{"id":45138,"date":"2013-08-13T20:48:27","date_gmt":"2013-08-13T20:48:27","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=45138"},"modified":"2013-08-13T20:48:27","modified_gmt":"2013-08-13T20:48:27","slug":"8-critical-steps-to-better-internet-security","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/","title":{"rendered":"8 Critical Steps to Better Internet Security"},"content":{"rendered":"<p><\/p>\n<h4>8 Critical Steps to Better Internet Security<\/h4>\n<p>By Leo Notenboom<\/p>\n<p><i><font SIZE=\"2\">The internet is not for the faint of heart. Threats to your privacy and security seem to lurk around every corner. Leo outlines 8 steps you should follow to fight back.&#8211;PC Pitstop<\/i><\/font><\/p>\n<p>Viruses and spyware and worms \u2026 oh my!<\/p>\n<p>The very concept of \u201cinternet safety\u201d is almost an oxymoron these days.<\/p>\n<p>It seems like not a day goes by that we don\u2019t hear about some new kind of threat aimed at wreaking havoc across machines connected to the internet.<\/p>\n<p>Anti-Microsoft sentiment coupled with the massive installed base make Microsoft products, and particularly Microsoft Windows, an irresistible target for hackers and \u201cscript kiddies.\u201d In recent years, products like Adobe Reader, Java, Flash, Firefox, and more have come under attack as their popularity has increased. Even Macs are no longer invulnerable.<\/p>\n<p>Here are some things you can (and should) do to stay safe.<\/p>\n<p><strong>1. Use a firewall<\/strong><\/p>\n<p>If you\u2019re connected to the internet through a router, then you already have a type of hardware firewall that prevents random networking-based external threats from reaching your computers.<\/p>\n<p>If you\u2019re using a dial-up internet connection, a firewall may not be as important, although it doesn\u2019t hurt to have one. A software firewall may be your only option.<\/p>\n<p><strong><strong>2. Scan for viruses<\/strong><\/strong><\/p>\n<p>Sometimes, typically via email or other means, viruses are able to cross the firewall and end up on your computer anyway.<\/p>\n<p>A virus scanner will locate and remove them from your hard disk. A real-time virus scanner will notice them as they arrive, even before they hit the disk, but at the cost of slowing down your machine a little, and occasionally even interfering with other operations.<\/p>\n<p><em>Important: Because new viruses are arriving every day, it is critical to keep your virus definitions up-to-date. Be sure to enable the scanning software\u2019s automatic-update feature and have it do so every day.<\/em><\/p>\n<h3><a href=\"http:\/\/askleo.com\/internet_safety_8_steps_to_keeping_your_computer_safe_on_the_internet\/\" target=\"_blank\">Steps Continued Here<\/a><\/h3>\n<p><em>This excerpt appears with permission from Leo Notenboom<\/em>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p><img decoding=\"async\" src=\"http:\/\/techtalk.pcpitstop.com\/wp-content\/uploads\/security150.jpg\" alt=\"security150\" width=\"150\" height=\"150\" class=\"alignleft size-full wp-image-45143\" \/><\/p>\n<p>The internet is not for the faint of heart. Threats to your privacy and security seem to lurk around every corner. Leo outlines 8 steps you should follow to fight back.<\/p>\n","protected":false},"author":19,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[49],"tags":[],"class_list":["post-45138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-leo-notenboom"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>8 Critical Steps to Better Internet Security<\/title>\n<meta name=\"description\" content=\"8 Critical Steps to Better Internet Security - The internet is not for the faint of heart. Threats to your privacy and security seem to lurk around every corner. Leo outlines 8 steps you should follow to fight back\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 Critical Steps to Better Internet Security\" \/>\n<meta property=\"og:description\" content=\"8 Critical Steps to Better Internet Security - The internet is not for the faint of heart. Threats to your privacy and security seem to lurk around every corner. Leo outlines 8 steps you should follow to fight back\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-13T20:48:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Leo Notenboom\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leo Notenboom\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/\"},\"author\":{\"name\":\"Leo Notenboom\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ed90798b38aa4ab74e12591da7ab21d5\"},\"headline\":\"8 Critical Steps to Better Internet Security\",\"datePublished\":\"2013-08-13T20:48:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/\"},\"wordCount\":335,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"articleSection\":[\"leo notenboom\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/\",\"name\":\"8 Critical Steps to Better Internet Security\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2013-08-13T20:48:27+00:00\",\"description\":\"8 Critical Steps to Better Internet Security - The internet is not for the faint of heart. Threats to your privacy and security seem to lurk around every corner. Leo outlines 8 steps you should follow to fight back\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/8-critical-steps-to-better-internet-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 Critical Steps to Better Internet Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ed90798b38aa4ab74e12591da7ab21d5\",\"name\":\"Leo Notenboom\",\"description\":\"Leo A. Notenboom is the owner of Puget Sound Software, LLC and the Leo in Ask Leo!. Leo has been in the personal computer and software industry since 1979, as a software engineer, a manager of software engineers, and as a consultant. In 1983 Leo joined what was then a medium sized local company called Microsoft and spent the next 18 years in a wide variety of groups working on a wide variety of software. If you're running Microsoft Windows, if you've used a Microsoft development tool or Microsoft Money, or if you've ever purchased a ticket through Expedia, there's a good chance you've been touched by some of his work. And of course, since 2003, Leo has been answering your tech questions on Ask Leo!\",\"sameAs\":[\"http:\\\/\\\/ask-leo.com\"],\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/leo\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 Critical Steps to Better Internet Security","description":"8 Critical Steps to Better Internet Security - The internet is not for the faint of heart. Threats to your privacy and security seem to lurk around every corner. Leo outlines 8 steps you should follow to fight back","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/","og_locale":"en_US","og_type":"article","og_title":"8 Critical Steps to Better Internet Security","og_description":"8 Critical Steps to Better Internet Security - The internet is not for the faint of heart. Threats to your privacy and security seem to lurk around every corner. Leo outlines 8 steps you should follow to fight back","og_url":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2013-08-13T20:48:27+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"Leo Notenboom","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Leo Notenboom","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/"},"author":{"name":"Leo Notenboom","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ed90798b38aa4ab74e12591da7ab21d5"},"headline":"8 Critical Steps to Better Internet Security","datePublished":"2013-08-13T20:48:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/"},"wordCount":335,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","articleSection":["leo notenboom"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/","url":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/","name":"8 Critical Steps to Better Internet Security","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2013-08-13T20:48:27+00:00","description":"8 Critical Steps to Better Internet Security - The internet is not for the faint of heart. Threats to your privacy and security seem to lurk around every corner. Leo outlines 8 steps you should follow to fight back","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/8-critical-steps-to-better-internet-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"8 Critical Steps to Better Internet Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ed90798b38aa4ab74e12591da7ab21d5","name":"Leo Notenboom","description":"Leo A. Notenboom is the owner of Puget Sound Software, LLC and the Leo in Ask Leo!. Leo has been in the personal computer and software industry since 1979, as a software engineer, a manager of software engineers, and as a consultant. In 1983 Leo joined what was then a medium sized local company called Microsoft and spent the next 18 years in a wide variety of groups working on a wide variety of software. If you're running Microsoft Windows, if you've used a Microsoft development tool or Microsoft Money, or if you've ever purchased a ticket through Expedia, there's a good chance you've been touched by some of his work. And of course, since 2003, Leo has been answering your tech questions on Ask Leo!","sameAs":["http:\/\/ask-leo.com"],"url":"https:\/\/www.pcmatic.com\/blog\/author\/leo\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/45138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=45138"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/45138\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=45138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=45138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=45138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}