{"id":40839,"date":"2013-01-22T17:57:26","date_gmt":"2013-01-22T17:57:26","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=40839"},"modified":"2013-01-22T17:57:26","modified_gmt":"2013-01-22T17:57:26","slug":"whats-in-it-for-the-creators-of-malware","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/","title":{"rendered":"What&#8217;s in it for the creators of malware?"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/malwarecreation.jpg\" alt=\"malwarecreation\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-40842\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/malwarecreation.jpg 150w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/malwarecreation-120x120.jpg 120w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<h4>What&#8217;s in it for the creators of malware?<\/h4>\n<p>By Leo Notenboom<\/p>\n<p><i><font SIZE=\"2\"><strong>The Question:<\/strong>What monetary gain do malware creators have in creating their nasty stuff? Does someone pay them to do this? Or do they just do it for the sheer enjoyment of wreaking havoc?<\/i><\/p>\n<p><\/font><\/p>\n<p><\/p>\n<p>It used to be about enjoyment and bragging rights, and I&#8217;ll speak to that in a moment.<\/p>\n<p>In recent years, however, the nature of malware has changed dramatically, and you&#8217;ve nailed it at the start:<\/p>\n<p>It&#8217;s all about the money. Lots and lots of money.<\/p>\n<p><strong>\u2022<\/strong><\/p>\n<p><strong>The Past: Bragging Rights<\/strong><\/p>\n<p>Malware has evolved.<\/p>\n<p>The concept of viruses or self-replicating programs actually originated with early computer researchers, but never put into play.<\/p>\n<p>The first actual viruses were, essentially, pranks or fairly benign proof that viruses could be created. Most simply displayed a message of some sort to indicate that they were present, while infecting other computers through various means.<\/p>\n<p>Interestingly the first virus to be caught &#8220;in the wild&#8221; (publicly accessible computers and networks) was called Elk Cloner and infected the Apple DOS operating system, and dates back to 1981. It was created by a 15 year old, as a joke.<\/p>\n<p>Things went downhill from there.<\/p>\n<p>As computers became more and more accessible, and networked, hackers of various flavors found the concept of infecting computes with malware challenging, and even began to compete with each other. Less savory elements went so far as to create malware that was destructive, simultaneously raising the stakes of the competition.<\/p>\n<p>The more computers infected, the more data destroyed, the more bragging rights the hacker garnered.<\/p>\n<p>Others, however, saw a different potential. For that, though, we need to veer into the world of spam.<\/p>\n<p><strong>Then Came Spam<\/strong><\/p>\n<p>Spam is nothing more than unsolicited and unwanted communication, typically in the form of email.<\/p>\n<p>However while the term is recent, the concept predates both the internet and even the telephone. Nope, we&#8217;re talking the telgraph here:<\/p>\n<p>The first recorded instance of a mass unsolicited commercial telegram is from May 1864. Up until the Great Depression, wealthy North American residents would be deluged with nebulous investment offers.1<br \/>\nEven then what was to become spam boiled down to what we see today: unsolicited advertising of questionable products.<\/p>\n<p>Or, not so questionable. The first computer spam might be considered an email promoting a new model of Digital Equipment Computer. A fine computer, I&#8217;m sure. A not-so-fine approach to promoting it.<\/p>\n<p>Fast forward to today, where an estimated 80 to 90 percent of all email flying around the internet is some form of spam.<\/p>\n<p><a href=\"http:\/\/ask-leo.com\/whats_in_it_for_the_creators_of_malware.html\" target=\"_blank\"> Read the rest of the story here.<\/a>.<\/p>\n<p>This post is excerpted with permission from Leo Notenboom.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/malwarecreation.jpg\" alt=\"malwarecreation\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-40842\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/malwarecreation.jpg 150w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/malwarecreation-120x120.jpg 120w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>Malware has come a long, long way since its origination as a benign joke or proof-of-concept. <\/p>\n","protected":false},"author":19,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[49],"tags":[56],"class_list":["post-40839","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-leo-notenboom","tag-malware"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What&#039;s in it for the creators of malware?<\/title>\n<meta name=\"description\" content=\"Malware has come a long, long way since its origination as a benign joke or proof-of-concept.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What&#039;s in it for the creators of malware?\" \/>\n<meta property=\"og:description\" content=\"Malware has come a long, long way since its origination as a benign joke or proof-of-concept.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2013-01-22T17:57:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Leo Notenboom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leo Notenboom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/\"},\"author\":{\"name\":\"Leo Notenboom\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ed90798b38aa4ab74e12591da7ab21d5\"},\"headline\":\"What&#8217;s in it for the creators of malware?\",\"datePublished\":\"2013-01-22T17:57:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/\"},\"wordCount\":452,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"malware\"],\"articleSection\":[\"leo notenboom\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/\",\"name\":\"What's in it for the creators of malware?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2013-01-22T17:57:26+00:00\",\"description\":\"Malware has come a long, long way since its origination as a benign joke or proof-of-concept.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whats-in-it-for-the-creators-of-malware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What&#8217;s in it for the creators of malware?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ed90798b38aa4ab74e12591da7ab21d5\",\"name\":\"Leo Notenboom\",\"description\":\"Leo A. Notenboom is the owner of Puget Sound Software, LLC and the Leo in Ask Leo!. Leo has been in the personal computer and software industry since 1979, as a software engineer, a manager of software engineers, and as a consultant. In 1983 Leo joined what was then a medium sized local company called Microsoft and spent the next 18 years in a wide variety of groups working on a wide variety of software. If you're running Microsoft Windows, if you've used a Microsoft development tool or Microsoft Money, or if you've ever purchased a ticket through Expedia, there's a good chance you've been touched by some of his work. And of course, since 2003, Leo has been answering your tech questions on Ask Leo!\",\"sameAs\":[\"http:\\\/\\\/ask-leo.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/leo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What's in it for the creators of malware?","description":"Malware has come a long, long way since its origination as a benign joke or proof-of-concept.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/","og_locale":"en_US","og_type":"article","og_title":"What's in it for the creators of malware?","og_description":"Malware has come a long, long way since its origination as a benign joke or proof-of-concept.","og_url":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2013-01-22T17:57:26+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Leo Notenboom","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Leo Notenboom","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/"},"author":{"name":"Leo Notenboom","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ed90798b38aa4ab74e12591da7ab21d5"},"headline":"What&#8217;s in it for the creators of malware?","datePublished":"2013-01-22T17:57:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/"},"wordCount":452,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["malware"],"articleSection":["leo notenboom"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/","url":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/","name":"What's in it for the creators of malware?","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2013-01-22T17:57:26+00:00","description":"Malware has come a long, long way since its origination as a benign joke or proof-of-concept.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/whats-in-it-for-the-creators-of-malware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What&#8217;s in it for the creators of malware?"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ed90798b38aa4ab74e12591da7ab21d5","name":"Leo Notenboom","description":"Leo A. Notenboom is the owner of Puget Sound Software, LLC and the Leo in Ask Leo!. Leo has been in the personal computer and software industry since 1979, as a software engineer, a manager of software engineers, and as a consultant. In 1983 Leo joined what was then a medium sized local company called Microsoft and spent the next 18 years in a wide variety of groups working on a wide variety of software. If you're running Microsoft Windows, if you've used a Microsoft development tool or Microsoft Money, or if you've ever purchased a ticket through Expedia, there's a good chance you've been touched by some of his work. And of course, since 2003, Leo has been answering your tech questions on Ask Leo!","sameAs":["http:\/\/ask-leo.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/leo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/40839","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=40839"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/40839\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=40839"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=40839"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=40839"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}