{"id":27356,"date":"2012-02-02T13:13:09","date_gmt":"2012-02-02T18:13:09","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=27356"},"modified":"2012-02-02T13:13:09","modified_gmt":"2012-02-02T18:13:09","slug":"bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/","title":{"rendered":"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/billpwp.jpg\" alt=\"billpwp\" width=\"150\" height=\"150\" class=\"attachment wp-att-7652 alignleft\" \/><\/p>\n<p>By Bill Pytlovany<\/p>\n<p>There are many forms of security intrusions on your computer and you should be aware of all of them. Sometimes you don\u2019t have to do anything you would normally think would infect your computer. Infiltrations can happen without any action on your part. You don\u2019t have to click or download programs to lose control of your system.<\/p>\n<p>Here\u2019s a tip you may not have heard. Don\u2019t click on any ad. In your Email, on Google or even Facebook don\u2019t click on advertisements. You\u2019d think big companies like Google or Facebook review advertisements that appear on their websites. You\u2019d be wrong. Some of the most dangerous links appear as advertisements that look like search results on Google or product recommendations by your friends on Facebook.<\/p>\n<p>If you click on an ad the most danger words you\u2019ll ever see online are \u201cYou may be a winner\u201d. If you see those words or anything similar use Ctrl-All-Del and close your browser. Web sites don\u2019t give away Apple iPads. If they do the chances you\u2019ll win isn\u2019t worth the risk.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" alt=\"\" src=\"http:\/\/www.billp.com\/blog\/images\/f84817f130ca_108A5\/free.jpg\" title=\"free\" class=\"alignnone\" width=\"488\" height=\"282\" \/><\/p>\n<p>My mother always said, \u201cYou get what you pay for\u201d.   She was a smart lady.  She also said, \u201cIf it seems to be good to be true, it probably is\u201d.<\/p>\n<p><a href=\"http:\/\/billpstudios.blogspot.com\/2012\/02\/most-dangerous-words-on-internet.html\" target=\"_blank\">Article continued here<\/a><\/p>\n<p>This post is excerpted with Bill&#8217;s permission from his <a href=\"http:\/\/billpstudios.blogspot.com\/\" target=\"_blank\">blog<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/billpwp.jpg\" alt=\"bill p\" class=\"attachment wp-att-7167 alignleft\" \/><\/p>\n<p>There are many forms of security intrusions on your computer and you should be aware of all of them. Sometimes you don\u2019t have to do anything you would normally think would infect your computer. Infiltrations can happen without any action on your part. You don\u2019t have to click or download programs to lose control of your system.<\/p>\n","protected":false},"author":14,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[86],"tags":[4877,523,483],"class_list":["post-27356","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bill-pytlovany","tag-bill-pytlovany","tag-bits-from-bill","tag-internet-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Bits from Bill Pytlovany: The Most Dangerous Words on the Internet<\/title>\n<meta name=\"description\" content=\"There are many forms of security intrusions on your computer and you should be aware of all of them. Sometimes you don\u2019t have to do anything you would normally think would infect your computer. Infiltrations can happen without any action on your part. You don\u2019t have to click or download programs to lose control of your system.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet\" \/>\n<meta property=\"og:description\" content=\"There are many forms of security intrusions on your computer and you should be aware of all of them. Sometimes you don\u2019t have to do anything you would normally think would infect your computer. Infiltrations can happen without any action on your part. You don\u2019t have to click or download programs to lose control of your system.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2012-02-02T18:13:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bill Pytlovany\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bill Pytlovany\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/\"},\"author\":{\"name\":\"Bill Pytlovany\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\"},\"headline\":\"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet\",\"datePublished\":\"2012-02-02T18:13:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/\"},\"wordCount\":245,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"Bill Pytlovany\",\"Bits from Bill\",\"internet security\"],\"articleSection\":[\"Bill Pytlovany\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/\",\"name\":\"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2012-02-02T18:13:09+00:00\",\"description\":\"There are many forms of security intrusions on your computer and you should be aware of all of them. Sometimes you don\u2019t have to do anything you would normally think would infect your computer. Infiltrations can happen without any action on your part. You don\u2019t have to click or download programs to lose control of your system.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/bdfb84810004329361ff982a09c6fde0\",\"name\":\"Bill Pytlovany\",\"description\":\"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.\",\"sameAs\":[\"http:\\\/\\\/billpstudios.blogspot.com\\\/\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/bill-p\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet","description":"There are many forms of security intrusions on your computer and you should be aware of all of them. Sometimes you don\u2019t have to do anything you would normally think would infect your computer. Infiltrations can happen without any action on your part. You don\u2019t have to click or download programs to lose control of your system.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/","og_locale":"en_US","og_type":"article","og_title":"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet","og_description":"There are many forms of security intrusions on your computer and you should be aware of all of them. Sometimes you don\u2019t have to do anything you would normally think would infect your computer. Infiltrations can happen without any action on your part. You don\u2019t have to click or download programs to lose control of your system.","og_url":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2012-02-02T18:13:09+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Bill Pytlovany","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Bill Pytlovany","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/"},"author":{"name":"Bill Pytlovany","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0"},"headline":"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet","datePublished":"2012-02-02T18:13:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/"},"wordCount":245,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["Bill Pytlovany","Bits from Bill","internet security"],"articleSection":["Bill Pytlovany"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/","url":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/","name":"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2012-02-02T18:13:09+00:00","description":"There are many forms of security intrusions on your computer and you should be aware of all of them. Sometimes you don\u2019t have to do anything you would normally think would infect your computer. Infiltrations can happen without any action on your part. You don\u2019t have to click or download programs to lose control of your system.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/bits-from-bill-pytlovany-the-most-dangerous-words-on-the-internet\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Bits from Bill Pytlovany: The Most Dangerous Words on the Internet"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/bdfb84810004329361ff982a09c6fde0","name":"Bill Pytlovany","description":"BillP Studios founder and industry insider Bill Pytlovany was at one time best known for his leading role in creating the software behind the service now called, AOL. These days Bill is better for helping to increase the performance and security of hundreds of thousand of computers - through his award winning product - Win Patrol.","sameAs":["http:\/\/billpstudios.blogspot.com\/"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/bill-p\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/27356","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=27356"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/27356\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=27356"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=27356"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=27356"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}