{"id":41760,"date":"2013-02-26T18:12:02","date_gmt":"2013-02-26T18:12:02","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=41760"},"modified":"2013-02-26T18:12:02","modified_gmt":"2013-02-26T18:12:02","slug":"what-you-dont-know-about-computer-hacking","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/","title":{"rendered":"What You Don\u2019t Know About Computer Hacking"},"content":{"rendered":"<p><\/p>\n<p>By Windows Talk<\/p>\n<p><strong>What You Don\u2019t Know About Computer Hacking<\/strong><\/p>\n<p>I think we all know that real computer hacking doesn\u2019t happen the way you see it in movies and television, but what really does happen when a hacker tries to take over a computer?<\/p>\n<p><strong>Most Computer Hacking Has A Profit Motive<\/strong><\/p>\n<p>Hackers on television often have some noble motive\u2014or they\u2019re certifiably crazy. But in reality, most serious hackers are just trying to make a buck.<\/p>\n<p>Most hackers come from semi-impoverished nations. They\u2019re rich enough to afford old computers and basic Internet access, but they\u2019re not located in rich nations so they can\u2019t get a high-paying job as programmers or system administrators, so they resort to hacking.<\/p>\n<p>Hacking doesn\u2019t pay well (usually). Most hackers make money by breaking into computers and then using them to run a scam or send spam email\u2014but most people know better than to buy from a scam site, and even when they do buy from a scam site, credit card companies and banks deny the hackers money, so hackers only make money from 1 person in 100,000.<\/p>\n<p><strong>Computer Hacking Rarely Target PCs Directly<\/strong><\/p>\n<p>If you\u2019re famous, there\u2019s probably a computer hacker trying to break into your computer right now. But if you\u2019re just a regular person, hackers won\u2019t usually dedicate the time to try to break into your computer directly.<\/p>\n<p>Instead, hackers write viruses to break into thousands or millions of computers at the same time. Then they use these computers as robots (\u201cbots\u201d) to power their scams. They don\u2019t care about you personally, but they also don\u2019t care how much damage they do to you through their computer hacking.<\/p>\n<p><a href=\"http:\/\/www.windowstalk.org\/2013\/02\/about-computer-hacking\/\" target=\"_blank\">Article continued here<\/a><\/p>\n<p>Shared with permission from Windows Talk.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/hackers.jpg\" alt=\"hackers\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-41764\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackers.jpg 150w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/hackers-120x120.jpg 120w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>I think we all know that real computer hacking doesn\u2019t happen the way you see it in movies and television, but what really does happen when a hacker tries to take over a computer?<\/p>\n","protected":false},"author":23,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[557],"tags":[4412,444],"class_list":["post-41760","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-windows-talk","tag-computer-hacking","tag-computer-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What You Don\u2019t Know About Computer Hacking<\/title>\n<meta name=\"description\" content=\"I think we all know that real computer hacking doesn\u2019t happen the way you see it in movies and television, but what really does happen when a hacker tries to take over a computer?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What You Don\u2019t Know About Computer Hacking\" \/>\n<meta property=\"og:description\" content=\"I think we all know that real computer hacking doesn\u2019t happen the way you see it in movies and television, but what really does happen when a hacker tries to take over a computer?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2013-02-26T18:12:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Windows Talk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Windows Talk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/\"},\"author\":{\"name\":\"Windows Talk\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4992c27485c01defd2b513a12d0aaf2\"},\"headline\":\"What You Don\u2019t Know About Computer Hacking\",\"datePublished\":\"2013-02-26T18:12:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/\"},\"wordCount\":304,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"computer hacking\",\"Computer Security\"],\"articleSection\":[\"Windows Talk\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/\",\"name\":\"What You Don\u2019t Know About Computer Hacking\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2013-02-26T18:12:02+00:00\",\"description\":\"I think we all know that real computer hacking doesn\u2019t happen the way you see it in movies and television, but what really does happen when a hacker tries to take over a computer?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/what-you-dont-know-about-computer-hacking\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What You Don\u2019t Know About Computer Hacking\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/f4992c27485c01defd2b513a12d0aaf2\",\"name\":\"Windows Talk\",\"description\":\"WindowsTalk\u2019s mission is to provide access to the best Windows\u00ae and PC resources available, to be informative in understanding new technologies and be helpful in resolving PC-related problems while at the same time helping you to actually enjoy the Windows experience! Windows Talk is owned and operated by James M. Fisher, a Microsoft MVP awardee since October 2003 in the \u201cWindows Expert-Consumer\u201d category.\",\"sameAs\":[\"http:\\\/\\\/www.windowstalk.org\\\/\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/windowstalk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What You Don\u2019t Know About Computer Hacking","description":"I think we all know that real computer hacking doesn\u2019t happen the way you see it in movies and television, but what really does happen when a hacker tries to take over a computer?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/","og_locale":"en_US","og_type":"article","og_title":"What You Don\u2019t Know About Computer Hacking","og_description":"I think we all know that real computer hacking doesn\u2019t happen the way you see it in movies and television, but what really does happen when a hacker tries to take over a computer?","og_url":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2013-02-26T18:12:02+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Windows Talk","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Windows Talk","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/"},"author":{"name":"Windows Talk","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f4992c27485c01defd2b513a12d0aaf2"},"headline":"What You Don\u2019t Know About Computer Hacking","datePublished":"2013-02-26T18:12:02+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/"},"wordCount":304,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["computer hacking","Computer Security"],"articleSection":["Windows Talk"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/","url":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/","name":"What You Don\u2019t Know About Computer Hacking","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2013-02-26T18:12:02+00:00","description":"I think we all know that real computer hacking doesn\u2019t happen the way you see it in movies and television, but what really does happen when a hacker tries to take over a computer?","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/what-you-dont-know-about-computer-hacking\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What You Don\u2019t Know About Computer Hacking"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/f4992c27485c01defd2b513a12d0aaf2","name":"Windows Talk","description":"WindowsTalk\u2019s mission is to provide access to the best Windows\u00ae and PC resources available, to be informative in understanding new technologies and be helpful in resolving PC-related problems while at the same time helping you to actually enjoy the Windows experience! Windows Talk is owned and operated by James M. Fisher, a Microsoft MVP awardee since October 2003 in the \u201cWindows Expert-Consumer\u201d category.","sameAs":["http:\/\/www.windowstalk.org\/"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/windowstalk\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/41760","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/23"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=41760"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/41760\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=41760"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=41760"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=41760"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}