{"id":61903,"date":"2020-02-17T17:34:58","date_gmt":"2020-02-17T23:34:58","guid":{"rendered":"https:\/\/www.pcmatic.com\/blog\/?p=61903"},"modified":"2020-02-17T17:35:09","modified_gmt":"2020-02-17T23:35:09","slug":"whitelisting-101","status":"publish","type":"post","link":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/","title":{"rendered":"Whitelisting 101"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\">A different approach to protection<\/h3>\n\n\n\n<p>To understand why whitelist protection is different, you first should know how the blacklist works. Traditional antivirus, blacklist, works by making a list of all the known &#8220;bad things&#8221; and then blocking them from a computer. This approach means you need multiple layers of protection.<\/p>\n\n\n\n<p>Often, you&#8217;ll see firewalls, email scanning, and antivirus packaged into one. It looks like a great deal! One company is offering to provide all these different services in one bundle. You should, however, rethink why all of those services are necessary. Shouldn&#8217;t an antivirus be intelligent enough to protect you?<\/p>\n\n\n\n<p>Enter whitelisting. Frequently people ask us at PC Matic if we filter emails and provide firewalls. We tell them, &#8220;no, because we don&#8217;t have to.&#8221; Whitelisting works differently than traditional antivirus to keep you from needing those bundles.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">How whitelisting works<\/h4>\n\n\n\n<p>Our CEO, Rob Cheng, equates whitelisting to home security. Traditional antivirus as home security would look something like this. You buy a home and then give out keys to everyone who is not a known criminal. Even when the new guy moves into the neighborhood, he doesn&#8217;t have a rap sheet so he gets a key to your house.<\/p>\n\n\n\n<p>It doesn&#8217;t sound like a smart idea when you frame it that way, huh? Whitelisting, however, would mean you only handed out the keys to your house to people you knew and trusted. Makes a lot of sense.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Default-deny<\/h4>\n\n\n\n<p>Whitelisting is a default-deny approach. That means that, by default, a whitelist will deny anything unknown. This is a much better form of protection because it blocks even new and unseen threats. There are people that will argue this isn&#8217;t as sound as traditional antivirus (trust me, I&#8217;ve seen all the comments), but that&#8217;s an antiquated way of thinking.<\/p>\n\n\n\n<p>Default-deny doesn&#8217;t mean it&#8217;s permanent either. If something unknown comes in contact with the whitelist, it&#8217;s analyzed to see if it is good. Once analyzed, an unknown can be added.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">False positives<\/h4>\n\n\n\n<p>False positives are good programs blocked by the whitelist because they&#8217;re unknown. At PC Matic, we have two ways of dealing with false positives. First, we allow our customers the ability to locally whitelist something. This means they can allow it to run on their machines or their network. A word of warning, though. This should only be done by someone who knows what the program is before allowing it.<\/p>\n\n\n\n<p>Second, all blocked samples are sent to our researchers. From there, they will categorize as good or bad. The good ones make it to the global whitelist. This makes the list smarter and more efficient with every new unknown that&#8217;s encountered. <\/p>\n\n\n\n<p>Since we&#8217;ve been doing this for quite awhile now, the whitelist allows you to work uninterrupted. <\/p>\n\n\n\n<h4 class=\"wp-block-heading\">Changing the game<\/h4>\n\n\n\n<p>New things are hard. Human beings are inherently resistant to change. But we&#8217;re living in the innovation age, and new and emerging technologies are the only way to keep progressing forward. <a href=\"https:\/\/www.nist.gov\/publications\/stopping-malware-and-unauthorized-software-through-application-whitelisting\">Whitelisting has become commonly accepted<\/a> as the future of antivirus. It&#8217;s time to jump on board.<\/p>\n\n\n\n<p>For more information about PC Matic, whitelisting, and how PC Matic protects better, <a href=\"http:\/\/www.pcmatic.com\">visit us<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A different approach to protection To understand why whitelist protection is different, you first should know how the blacklist works. Traditional antivirus, blacklist, works by making a list of all the known &#8220;bad things&#8221; and then blocking them from a computer. This approach means you need multiple layers of protection. Often, you&#8217;ll see firewalls, email [&hellip;]<\/p>\n","protected":false},"author":71,"featured_media":59939,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[109],"tags":[5351,4989,5074,4354,4353],"class_list":["post-61903","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-pc-matic-blog","tag-application-whitelist","tag-application-whitelisting","tag-whitelist","tag-whitelisting","tag-whitelists"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Whitelisting 101<\/title>\n<meta name=\"description\" content=\"A different approach to protection To understand why whitelist protection is different, you first should know how the blacklist works. Traditional\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Whitelisting 101\" \/>\n<meta property=\"og:description\" content=\"A different approach to protection To understand why whitelist protection is different, you first should know how the blacklist works. Traditional\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/\" \/>\n<meta property=\"og:site_name\" content=\"PC Matic Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/pcmatic\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-17T23:34:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-02-17T23:35:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/techtalk_1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"730\" \/>\n\t<meta property=\"og:image:height\" content=\"414\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mary James\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:site\" content=\"@pcmatic\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mary James\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/\"},\"author\":{\"name\":\"Mary