{"id":35697,"date":"2012-08-02T22:06:06","date_gmt":"2012-08-02T22:06:06","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=35697"},"modified":"2012-08-02T22:11:06","modified_gmt":"2012-08-02T22:11:06","slug":"pc-pitstop-newsletter-august-2012","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/","title":{"rendered":"PC Pitstop Newsletter \u2013 August 2012"},"content":{"rendered":"<p><\/br><\/p>\n<p><strong>Software Forced on to Your PC<\/strong><br \/>\n<em>by Steve Hogan <\/em><br \/>\nMore &#038; more unwanted software is being served up through a small check box. <\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502069&#038;shogan-foistware\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502069&#038;shogan-foistware<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>MSFT Phone Scam Continues<\/strong><br \/>\n<em>by PCTechBytes<\/em><br \/>\nCallers know your name, number and your vunerable Windows PC. <\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502070&#038;pctechbytes-msftscam\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502070&#038;pctechbytes-msftscam<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>10 Boosts to Firefox Privacy<\/strong><br \/>\n<em>by Windows Guides <\/em><br \/>\n10 tips to boost Firefox privacy without having to switch to privacy mode.<\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502071&#038;winguides-firefoxprivacy\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502071&#038;winguides-firefoxprivacy<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>What is Hidden in Your Hard Drive<\/strong><br \/>\n<em>by Bob Rankin <\/em><br \/>\nHow to run a &#8216;search &#038; destroy&#8217; operation on files that are just wasting space.<\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502072&#038;rankin-hiddenharddrive\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502072&#038;rankin-hiddenharddrive<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>Update Software with Care<\/strong><br \/>\n<em>by Windows Secrets Newsletter <\/em><br \/>\nTools for auto-updating your software can actually worsen your PC&#8217;s condition.<\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502073&#038;winsecrets-updatesoftware\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502073&#038;winsecrets-updatesoftware<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>AOL Invented the Internet<\/strong><br \/>\n<em>by Bill Pytlovany <\/em><br \/>\nAn AOL insider&#8217;s claim that is sure to make some heads spin. <\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502074&#038;billp-aolinternet\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502074&#038;billp-aolinternet<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>Risks of Remote Access<\/strong><br \/>\n<em>by Leo Notenboom <\/em><br \/>\nScams built around gaining remote access to your PC are growing.<\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502075&#038;leo-remoteaccess\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502075&#038;leo-remoteaccess<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>Layers of Identity Protection<\/strong><br \/>\n<em>by Tips4PCs <\/em><br \/>\nHow 3 layers of identity can better protect you online. <\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502076&#038;tips4pc-identitylayer\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502076&#038;tips4pc-identitylayer<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>How Private is the Cloud<\/strong><br \/>\n<em>by Windows Observer <\/em><br \/>\nA Skydrive user recently discovered cloud storage isn&#8217;t very private. <\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502077&#038;winobserver-cloudprivacy\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502077&#038;winobserver-cloudprivacy<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>What Can You Live Without?<\/strong><br \/>\n<em>PC Pitstop Poll Position <\/em><br \/>\nAre you ready to give up your PC, TV or Phone? Share your opinion.<\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502078&#038;pollposition\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502078&#038;pollposition<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>Burn YouTube Vids to DVD<\/strong><br \/>\n<em>by BurnWorld <\/em><br \/>\nBelieve it. You can actually download &#038; burn YouTube videos to DVD.  <\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502079&#038;burnworld-youtubedvd\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502079&#038;burnworld-youtubedvd<\/a><\/p>\n<p>====================================================<\/p>\n<p><strong>Ins and Outs of Drag and Drop<\/strong><br \/>\n<em>by Windows Club <\/em><br \/>\nLearn what really happens when you drag and drop files or folders.  <\/p>\n<p><a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=502080&#038;winclub-dragdrop\" target=\"_blank\">https:\/\/cart.pcpitstop.com\/go.asp?id=502080&#038;winclub-dragdrop<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<li>Software Forced on to Your PC<\/li>\n<li>MSFT Phone Scam Continues<\/li>\n<li>10 Boosts to Firefox Privacy<\/li>\n<li>What is Hidden in Your Hard Drive<\/li>\n<li>Update Software with Care<\/li>\n<li>AOL Invented the Internet<\/li>\n<li>Risks of Remote Access<\/li>\n<li>Layers of Identity Protection<\/li>\n<li>How Private is the Cloud<\/li>\n<li>What Can You Live Without?