{"id":39736,"date":"2012-12-04T18:53:25","date_gmt":"2012-12-04T18:53:25","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=39736"},"modified":"2012-12-04T18:53:25","modified_gmt":"2012-12-04T18:53:25","slug":"why-your-pc-is-a-hackers-favorite-weapon","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/","title":{"rendered":"Why Your PC is a Hacker&#8217;s Favorite Weapon"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hacker1.jpg\" alt=\"\" title=\"hacker\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-39739\" \/><\/p>\n<p><\/br><\/p>\n<p>by Mitz Pantic from Tips4pc.com<\/p>\n<h3>Why Your PC is a Hacker&#8217;s Favorite Weapon<\/h3>\n<p>Cyber security isn\u2019t just an issue for governments and corporations, but an issue we all face\u2014that\u2019s because the favorite weapon of hackers and terrorists is your computer.<\/p>\n<p><strong>Enemy #1: Your Computer<\/strong><\/p>\n<p>If you read any report about the latest hacking attack, you\u2019ll hear about \u201cbotnets\u201d or \u201cmillions of computers\u201d. These are giant collections of computers just like yours which hackers now control.<\/p>\n<p>Hackers don\u2019t buy these computers\u2014they break into them remotely and then they either use them for evil or sell them to someone else who will use them for evil.<\/p>\n<p>Most people don\u2019t realize that their computers have been taken over until days or weeks later. It could be that your computer is no longer completely under your control right now\u2014you just don\u2019t realize it yet.<\/p>\n<p><strong>What Hackers Do With Your Computer<\/strong><\/p>\n<p>The easiest type of attack on the Internet is the Distributed Denial Of Service (DDOS) attack. The hacker takes thousands or millions of computers and has each one of them repeatedly try to access a site as fast as possible. Since few sites on the Internet can withstand millions of requests a minute, the site can\u2019t respond to legitimate requests from legitimate customers.<\/p>\n<p>DDOS attacks come in several types. Some require a relatively small number of computers\u2014say 100,000 to take down Google. But these small-scale attacks can be blocked after the company determines which computers are powering the attack.<\/p>\n<p>Another DDOS attack uses large numbers of computers and very basic attacks. In this case it might take up to 10 million computers to take down a site the size of Google. Unfortunately, there\u2019s no cyber security defense against this type of attack. Google\u2019s only options are to buy (or rent) extra servers or to wait for the attack to finish, which usually happens when enough people discover their computers are being used in an attack.<\/p>\n<h3><a href=\"http:\/\/tips4pc.com\/computer_tips_and_tricks\/are-you-an-unwitting-cyber-security-terrorist.htm\" target=\"_blank\">Article Continued Here<\/a><\/h3>\n<p><em>This excerpt appears with permission from Tips4PC.com<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/hacker1.jpg\" alt=\"\" title=\"hacker\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-39739\" \/><\/p>\n<p>Cyber security isn\u2019t just an issue for governments and corporations, but an issue we all face\u2014that\u2019s because the favorite weapon of hackers and terrorists is your computer.<\/p>\n","protected":false},"author":33,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[834],"tags":[1303],"class_list":["post-39736","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips4pc","tag-pc-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Your PC is a Hacker&#039;s Favorite Weapon<\/title>\n<meta name=\"description\" content=\"Cyber security isn\u2019t just an issue for governments and corporations, but an issue we all face\u2014that\u2019s because the favorite weapon of hackers and terrorists is your computer.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Your PC is a Hacker&#039;s Favorite Weapon\" \/>\n<meta property=\"og:description\" content=\"Cyber security isn\u2019t just an issue for governments and corporations, but an issue we all face\u2014that\u2019s because the favorite weapon of hackers and terrorists is your computer.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2012-12-04T18:53:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Tips4 PC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Tips4 PC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/\"},\"author\":{\"name\":\"Tips4 PC\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/181845ffbd3d2cd01345e2d6cfd75ca0\"},\"headline\":\"Why Your PC is a Hacker&#8217;s Favorite Weapon\",\"datePublished\":\"2012-12-04T18:53:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/\"},\"wordCount\":355,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"pc security\"],\"articleSection\":[\"Tips4PC\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/\",\"name\":\"Why Your PC is a Hacker's Favorite Weapon\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2012-12-04T18:53:25+00:00\",\"description\":\"Cyber security isn\u2019t just an issue for governments and corporations, but an issue we all face\u2014that\u2019s because the favorite weapon of hackers and terrorists is your computer.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/why-your-pc-is-a-hackers-favorite-weapon\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Your PC is a Hacker&#8217;s Favorite Weapon\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/181845ffbd3d2cd01345e2d6cfd75ca0\",\"name\":\"Tips4 PC\",\"description\":\"Tips4PC.com provides free computer tips and advice for anyone who wants to learn something new. All the information is written in an easy to understand way.\",\"sameAs\":[\"http:\\\/\\\/tips4pc.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/tips4pc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Your PC is a Hacker's Favorite Weapon","description":"Cyber security isn\u2019t just an issue for governments and corporations, but an issue we all face\u2014that\u2019s because the favorite weapon of hackers and terrorists is your computer.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/","og_locale":"en_US","og_type":"article","og_title":"Why Your PC is a Hacker's Favorite Weapon","og_description":"Cyber security isn\u2019t just an issue for governments and corporations, but an issue we all face\u2014that\u2019s because the favorite weapon of hackers and terrorists is your computer.","og_url":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2012-12-04T18:53:25+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Tips4 PC","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Tips4 PC","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/"},"author":{"name":"Tips4 PC","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/181845ffbd3d2cd01345e2d6cfd75ca0"},"headline":"Why Your PC is a Hacker&#8217;s Favorite Weapon","datePublished":"2012-12-04T18:53:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/"},"wordCount":355,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["pc security"],"articleSection":["Tips4PC"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/","url":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/","name":"Why Your PC is a Hacker's Favorite Weapon","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2012-12-04T18:53:25+00:00","description":"Cyber security isn\u2019t just an issue for governments and corporations, but an issue we all face\u2014that\u2019s because the favorite weapon of hackers and terrorists is your computer.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/why-your-pc-is-a-hackers-favorite-weapon\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Your PC is a Hacker&#8217;s Favorite Weapon"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/181845ffbd3d2cd01345e2d6cfd75ca0","name":"Tips4 PC","description":"Tips4PC.com provides free computer tips and advice for anyone who wants to learn something new. All the information is written in an easy to understand way.","sameAs":["http:\/\/tips4pc.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/tips4pc\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/39736","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/33"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=39736"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/39736\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=39736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=39736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=39736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}