{"id":54172,"date":"2016-08-26T15:16:24","date_gmt":"2016-08-26T15:16:24","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=54172"},"modified":"2016-08-26T15:16:24","modified_gmt":"2016-08-26T15:16:24","slug":"keeping-data-safe-application-whitelisting","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/","title":{"rendered":"Keeping Data Safe With Application Whitelisting"},"content":{"rendered":"<p>&nbsp;<\/p>\n<h3>Data Center Journal encourages application whitelisting technology to keep your data safe&#8230;<\/h3>\n<p><!--more--><\/p>\n<p><a href=\"http:\/\/www.pcmatic.com\/pro\/whitelist\">Application whitelisting <\/a>has been proven to block unwanted, unsafe, and unknown programs from executing on your PC.\u00a0 It&#8217;s no wonder <a href=\"http:\/\/www.datacenterjournal.com\/combat-security-cracks-due-collaboration-data-sharing\/\">Data Center Journal<\/a> is encouraging PC users to implement it.<\/p>\n<p>For those who are unfamiliar with application whitelisting, the logic behind it is essentially the exact opposite\u00a0of what is\u00a0being used for a mass majority of security software solutions.\u00a0 Most security programs utilize a blacklist approach.\u00a0 A blacklist is a list of all the known malicious files and programs.\u00a0 So, if you were to try to execute a file, they would run it against their blacklist and if it&#8217;s not on there, the program is allowed to run.\u00a0 The problem with this methodology is malware is constantly changing, as fast as every 15 seconds.\u00a0 It is impossible to keep the blacklist updated.<\/p>\n<p>This is where the application whitelisting provides advanced protection.\u00a0 Application whitelisting uses a list of known good programs and files.\u00a0 So again, you try to execute a file and this time\u00a0it is ran against the whitelist.\u00a0 If it&#8217;s on the whitelist, it executes, if it&#8217;s not, it does not.\u00a0 The safety feature whitelisting provides exceeds that of the blacklist, because no matter how many times that malicious file changes, it will never be deemed &#8220;safe&#8221;.<\/p>\n<p>This leaves you questioning, which security software offers whitelist protection?\u00a0 <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">PC Matic Pro<\/a> provides superior security protection, with our proprietary application whitelisting technology.\u00a0 Beyond the advanced security protection, <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">PC Matic Pro<\/a>\u00a0offers patch management to ensure all of your endpoints are properly updated.\u00a0 This\u00a0eliminates the risk of hackers finding vulnerabilities within any outdated applications and operating systems.<\/p>\n<p>Stay protected from cyber criminals.\u00a0 Secure your data with <a href=\"https:\/\/cart.pcpitstop.com\/go.asp?id=504632\">PC Matic Pro<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&nbsp; Data Center Journal encourages application whitelisting technology to keep your data safe&#8230;<\/p>\n","protected":false},"author":54,"featured_media":52568,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[4993,4987,4959],"tags":[4999,4354],"class_list":["post-54172","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pc-matic-pro-channel","category-spiceworks","category-whitelisting","tag-pc-matic-pro","tag-whitelisting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keeping Data Safe With Application Whitelisting<\/title>\n<meta name=\"description\" content=\"Data Center Journal is encouraging application whitelisting technology be implemented to ensure your PC and data&#039;s security...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping Data Safe With Application Whitelisting\" \/>\n<meta property=\"og:description\" content=\"Data Center Journal is encouraging application whitelisting technology be implemented to ensure your PC and data&#039;s security...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-26T15:16:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png\" \/>\n\t<meta property=\"og:image:width\" content=\"200\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Kayla Elliott\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kayla Elliott\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/\"},\"author\":{\"name\":\"Kayla Elliott\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\"},\"headline\":\"Keeping Data Safe With Application Whitelisting\",\"datePublished\":\"2016-08-26T15:16:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/\"},\"wordCount\":301,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/logo_fb.png\",\"keywords\":[\"pc matic pro\",\"whitelisting\"],\"articleSection\":[\"PC Matic Pro - Channel\",\"SpiceWorks\",\"Whitelisting\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/\",\"name\":\"Keeping Data Safe With Application Whitelisting\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/logo_fb.png\",\"datePublished\":\"2016-08-26T15:16:24+00:00\",\"description\":\"Data Center Journal is encouraging application whitelisting technology be implemented to ensure your PC and data's security...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/logo_fb.png\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/logo_fb.png\",\"width\":200,\"height\":200,\"caption\":\"PC Matic is the Best Antivirus Software - Best Computer Protection Company\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/keeping-data-safe-application-whitelisting\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keeping Data Safe With Application Whitelisting\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/d4a11f480158af9f8090d8d90e0de8db\",\"name\":\"Kayla Elliott\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/kayla\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keeping Data Safe With Application Whitelisting","description":"Data Center Journal is encouraging application whitelisting technology be implemented to ensure your PC and data's security...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/","og_locale":"en_US","og_type":"article","og_title":"Keeping Data Safe With Application Whitelisting","og_description":"Data Center Journal is encouraging application whitelisting technology be implemented to ensure your PC and data's security...","og_url":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2016-08-26T15:16:24+00:00","og_image":[{"width":200,"height":200,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","type":"image\/png"}],"author":"Kayla Elliott","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Kayla Elliott","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/"},"author":{"name":"Kayla Elliott","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db"},"headline":"Keeping Data Safe With Application Whitelisting","datePublished":"2016-08-26T15:16:24+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/"},"wordCount":301,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","keywords":["pc matic pro","whitelisting"],"articleSection":["PC Matic Pro - Channel","SpiceWorks","Whitelisting"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/","url":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/","name":"Keeping Data Safe With Application Whitelisting","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","datePublished":"2016-08-26T15:16:24+00:00","description":"Data Center Journal is encouraging application whitelisting technology be implemented to ensure your PC and data's security...","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/logo_fb.png","width":200,"height":200,"caption":"PC Matic is the Best Antivirus Software - Best Computer Protection Company"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/keeping-data-safe-application-whitelisting\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Keeping Data Safe With Application Whitelisting"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/d4a11f480158af9f8090d8d90e0de8db","name":"Kayla Elliott","url":"https:\/\/www.pcmatic.com\/blog\/author\/kayla\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/54172","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/54"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=54172"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/54172\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/52568"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=54172"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=54172"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=54172"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}