<?xml version="1.0"?>
<oembed><version>1.0</version><provider_name>PC Matic Blog</provider_name><provider_url>https://www.pcmatic.com/blog</provider_url><author_name>PC Matic Cybersecurity</author_name><author_url>https://www.pcmatic.com/blog/author/pcpitstop/</author_url><title>P2P Programs: Popular and Perilous</title><type>rich</type><width>600</width><height>338</height><html>&lt;blockquote class="wp-embedded-content" data-secret="V8wVLCqYWc"&gt;&lt;a href="https://www.pcmatic.com/blog/p2p-programs-popular-and-perilous/"&gt;P2P Programs: Popular and Perilous&lt;/a&gt;&lt;/blockquote&gt;&lt;iframe sandbox="allow-scripts" security="restricted" src="https://www.pcmatic.com/blog/p2p-programs-popular-and-perilous/embed/#?secret=V8wVLCqYWc" width="600" height="338" title="&#x201C;P2P Programs: Popular and Perilous&#x201D; &#x2014; PC Matic Blog" data-secret="V8wVLCqYWc" frameborder="0" marginwidth="0" marginheight="0" scrolling="no" class="wp-embedded-content"&gt;&lt;/iframe&gt;&lt;script&gt;
/*! This file is auto-generated */
!function(d,l){"use strict";l.querySelector&amp;&amp;d.addEventListener&amp;&amp;"undefined"!=typeof URL&amp;&amp;(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&amp;&amp;!/[^a-zA-Z0-9]/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret="'+t.secret+'"]'),o=l.querySelectorAll('blockquote[data-secret="'+t.secret+'"]'),c=new RegExp("^https?:$","i"),i=0;i&lt;o.length;i++)o[i].style.display="none";for(i=0;i&lt;a.length;i++)s=a[i],e.source===s.contentWindow&amp;&amp;(s.removeAttribute("style"),"height"===t.message?(1e3&lt;(r=parseInt(t.value,10))?r=1e3:~~r&lt;200&amp;&amp;(r=200),s.height=r):"link"===t.message&amp;&amp;(r=new URL(s.getAttribute("src")),n=new URL(t.value),c.test(n.protocol))&amp;&amp;n.host===r.host&amp;&amp;l.activeElement===s&amp;&amp;(d.top.location.href=t.value))}},d.addEventListener("message",d.wp.receiveEmbedMessage,!1),l.addEventListener("DOMContentLoaded",function(){for(var e,t,s=l.querySelectorAll("iframe.wp-embedded-content"),r=0;r&lt;s.length;r++)(t=(e=s[r]).getAttribute("data-secret"))||(t=Math.random().toString(36).substring(2,12),e.src+="#?secret="+t,e.setAttribute("data-secret",t)),e.contentWindow.postMessage({message:"ready",secret:t},"*")},!1)))}(window,document);
//# sourceURL=https://www.pcmatic.com/blog/wp-includes/js/wp-embed.min.js
&lt;/script&gt;
</html><thumbnail_url>https://www.pcmatic.com/blog/wp-content/uploads/pcmatic-fallback.png</thumbnail_url><thumbnail_width>1920</thumbnail_width><thumbnail_height>1080</thumbnail_height><description>by Robert P. Lipschutz and John Clyman It's time for a confession. Many of us have peer-to-peer (P2P) file-sharing software on our home PCs. Teenagers most often use P2P to search for and download the latest songs from their favorite artists and adults can find the songs of their youth. PC Pitstop research has shown that many of us have P2P programs such as Kazaa, Grokster, and Morpheus.</description></oembed>
