{"id":35435,"date":"2012-07-31T10:22:03","date_gmt":"2012-07-31T10:22:03","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=35435"},"modified":"2012-07-31T20:49:27","modified_gmt":"2012-07-31T20:49:27","slug":"risks-of-allowing-remote-access-to-your-pc","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/","title":{"rendered":"Ask Leo: Risks of Allowing Remote Access to Your PC"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/remotePC.jpg\" alt=\"risks of allowing remote pc access\" title=\"risks of allowing remote pc access\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-35445\" \/><\/p>\n<h4>Risks of Allowing Remote Access to Your PC<\/h4>\n<p>By Leo Notenboom<\/p>\n<p><i><font SIZE=\"2\">About a year ago, I took out a lifetime subscription to SUPERAntiSpyware and I have used it without any problems until the last ten days or so. Now, I find that I am unable to activate the scan feature; I click on it just I have done for the past year, but nothing happens. I called the phone number listed on my receipt, but there was no answer and I wonder if you know whether or not they have gone out of business.<\/p>\n<p>I am not particularly worried about this as there are other applications that I can download. However I thought I would let you know what happened when I went to their website.<\/p>\n<p>I called a number that I thought was the support center and was immediately connected with a technician who skillfully asked my permission to allow him access to my computer so that he could diagnose the problem and I agreed. After he informed me that I had over a thousand errors that needed to be erased and that he could do this for me for only $250.00 I realized that this was some kind of scam and I promptly ended the call. What kind of risk have I exposed myself to?<\/p>\n<p>I have windows Vista and my computer is about six years old. Thank you for all you do and keep the answers coming.<\/i><\/font><\/p>\n<p>First, good on you for terminating that call. While it may have obviously been a scam to you and me, I&#8217;m sure that many people are falling for it.<\/p>\n<p>To the best of my knowledge, SUPERAntiSpyware is alive and well. However, the approach you took to contact them is worth reviewing. Sometimes, finding appropriate contact information can be confusing and in some situations, it can lead to questionable territory, as you&#8217;ve seen.<\/p>\n<p>But the big question is &#8230; you let a stranger with clearly malicious intent use your machine remotely. Just how worried do you now need to be?<\/p>\n<p>The bad news is that there&#8217;s no clear answer.<\/p>\n<p>\u2022<\/p>\n<p><strong>SUPERAntiSpyware<\/strong><\/p>\n<p>I&#8217;ve never used SUPERAntiSpyware, but I&#8217;ve heard it mentioned from time to time and it appears to have a good reputation.<\/p>\n<p>The website \u2013 http:\/\/www.superantispyware.com\/ \u2013 is most certainly up. Their blog is woefully out of date, but I do see current posts by &#8220;SAS Customer Service&#8221; in their support forum, which I take as a good sign of life.<\/p>\n<p>But that leads us to the approach best taken to find support.<\/p>\n<p>&#8220;First, understand that telephone support is rare, even for many paid products. &#8221;<br \/>\nFinding support<\/p>\n<p>You started with the phone number on your receipt. That&#8217;s typically not what I would start with for a couple of reasons.<\/p>\n<p>A phone number on a purchase receipt is typically completely unrelated to product support. More often, it&#8217;s a number specifically about billing questions or questions relating to the actual process of purchasing the product, not using it.<br \/>\nIt&#8217;s extremely common that the actual sale of the product is handled by a completely different company than the company that manufactures it. This is particularly true of software downloads. The phone number listed may not even be for the company that you really want to talk to. And of course, if the payment processor changes or goes out of business, old phone numbers can sometimes lead to new and less than appropriate places.<\/p>\n<p>My approach to finding support comes at it from a completely different angle.<\/p>\n<p><a href=\"http:\/\/ask-leo.com\/i_let_a_questionable_technician_remotely_access_my_machine_what_kind_of_risk_have_i_exposed_myself_to.html\" target=\"_blank\"> Read the rest of the story here.<\/a>.<\/p>\n<p>This post is excerpted with permission from Leo Notenboom.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/remotePC.jpg\" alt=\"risks of allowing remote pc access\" title=\"risks of allowing remote pc access\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-35445\" \/><\/p>\n<p>Several current scams center around gaining remote access, often in the guise of fixing problems on your machine. Be it for money or other reasons, one thing is clear: it&#8217;s a trap!<\/p>\n","protected":false},"author":19,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[49],"tags":[3499,4228,4227],"class_list":["post-35435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-leo-notenboom","tag-computer-privacy","tag-pc-privacy","tag-remote-pc-access"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Risks of Allowing Remote Access to Your PC<\/title>\n<meta name=\"description\" content=\"Several current scams center around gaining remote access, often in the guise of fixing problems on your machine. Be it for money or other reasons, one thing is clear: it&#039;s a trap!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Risks of Allowing Remote Access to Your PC\" \/>\n<meta property=\"og:description\" content=\"Several current scams center around gaining remote access, often in the guise of fixing problems on your machine. Be it for money or other reasons, one thing is clear: it&#039;s a trap!