{"id":43706,"date":"2013-05-21T18:19:39","date_gmt":"2013-05-21T18:19:39","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=43706"},"modified":"2014-05-12T19:02:30","modified_gmt":"2014-05-12T19:02:30","slug":"who-is-stealing-your-wifi","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/","title":{"rendered":"Who Is Stealing Your WiFi"},"content":{"rendered":"<p><\/p>\n<h4>Who Is Stealing Your WiFi<\/h4>\n<p>By Bob Rankin<\/p>\n<p>Is your wireless Internet connection sometimes mysteriously slow? It&#8217;s possible that you&#8217;re sharing it with a stranger. But how can you know for sure if a neighbor or a malicious hacker has tapped into your WiFi? Read on to learn how you can detect bandwidth bandits, and give them the boot&#8230;<\/p>\n<p><strong>How to Detect and Defeat WiFi Intruders<\/strong><\/p>\n<p>There are many possible reasons why your wireless Internet connection suddenly slows to a crawl. An unauthorized user stealing your bandwidth is one of them. It is unlikely that such a bandwidth thief will access your WiFi network if you have implemented the basic WiFi security described in my article, Wireless Network Security Checklist. But it\u2019s certainly a possibility that should be checked. Anyone with the skills and determination to hack your secured network is probably up to serious criminal activity.<\/p>\n<p>There are many casual, even \u201cinnocent\u201d bandwidth thieves who see an available network and just assume it\u2019s OK to \u201cborrow\u201d it. If they are challenged for a password when they attempt to log on, they&#8217;ll probably just give up and move on to another target. If you haven&#8217;t bothered to assign a wifi access password, the front door to your network is wide open. If you&#8217;re not sure why that&#8217;s a bad idea, see The WiFi Security Mistake You Must Avoid.<\/p>\n<p>A real cybercriminal is another matter. He is out to steal something of value from you or others. He may peruse computers on your network for identity and financial information he can use or sell. He may use your Internet connection to download files illegally or hack other networks, setting you up as the fall guy when the crime is traced back to your router. This sort of crook has the tools and skills needed to defeat most WiFi security measures, especially if you have a weak password.<\/p>\n<p>Windows and Apple computers have built-in utilities that show what devices are connected to your network. You can use these tools to look for unknown computers that should not be connecting to your network. Obviously, the first step is to know what devices are authorized. Each authorized computer should be assigned a computer name that you can recognize easily, i.e., &#8220;Jane&#8217;s PC&#8221; or &#8220;Billy-iPod&#8221;. Other devices, such as printers, will have built-in names such as \u201cHP Model 8600;\u201d you should be familiar with what you own.<\/p>\n<p><b><a href=\"http:\/\/askbobrankin.com\/is_someone_stealing_my_wifi.html?pcp\">Article Continued Here<\/a><\/b><\/p>\n<p>Excerpt shared with permission from Bob Rankin.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/wifisteal150.jpg\" alt=\"wifisteal150\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-43709\" \/><\/p>\n<p>Is your wireless Internet connection sometimes mysteriously slow? It&#8217;s possible that you&#8217;re sharing it with a stranger.<\/p>\n","protected":false},"author":20,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[13],"tags":[512],"class_list":["post-43706","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bob-rankin","tag-wifi"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Who Is Stealing Your WiFi<\/title>\n<meta name=\"description\" content=\"Who Is Stealing Your WiFi - Is your wireless Internet connection sometimes mysteriously slow? It&#039;s possible that you&#039;re sharing it with a stranger.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Who Is Stealing Your WiFi\" \/>\n<meta property=\"og:description\" content=\"Who Is Stealing Your WiFi - Is your wireless Internet connection sometimes mysteriously slow? It&#039;s possible that you&#039;re sharing it with a stranger.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2013-05-21T18:19:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-05-12T19:02:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Bob Rankin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bob Rankin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/\"},\"author\":{\"name\":\"Bob Rankin\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/14737bf7fced6827446b09e297ea0744\"},\"headline\":\"Who Is Stealing Your WiFi\",\"datePublished\":\"2013-05-21T18:19:39+00:00\",\"dateModified\":\"2014-05-12T19:02:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/\"},\"wordCount\":426,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"wifi\"],\"articleSection\":[\"Bob Rankin\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/\",\"name\":\"Who Is Stealing Your WiFi\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2013-05-21T18:19:39+00:00\",\"dateModified\":\"2014-05-12T19:02:30+00:00\",\"description\":\"Who Is Stealing Your WiFi - Is your wireless Internet connection sometimes mysteriously slow? It's possible that you're sharing it with a stranger.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/who-is-stealing-your-wifi\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Who Is Stealing Your WiFi\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/14737bf7fced6827446b09e297ea0744\",\"name\":\"Bob Rankin\",\"description\":\"Bob Rankin is a translator for the technology impaired -- a writer and computer programmer who enjoys exploring the Internet and explaining technology in plain English. His work has appeared in Computer World, NY Newsday, and other publications. Bob is also publisher of Internet TOURBUS, author of several computer books, and creator of the Lowfat Linux tutorial.\",\"sameAs\":[\"http:\\\/\\\/askbobrankin.com\\\/tbsignup.html?pcp\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/bobrankin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Who Is Stealing Your WiFi","description":"Who Is Stealing Your WiFi - Is your wireless Internet connection sometimes mysteriously slow? It's possible that you're sharing it with a stranger.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/","og_locale":"en_US","og_type":"article","og_title":"Who Is Stealing Your WiFi","og_description":"Who Is Stealing Your WiFi - Is your wireless Internet connection sometimes mysteriously slow? It's possible that you're sharing it with a stranger.","og_url":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2013-05-21T18:19:39+00:00","article_modified_time":"2014-05-12T19:02:30+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Bob Rankin","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Bob Rankin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/"},"author":{"name":"Bob Rankin","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/14737bf7fced6827446b09e297ea0744"},"headline":"Who Is Stealing Your WiFi","datePublished":"2013-05-21T18:19:39+00:00","dateModified":"2014-05-12T19:02:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/"},"wordCount":426,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["wifi"],"articleSection":["Bob Rankin"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/","url":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/","name":"Who Is Stealing Your WiFi","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2013-05-21T18:19:39+00:00","dateModified":"2014-05-12T19:02:30+00:00","description":"Who Is Stealing Your WiFi - Is your wireless Internet connection sometimes mysteriously slow? It's possible that you're sharing it with a stranger.","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/who-is-stealing-your-wifi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Who Is Stealing Your WiFi"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/14737bf7fced6827446b09e297ea0744","name":"Bob Rankin","description":"Bob Rankin is a translator for the technology impaired -- a writer and computer programmer who enjoys exploring the Internet and explaining technology in plain English. His work has appeared in Computer World, NY Newsday, and other publications. Bob is also publisher of Internet TOURBUS, author of several computer books, and creator of the Lowfat Linux tutorial.","sameAs":["http:\/\/askbobrankin.com\/tbsignup.html?pcp"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/bobrankin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/43706","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=43706"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/43706\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=43706"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=43706"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=43706"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}