<\/li>\n<li>PC Pitstop Poll Position <\/li>\n<li>Burn YouTube Vids to DVD<\/li>\n<li>Ins and Outs of Drag and Drop<\/li>\n","protected":false},"author":12,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[7],"tags":[4869],"class_list":["post-35697","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-newsletter","tag-newsletter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>PC Pitstop Newsletter \u2013 August 2012<\/title>\n<meta name=\"description\" content=\"Software Forced on to Your PC MSFT Phone Scam Continues 10 Boosts to Firefox Privacy What is Hidden in Your Hard Drive Update Software with Care AOL Invented the Internet Risks of Remote Access Layers of Identity Protection How Private is the Cloud What Can You Live Without? PC Pitstop Poll Position  Burn YouTube Vids to DVD Ins and Outs of Drag and Drop\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"PC Pitstop Newsletter \u2013 August 2012\" \/>\n<meta property=\"og:description\" content=\"Software Forced on to Your PC MSFT Phone Scam Continues 10 Boosts to Firefox Privacy What is Hidden in Your Hard Drive Update Software with Care AOL Invented the Internet Risks of Remote Access Layers of Identity Protection How Private is the Cloud What Can You Live Without? PC Pitstop Poll Position  Burn YouTube Vids to DVD Ins and Outs of Drag and Drop\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2012-08-02T22:06:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2012-08-02T22:11:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"PC Matic Cybersecurity\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PC Matic Cybersecurity\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/\"},\"author\":{\"name\":\"PC Matic Cybersecurity\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\"},\"headline\":\"PC Pitstop Newsletter \u2013 August 2012\",\"datePublished\":\"2012-08-02T22:06:06+00:00\",\"dateModified\":\"2012-08-02T22:11:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/\"},\"wordCount\":338,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"Newsletter\"],\"articleSection\":[\"Newsletter\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/\",\"name\":\"PC Pitstop Newsletter \u2013 August 2012\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2012-08-02T22:06:06+00:00\",\"dateModified\":\"2012-08-02T22:11:06+00:00\",\"description\":\"Software Forced on to Your PC MSFT Phone Scam Continues 10 Boosts to Firefox Privacy What is Hidden in Your Hard Drive Update Software with Care AOL Invented the Internet Risks of Remote Access Layers of Identity Protection How Private is the Cloud What Can You Live Without? PC Pitstop Poll Position Burn YouTube Vids to DVD Ins and Outs of Drag and Drop\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/pc-pitstop-newsletter-august-2012\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PC Pitstop Newsletter \u2013 August 2012\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f3dbbae19394008342629ce8d970445f\",\"name\":\"PC Matic Cybersecurity\",\"description\":\"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.\",\"sameAs\":[\"https:\\\/\\\/techtalk.pcpitstop.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/pcpitstop\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"PC Pitstop Newsletter \u2013 August 2012","description":"Software Forced on to Your PC MSFT Phone Scam Continues 10 Boosts to Firefox Privacy What is Hidden in Your Hard Drive Update Software with Care AOL Invented the Internet Risks of Remote Access Layers of Identity Protection How Private is the Cloud What Can You Live Without? PC Pitstop Poll Position  Burn YouTube Vids to DVD Ins and Outs of Drag and Drop","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/","og_locale":"en_US","og_type":"article","og_title":"PC Pitstop Newsletter \u2013 August 2012","og_description":"Software Forced on to Your PC MSFT Phone Scam Continues 10 Boosts to Firefox Privacy What is Hidden in Your Hard Drive Update Software with Care AOL Invented the Internet Risks of Remote Access Layers of Identity Protection How Private is the Cloud What Can You Live Without? PC Pitstop Poll Position  Burn YouTube Vids to DVD Ins and Outs of Drag and Drop","og_url":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2012-08-02T22:06:06+00:00","article_modified_time":"2012-08-02T22:11:06+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"PC Matic Cybersecurity","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"PC Matic Cybersecurity","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/"},"author":{"name":"PC Matic Cybersecurity","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f"},"headline":"PC Pitstop Newsletter \u2013 August 2012","datePublished":"2012-08-02T22:06:06+00:00","dateModified":"2012-08-02T22:11:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/"},"wordCount":338,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["Newsletter"],"articleSection":["Newsletter"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/","url":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/","name":"PC Pitstop Newsletter \u2013 August 2012","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2012-08-02T22:06:06+00:00","dateModified":"2012-08-02T22:11:06+00:00","description":"Software Forced on to Your PC MSFT Phone Scam Continues 10 Boosts to Firefox Privacy What is Hidden in Your Hard Drive Update Software with Care AOL Invented the Internet Risks of Remote Access Layers of Identity Protection How Private is the Cloud What Can You Live Without? PC Pitstop Poll Position Burn YouTube Vids to DVD Ins and Outs of Drag and Drop","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/pc-pitstop-newsletter-august-2012\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"PC Pitstop Newsletter \u2013 August 2012"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f3dbbae19394008342629ce8d970445f","name":"PC Matic Cybersecurity","description":"PC Matic Cyber Security is America's Top Antivirus Software and our team is committed to providing you with the information you need to keep your computer, mobile device and network safe and running like new.","sameAs":["https:\/\/techtalk.pcpitstop.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/pcpitstop\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/35697","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=35697"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/35697\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=35697"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=35697"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=35697"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}