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2012-07-31T10:22:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-07-31T20:49:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Leo Notenboom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leo Notenboom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/\"},\"author\":{\"name\":\"Leo Notenboom\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ed90798b38aa4ab74e12591da7ab21d5\"},\"headline\":\"Ask Leo: Risks of Allowing Remote Access to Your PC\",\"datePublished\":\"2012-07-31T10:22:03+00:00\",\"dateModified\":\"2012-07-31T20:49:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/\"},\"wordCount\":614,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"Computer Privacy\",\"pc privacy\",\"remote PC access\"],\"articleSection\":[\"leo notenboom\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/\",\"name\":\"Risks of Allowing Remote Access to Your PC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2012-07-31T10:22:03+00:00\",\"dateModified\":\"2012-07-31T20:49:27+00:00\",\"description\":\"Several current scams center around gaining remote access, often in the guise of fixing problems on your machine. Be it for money or other reasons, one thing is clear: it's a trap!\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/risks-of-allowing-remote-access-to-your-pc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ask Leo: Risks of Allowing Remote Access to Your PC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ed90798b38aa4ab74e12591da7ab21d5\",\"name\":\"Leo Notenboom\",\"description\":\"Leo A. Notenboom is the owner of Puget Sound Software, LLC and the Leo in Ask Leo!. Leo has been in the personal computer and software industry since 1979, as a software engineer, a manager of software engineers, and as a consultant. In 1983 Leo joined what was then a medium sized local company called Microsoft and spent the next 18 years in a wide variety of groups working on a wide variety of software. If you're running Microsoft Windows, if you've used a Microsoft development tool or Microsoft Money, or if you've ever purchased a ticket through Expedia, there's a good chance you've been touched by some of his work. And of course, since 2003, Leo has been answering your tech questions on Ask Leo!\",\"sameAs\":[\"http:\\\/\\\/ask-leo.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/leo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Risks of Allowing Remote Access to Your PC","description":"Several current scams center around gaining remote access, often in the guise of fixing problems on your machine. Be it for money or other reasons, one thing is clear: it's a trap!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/","og_locale":"en_US","og_type":"article","og_title":"Risks of Allowing Remote Access to Your PC","og_description":"Several current scams center around gaining remote access, often in the guise of fixing problems on your machine. Be it for money or other reasons, one thing is clear: it's a trap!","og_url":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2012-07-31T10:22:03+00:00","article_modified_time":"2012-07-31T20:49:27+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Leo Notenboom","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Leo Notenboom","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/"},"author":{"name":"Leo Notenboom","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ed90798b38aa4ab74e12591da7ab21d5"},"headline":"Ask Leo: Risks of Allowing Remote Access to Your PC","datePublished":"2012-07-31T10:22:03+00:00","dateModified":"2012-07-31T20:49:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/"},"wordCount":614,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["Computer Privacy","pc privacy","remote PC access"],"articleSection":["leo notenboom"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/","url":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/","name":"Risks of Allowing Remote Access to Your PC","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2012-07-31T10:22:03+00:00","dateModified":"2012-07-31T20:49:27+00:00","description":"Several current scams center around gaining remote access, often in the guise of fixing problems on your machine. Be it for money or other reasons, one thing is clear: it's a trap!","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/risks-of-allowing-remote-access-to-your-pc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ask Leo: Risks of Allowing Remote Access to Your PC"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ed90798b38aa4ab74e12591da7ab21d5","name":"Leo Notenboom","description":"Leo A. Notenboom is the owner of Puget Sound Software, LLC and the Leo in Ask Leo!. Leo has been in the personal computer and software industry since 1979, as a software engineer, a manager of software engineers, and as a consultant. In 1983 Leo joined what was then a medium sized local company called Microsoft and spent the next 18 years in a wide variety of groups working on a wide variety of software. If you're running Microsoft Windows, if you've used a Microsoft development tool or Microsoft Money, or if you've ever purchased a ticket through Expedia, there's a good chance you've been touched by some of his work. And of course, since 2003, Leo has been answering your tech questions on Ask Leo!","sameAs":["http:\/\/ask-leo.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/leo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/35435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=35435"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/35435\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=35435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=35435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=35435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}