{"id":17266,"date":"2010-06-14T12:36:03","date_gmt":"2010-06-14T17:36:03","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=17266"},"modified":"2010-06-14T12:36:03","modified_gmt":"2010-06-14T17:36:03","slug":"bits-from-bill-pytlovany-can-you-spot-the-malware","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/","title":{"rendered":"Bits from Bill Pytlovany: Can You Spot the Malware?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/billpwp.jpg\" alt=\"billpwp\" width=\"150\" height=\"150\" class=\"attachment wp-att-7652 alignleft\" \/><\/p>\n<p>By Bill Pytlovany<\/p>\n<p>I recently wrote about how <a href=\"http:\/\/billpstudios.blogspot.com\/2010\/05\/security-software-doesnt-fix-human.html\">social engineering and human nature<\/a> is used to trick us into downloading files which infiltrate our computers.  When I signed on to Facebook today the first thing I noticed was an obviously malware post. I\u2019d like to think all of you would know immediately not to click the this link.  I deleted the post so others wouldn&#8217;t click on it and phoned our young friend who posted it. Not surprisingly she had no idea how it was posted and as I suggested she signed on to change her Facebook password.<\/p>\n<p> Would you have detected this as an obvious scam?<\/p>\n<p><a href=\"http:\/\/www.billp.com\/blog\/images\/WouldyouSpotthisMalware_9ACD\/miley.jpg\"><img fetchpriority=\"high\" decoding=\"async\" style=\"border-bottom: 0px; border-left: 0px; display: inline; border-top: 0px; border-right: 0px\" title=\"miley\" border=\"0\" alt=\"miley\" src=\"http:\/\/www.billp.com\/blog\/images\/WouldyouSpotthisMalware_9ACD\/miley_thumb.jpg\" width=\"369\" height=\"145\" \/><\/a> <\/p>\n<p>Even I know that Justin Bieber is too young for Miley Cyrus.<\/p>\n<p>As a researcher I clicked on this link to see where it went. So in case you\u2019re curious, <a href=\"http:\/\/billpstudios.blogspot.com\/2010\/06\/would-you-spot-this-malware.html\">here is what happens.<\/a><\/p>\n<p>This post is excerpted with Bill&#8217;s permission from his <a href=\"http:\/\/billpstudios.blogspot.com\/\" target=\"_blank\">blog<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/billpwp.jpg\" alt=\"bill p\" class=\"attachment wp-att-7167 alignleft\" \/><\/p>\n<p>By Bill Pytlovany<\/p>\n<p>I recently wrote about how <a href=\"http:\/\/billpstudios.blogspot.com\/2010\/05\/security-software-doesnt-fix-human.html\">social engineering and human nature<\/a> is used to trick us into downloading files which infiltrate our computers.  When I signed on to Facebook today the first thing I noticed was an obviously malware post.<\/p>\n","protected":false},"author":14,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[86],"tags":[4877,216,1385,1245,56,1386,860,1387],"class_list":["post-17266","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bill-pytlovany","tag-bill-pytlovany","tag-facebook","tag-justin-bieber","tag-link","tag-malware","tag-miley-cyrus","tag-post","tag-social-engineering"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bits from Bill Pytlovany: Can You Spot the Malware?<\/title>\n<meta name=\"description\" content=\"By Bill Pytlovany I recently wrote about how social engineering and human nature is used to trick us into downloading files which infiltrate our computers. When I signed on to Facebook today the first thing I noticed was an obviously malware post.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bits from Bill Pytlovany: Can You Spot the Malware?\" \/>\n<meta property=\"og:description\" content=\"By Bill Pytlovany I recently wrote about how social engineering and human nature is used to trick us into downloading files which infiltrate our computers. When I signed on to Facebook today the first thing I noticed was an obviously malware post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2010-06-14T17:36:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bill Pytlovany\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bill Pytlovany\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/\"},\"author\":{\"name\":\"Bill Pytlovany\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\"},\"headline\":\"Bits from Bill Pytlovany: Can You Spot the Malware?\",\"datePublished\":\"2010-06-14T17:36:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/\"},\"wordCount\":164,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"Bill Pytlovany\",\"facebook\",\"justin bieber\",\"link\",\"malware\",\"miley cyrus\",\"post\",\"social engineering\"],\"articleSection\":[\"Bill Pytlovany\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/\",\"name\":\"Bits from Bill Pytlovany: Can You Spot the Malware?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2010-06-14T17:36:03+00:00\",\"description\":\"By Bill Pytlovany I recently wrote about how social engineering and human nature is used to trick us into downloading files which infiltrate our computers. When I signed on to Facebook today the first thing I noticed was an obviously malware post.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-can-you-spot-the-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bits from Bill Pytlovany: Can You Spot the Malware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\",\"name\":\"Bill Pytlovany\",\"description\":\"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.\",\"sameAs\":[\"http:\\\/\\\/billpstudios.blogspot.com\\\/\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/bill-p\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bits from Bill Pytlovany: Can You Spot the Malware?","description":"By Bill Pytlovany I recently wrote about how social engineering and human nature is used to trick us into downloading files which infiltrate our computers. When I signed on to Facebook today the first thing I noticed was an obviously malware post.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/","og_locale":"en_US","og_type":"article","og_title":"Bits from Bill Pytlovany: Can You Spot the Malware?","og_description":"By Bill Pytlovany I recently wrote about how social engineering and human nature is used to trick us into downloading files which infiltrate our computers. When I signed on to Facebook today the first thing I noticed was an obviously malware post.","og_url":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2010-06-14T17:36:03+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Bill Pytlovany","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Bill Pytlovany","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/"},"author":{"name":"Bill Pytlovany","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0"},"headline":"Bits from Bill Pytlovany: Can You Spot the Malware?","datePublished":"2010-06-14T17:36:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/"},"wordCount":164,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["Bill Pytlovany","facebook","justin bieber","link","malware","miley cyrus","post","social engineering"],"articleSection":["Bill Pytlovany"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/","url":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/","name":"Bits from Bill Pytlovany: Can You Spot the Malware?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2010-06-14T17:36:03+00:00","description":"By Bill Pytlovany I recently wrote about how social engineering and human nature is used to trick us into downloading files which infiltrate our computers. When I signed on to Facebook today the first thing I noticed was an obviously malware post.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-can-you-spot-the-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Bits from Bill Pytlovany: Can You Spot the Malware?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0","name":"Bill Pytlovany","description":"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.","sameAs":["http:\/\/billpstudios.blogspot.com\/"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/bill-p\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/17266","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=17266"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/17266\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=17266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=17266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=17266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}