{"id":15282,"date":"2010-03-08T10:07:14","date_gmt":"2010-03-08T15:07:14","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=15282"},"modified":"2010-03-08T10:07:14","modified_gmt":"2010-03-08T15:07:14","slug":"techbite-2-weapons-to-fight-spam","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/","title":{"rendered":"TechBite: 2 Weapons to Fight Spam"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/stevewp.jpg\" alt=\"stevewp\" width=\"150\" height=\"150\" class=\"attachment wp-att-7654 alignleft\" \/><\/p>\n<p>By Steve Bass<\/p>\n<p><b>Fight Spam with a Disposable E-Mail Address<\/b><\/p>\n<p>Al Saxton, a TechBite subscriber, uses a disposable e-mail address for newsletter subscriptions. If he sees an influx of spam, he stops using the address, creates a new one, and re-subscribes. No fuss or muss.<\/p>\n<p>The easiest free disposable e-mail service I&#8217;ve tried is Spambox. Give it your real e-mail address so the message can be forwarded; decide how long you want the e-mail address to last (up to one year); and click the &#8220;Generate Spambox&#8221; button. Then use the new disposable address to subscribe to newsletters. (Don&#8217;t aggravate me by asking if Spambox is collecting addresses in order to spam, y&#8217; hear?)<\/p>\n<p>Here&#8217;s one of my disposables: mailto:A6H1Rs1bgjKdFAhj@666.joliekemulder.nl<\/p>\n<p>One potential downside to this trick is the fact that the address may be seen as spam by your ISP when it&#8217;s forwarded to your real e-mail address. You can find out by experimenting with it.<\/p>\n<p><b>&#8216;Plus Addressing&#8217; to Tackle Spam<\/b><\/p>\n<p>I wrote about &#8220;plus addressing&#8221; years ago in PC World. It&#8217;s a trick to spot where spam is coming from and stop it from landing in your inbox. Basically, you use a unique e-mail address when you sign up for a newsletter or Web service. If you start receiving spam at that distinct e-mail address, you know it&#8217;s been compromised.<\/p>\n<p><a href=\"http:\/\/www.aweber.com\/archive\/techbite\/t1Jr\/h\/Revo_Uninstaller_Review_Spam.htm#fight\" target=\"_blank\">It&#8217;s similar to the above trick, but you do it right from your e-mail program.<\/a><\/i><\/p>\n<p><i>TechBite&#8217;s columnist Steve Bass and PC World Contributing Editor publishes a free weekly newsletter with commentary on the technology products he loves, the strategies for getting the most out of them,and the gotchas that can cause computing misery. Sign up for the newsletter <a href=\"http:\/\/techbite.com\/\" target=\"_blank\">here<\/a><\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/stevewp.jpg\" alt=\"steveb\" class=\"attachment wp-att-7167 alignleft\" \/><\/p>\n<p>By Steve Bass<\/p>\n<p>I wrote about &#8220;plus addressing&#8221; years ago in PC World. It&#8217;s a trick to spot where spam is coming from and stop it from landing in your inbox. Basically, you use a unique e-mail address when you sign up for a newsletter or Web service. If you start receiving spam at that distinct e-mail address, you know it&#8217;s been compromised.<\/p>\n","protected":false},"author":17,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[142],"tags":[931,997,998,999,1000],"class_list":["post-15282","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-techbite","tag-columnist-steve","tag-disposable-address","tag-e-mail-address","tag-e-mail-service","tag-mail-program"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>TechBite: 2 Weapons to Fight Spam<\/title>\n<meta name=\"description\" content=\"By Steve Bass I wrote about &quot;plus addressing&quot; years ago in PC World. It&#039;s a trick to spot where spam is coming from and stop it from landing in your inbox. Basically, you use a unique e-mail address when you sign up for a newsletter or Web service. If you start receiving spam at that distinct e-mail address, you know it&#039;s been compromised.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"TechBite: 2 Weapons to Fight Spam\" \/>\n<meta property=\"og:description\" content=\"By Steve Bass I wrote about &quot;plus addressing&quot; years ago in PC World. It&#039;s a trick to spot where spam is coming from and stop it from landing in your inbox. Basically, you use a unique e-mail address when you sign up for a newsletter or Web service. If you start receiving spam at that distinct e-mail address, you know it&#039;s been compromised.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2010-03-08T15:07:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Steve Bass\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Steve Bass\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/\"},\"author\":{\"name\":\"Steve Bass\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/840d4a46894845cda5ff692010eebbf3\"},\"headline\":\"TechBite: 2 Weapons to Fight Spam\",\"datePublished\":\"2010-03-08T15:07:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/\"},\"wordCount\":299,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"columnist steve\",\"disposable address\",\"e mail address\",\"e mail service\",\"mail program\"],\"articleSection\":[\"TechBite\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/\",\"name\":\"TechBite: 2 Weapons to Fight Spam\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2010-03-08T15:07:14+00:00\",\"description\":\"By Steve Bass I wrote about \\\"plus addressing\\\" years ago in PC World. It's a trick to spot where spam is coming from and stop it from landing in your inbox. Basically, you use a unique e-mail address when you sign up for a newsletter or Web service. If you start receiving spam at that distinct e-mail address, you know it's been compromised.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/techbite-2-weapons-to-fight-spam\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TechBite: 2 Weapons to Fight Spam\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/840d4a46894845cda5ff692010eebbf3\",\"name\":\"Steve Bass\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/steve-bass\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"TechBite: 2 Weapons to Fight Spam","description":"By Steve Bass I wrote about \"plus addressing\" years ago in PC World. It's a trick to spot where spam is coming from and stop it from landing in your inbox. Basically, you use a unique e-mail address when you sign up for a newsletter or Web service. If you start receiving spam at that distinct e-mail address, you know it's been compromised.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/","og_locale":"en_US","og_type":"article","og_title":"TechBite: 2 Weapons to Fight Spam","og_description":"By Steve Bass I wrote about \"plus addressing\" years ago in PC World. It's a trick to spot where spam is coming from and stop it from landing in your inbox. Basically, you use a unique e-mail address when you sign up for a newsletter or Web service. If you start receiving spam at that distinct e-mail address, you know it's been compromised.","og_url":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2010-03-08T15:07:14+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Steve Bass","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Steve Bass","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/"},"author":{"name":"Steve Bass","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/840d4a46894845cda5ff692010eebbf3"},"headline":"TechBite: 2 Weapons to Fight Spam","datePublished":"2010-03-08T15:07:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/"},"wordCount":299,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["columnist steve","disposable address","e mail address","e mail service","mail program"],"articleSection":["TechBite"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/","url":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/","name":"TechBite: 2 Weapons to Fight Spam","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2010-03-08T15:07:14+00:00","description":"By Steve Bass I wrote about \"plus addressing\" years ago in PC World. It's a trick to spot where spam is coming from and stop it from landing in your inbox. Basically, you use a unique e-mail address when you sign up for a newsletter or Web service. If you start receiving spam at that distinct e-mail address, you know it's been compromised.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/techbite-2-weapons-to-fight-spam\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"TechBite: 2 Weapons to Fight Spam"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/840d4a46894845cda5ff692010eebbf3","name":"Steve Bass","url":"https:\/\/www.pcmatic.com\/blog\/author\/steve-bass\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/15282","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=15282"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/15282\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=15282"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=15282"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=15282"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}