{"id":53060,"date":"2016-04-15T15:54:16","date_gmt":"2016-04-15T15:54:16","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=53060"},"modified":"2016-04-20T14:52:31","modified_gmt":"2016-04-20T14:52:31","slug":"53060","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/53060\/","title":{"rendered":"The Differences Between a Virus, Trojan, and Rootkit"},"content":{"rendered":"<p>Worms, Trojans , and Rootkits are not the same.<br \/>\n<!--more--><\/p>\n<p><img decoding=\"async\" class=\"alignnone wp-image-53061\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/a_computer_virus_3-300x273.gif\" alt=\"computer virus\" width=\"124\" height=\"113\" \/> <img decoding=\"async\" class=\"alignnone wp-image-53062\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/computer-infection4-300x282.jpg\" alt=\"computer-infection4\" width=\"140\" height=\"132\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/computer-infection4-300x282.jpg 300w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/computer-infection4.jpg 500w\" sizes=\"(max-width: 140px) 100vw, 140px\" \/> <img decoding=\"async\" class=\"alignnone wp-image-53063\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/worm.jpg\" alt=\"worm\" width=\"93\" height=\"124\" \/> <img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-53064\" src=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/3321596621_6b747f9e36_z-289x300.jpg\" alt=\"3321596621_6b747f9e36_z\" width=\"107\" height=\"111\" srcset=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/3321596621_6b747f9e36_z-289x300.jpg 289w, https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/3321596621_6b747f9e36_z.jpg 616w\" sizes=\"(max-width: 107px) 100vw, 107px\" \/><\/p>\n<p>Today I wanted to take the time out to inform or educate you on the names and differences of not so good files that you may come into contact with. Thus, making having a superb antivirus software like PC Matic and Super shield a necessity. A lot of times the word virus, worm, Trojan, and Rootkit are used interchangeably when in fact they mean different things\u00a0and have different ways they can wreak havoc and compromise your system.<\/p>\n<p>First,\u00a0I would like to start with what a virus is and what it does. A virus is a\u00a0program that reproduces\u00a0itself into other\u00a0 programs and files usually with malicious intent.\u00a0 You may be asking yourself, how do I know if I&#8217;ve been infected with a virus? The\u00a0symptoms of a computer being infected with a virus are as follows: high CPU utilization, lost hard drive space, corrupted data, private information compromised, and pop-ups to name a few.<\/p>\n<p>Next, we will talk about what a computer worm is and the effects it has on your computer. A worm is something that clones itself without the use of another file or program, unlike a virus. They utilize networks and depend on security vulnerabilities to infect other computers. It does not alter files but lives in active memory and recreates itself.\u00a0 As a result, you would experience high CPU usage and slowness of the worst kind.<\/p>\n<p>Our next specimen for discussion is a Trojan Horse or just Trojan for short. A Trojan is a sneaky piece of malware and a hacker&#8217;s best friend. They are mostly distributed through social engineering attacks. They are different from viruses because they don&#8217;t have the ability to replicate themselves but just as dangerous and can have catastrophic effects on your system. Once a computer is infected with a Trojan it can assist an attacker with stealing confidential information like passwords and credit card information even turning on your webcam without your knowledge or consent.<\/p>\n<p>And lastly, we will discuss what a Rootkit is. It is a type of Trojan that seeks to gain root or administrative access. It has the ability to conceal itself, other files, registry keys, and network connection and keep them hidden from being discovered. Removal of this type of infection can prove difficult or impossible and in some cases reinstalling the Operating System is the only way to clear the infection.<\/p>\n<p>There are many threats and dangers when it comes to surfing the internet, downloading files, and clicking on links. That is why it is crucial to have an antivirus software active and running at all times. I have blocked many Ransomware Viruses and Trojans during my shift as a malware researcher and stand behind Super Shield as being the best real-time protection that you can get on the market today.<\/p>\n<p>I hope this blog helps. Cheers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Worms, Trojans , and Rootkits are not the same.<\/p>\n","protected":false},"author":59,"featured_media":66012,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4851,4522],"tags":[56,482],"class_list":["post-53060","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-malware-research-team","category-pc-safety-2","tag-malware","tag-virus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Differences Between a Virus, Trojan, and Rootkit<\/title>\n<meta name=\"description\" content=\"Worms, Trojans and Rootkits are not the same.\u00a0 Find out the key differences now....\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/53060\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Differences Between a Virus, Trojan, and Rootkit\" \/>\n<meta property=\"og:description\" content=\"Worms, Trojans and Rootkits are not the same.\u00a0 Find out the key differences now....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/53060\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-15T15:54:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-04-20T14:52:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"James Darden\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"James Darden\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/\"},\"author\":{\"name\":\"James Darden\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/b8ce0708ecb54d6dd2242ad2a66de3a2\"},\"headline\":\"The Differences Between a Virus, Trojan, and Rootkit\",\"datePublished\":\"2016-04-15T15:54:16+00:00\",\"dateModified\":\"2016-04-20T14:52:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/\"},\"wordCount\":493,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"keywords\":[\"malware\",\"virus\"],\"articleSection\":[\"Malware Research Team\",\"PC Safety\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/\",\"name\":\"The Differences Between a Virus, Trojan, and Rootkit\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"datePublished\":\"2016-04-15T15:54:16+00:00\",\"dateModified\":\"2016-04-20T14:52:31+00:00\",\"description\":\"Worms, Trojans and Rootkits are not the same.\u00a0 Find out the key differences now....\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/pcmatic-fallback.png\",\"width\":1920,\"height\":1080},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/53060\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Differences Between a Virus, Trojan, and Rootkit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/b8ce0708ecb54d6dd2242ad2a66de3a2\",\"name\":\"James Darden\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/james\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Differences Between a Virus, Trojan, and Rootkit","description":"Worms, Trojans and Rootkits are not the same.\u00a0 Find out the key differences now....","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/53060\/","og_locale":"en_US","og_type":"article","og_title":"The Differences Between a Virus, Trojan, and Rootkit","og_description":"Worms, Trojans and Rootkits are not the same.\u00a0 Find out the key differences now....","og_url":"https:\/\/www.pcmatic.com\/blog\/53060\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-04-15T15:54:16+00:00","article_modified_time":"2016-04-20T14:52:31+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","type":"image\/png"}],"author":"James Darden","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"James Darden","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/53060\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/53060\/"},"author":{"name":"James Darden","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/b8ce0708ecb54d6dd2242ad2a66de3a2"},"headline":"The Differences Between a Virus, Trojan, and Rootkit","datePublished":"2016-04-15T15:54:16+00:00","dateModified":"2016-04-20T14:52:31+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/53060\/"},"wordCount":493,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/53060\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","keywords":["malware","virus"],"articleSection":["Malware Research Team","PC Safety"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/53060\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/53060\/","url":"https:\/\/www.pcmatic.com\/blog\/53060\/","name":"The Differences Between a Virus, Trojan, and Rootkit","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/53060\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/53060\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","datePublished":"2016-04-15T15:54:16+00:00","dateModified":"2016-04-20T14:52:31+00:00","description":"Worms, Trojans and Rootkits are not the same.\u00a0 Find out the key differences now....","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/53060\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/53060\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/53060\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/pcmatic-fallback.png","width":1920,"height":1080},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/53060\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The Differences Between a Virus, Trojan, and Rootkit"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/b8ce0708ecb54d6dd2242ad2a66de3a2","name":"James Darden","url":"https:\/\/www.pcmatic.com\/blog\/author\/james\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53060","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/59"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=53060"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/53060\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/66012"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=53060"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=53060"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=53060"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}