontinue": "Toc_icon.svg",
        "continue": "-||"
    },
    "query": {
        "allimages": [
            {
                "name": "Case_studies.svg",
                "timestamp": "2012-08-06T14:46:34Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/Case_studies.svg",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:Case_studies.svg",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=274",
                "ns": 6,
                "title": "File:Case studies.svg"
            },
            {
                "name": "H2o_icon.svg",
                "timestamp": "2012-08-06T14:48:52Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/H2o_icon.svg",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:H2o_icon.svg",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=275",
                "ns": 6,
                "title": "File:H2o icon.svg"
            },
            {
                "name": "Help_icon.svg",
                "timestamp": "2012-08-06T14:54:22Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/Help_icon.svg",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:Help_icon.svg",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=276",
                "ns": 6,
                "title": "File:Help icon.svg"
            },
            {
                "name": "Help_icon2.svg",
                "timestamp": "2012-08-06T14:56:30Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/Help_icon2.svg",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:Help_icon2.svg",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=277",
                "ns": 6,
                "title": "File:Help icon2.svg"
            },
            {
                "name": "Help_icon3.svg",
                "timestamp": "2012-08-06T14:59:00Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/Help_icon3.svg",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:Help_icon3.svg",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=278",
                "ns": 6,
                "title": "File:Help icon3.svg"
            },
            {
                "name": "Help_icon4.svg",
                "timestamp": "2012-08-06T15:01:34Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/Help_icon4.svg",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:Help_icon4.svg",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=279",
                "ns": 6,
                "title": "File:Help icon4.svg"
            },
            {
                "name": "Lin-Cyber_Conflict_and_National_Security_2012.pdf",
                "timestamp": "2013-01-25T20:55:36Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/Lin-Cyber_Conflict_and_National_Security_2012.pdf",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:Lin-Cyber_Conflict_and_National_Security_2012.pdf",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=299",
                "ns": 6,
                "title": "File:Lin-Cyber Conflict and National Security 2012.pdf"
            },
            {
                "name": "NRC-Cyberattack_Capabilities-2009.pdf",
                "timestamp": "2013-01-25T20:56:06Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/NRC-Cyberattack_Capabilities-2009.pdf",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:NRC-Cyberattack_Capabilities-2009.pdf",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=300",
                "ns": 6,
                "title": "File:NRC-Cyberattack Capabilities-2009.pdf"
            },
            {
                "name": "Toc_icon.jpg",
                "timestamp": "2012-08-03T15:48:23Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/Toc_icon.jpg",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:Toc_icon.jpg",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=267",
                "ns": 6,
                "title": "File:Toc icon.jpg"
            },
            {
                "name": "Toc_icon.png",
                "timestamp": "2012-08-03T15:39:55Z",
                "url": "https://cyber.harvard.edu/cybersecurity/sites/cybersecurity/images/Toc_icon.png",
                "descriptionurl": "https://cyber.harvard.edu/cybersecurity/File:Toc_icon.png",
                "descriptionshorturl": "https://cyber.harvard.edu/cybersecurity/index.php?curid=266",
                "ns": 6,
                "title": "File:Toc icon.png"
            }
        ]
    }
}