James\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ca21b293b28eb0c5da5f087045b896d8\"},\"headline\":\"Whitelisting 101\",\"datePublished\":\"2020-02-17T23:34:58+00:00\",\"dateModified\":\"2020-02-17T23:35:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/\"},\"wordCount\":539,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/techtalk_1.jpg\",\"keywords\":[\"application whitelist\",\"application whitelisting\",\"whitelist\",\"whitelisting\",\"whitelists\"],\"articleSection\":[\"PC Matic Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/\",\"name\":\"Whitelisting 101\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/techtalk_1.jpg\",\"datePublished\":\"2020-02-17T23:34:58+00:00\",\"dateModified\":\"2020-02-17T23:35:09+00:00\",\"description\":\"A different approach to protection To understand why whitelist protection is different, you first should know how the blacklist works. Traditional\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/techtalk_1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/wp-content\\\/uploads\\\/techtalk_1.jpg\",\"width\":730,\"height\":414,\"caption\":\"Protect your PC\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/whitelisting-101\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Whitelisting 101\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"name\":\"PC Matic Blog\",\"description\":\"Tech Tips and Tricks\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#organization\",\"name\":\"PC Matic - Top Antivirus Company in the USA.\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"contentUrl\":\"https:\\\/\\\/techtalk.pcmatic.com\\\/wp-content\\\/uploads\\\/PC-MaticLogo-e1472689639222.png\",\"width\":1535,\"height\":483,\"caption\":\"PC Matic - Top Antivirus Company in the USA.\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/pcmatic\",\"https:\\\/\\\/x.com\\\/pcmatic\",\"https:\\\/\\\/www.instagram.com\\\/pcmaticusa\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/pcmatic\",\"https:\\\/\\\/www.youtube.com\\\/c\\\/PCMaticVideo\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/#\\\/schema\\\/person\\\/ca21b293b28eb0c5da5f087045b896d8\",\"name\":\"Mary James\",\"url\":\"https:\\\/\\\/www.pcmatic.com\\\/blog\\\/author\\\/maryjames\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Whitelisting 101","description":"A different approach to protection To understand why whitelist protection is different, you first should know how the blacklist works. Traditional","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/","og_locale":"en_US","og_type":"article","og_title":"Whitelisting 101","og_description":"A different approach to protection To understand why whitelist protection is different, you first should know how the blacklist works. Traditional","og_url":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/","og_site_name":"PC Matic Blog","article_publisher":"https:\/\/www.facebook.com\/pcmatic","article_published_time":"2020-02-17T23:34:58+00:00","article_modified_time":"2020-02-17T23:35:09+00:00","og_image":[{"width":730,"height":414,"url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/techtalk_1.jpg","type":"image\/jpeg"}],"author":"Mary James","twitter_card":"summary_large_image","twitter_creator":"@pcmatic","twitter_site":"@pcmatic","twitter_misc":{"Written by":"Mary James","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/#article","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/"},"author":{"name":"Mary James","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ca21b293b28eb0c5da5f087045b896d8"},"headline":"Whitelisting 101","datePublished":"2020-02-17T23:34:58+00:00","dateModified":"2020-02-17T23:35:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/"},"wordCount":539,"commentCount":0,"publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/techtalk_1.jpg","keywords":["application whitelist","application whitelisting","whitelist","whitelisting","whitelists"],"articleSection":["PC Matic Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/","url":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/","name":"Whitelisting 101","isPartOf":{"@id":"https:\/\/www.pcmatic.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/#primaryimage"},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/techtalk_1.jpg","datePublished":"2020-02-17T23:34:58+00:00","dateModified":"2020-02-17T23:35:09+00:00","description":"A different approach to protection To understand why whitelist protection is different, you first should know how the blacklist works. Traditional","breadcrumb":{"@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/#primaryimage","url":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/techtalk_1.jpg","contentUrl":"https:\/\/www.pcmatic.com\/blog\/wp-content\/uploads\/techtalk_1.jpg","width":730,"height":414,"caption":"Protect your PC"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcmatic.com\/blog\/whitelisting-101\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcmatic.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Whitelisting 101"}]},{"@type":"WebSite","@id":"https:\/\/www.pcmatic.com\/blog\/#website","url":"https:\/\/www.pcmatic.com\/blog\/","name":"PC Matic Blog","description":"Tech Tips and Tricks","publisher":{"@id":"https:\/\/www.pcmatic.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcmatic.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcmatic.com\/blog\/#organization","name":"PC Matic - Top Antivirus Company in the USA.","url":"https:\/\/www.pcmatic.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","contentUrl":"https:\/\/techtalk.pcmatic.com\/wp-content\/uploads\/PC-MaticLogo-e1472689639222.png","width":1535,"height":483,"caption":"PC Matic - Top Antivirus Company in the USA."},"image":{"@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/pcmatic","https:\/\/x.com\/pcmatic","https:\/\/www.instagram.com\/pcmaticusa\/","https:\/\/www.linkedin.com\/company\/pcmatic","https:\/\/www.youtube.com\/c\/PCMaticVideo"]},{"@type":"Person","@id":"https:\/\/www.pcmatic.com\/blog\/#\/schema\/person\/ca21b293b28eb0c5da5f087045b896d8","name":"Mary James","url":"https:\/\/www.pcmatic.com\/blog\/author\/maryjames\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61903","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/users\/71"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/comments?post=61903"}],"version-history":[{"count":0,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/posts\/61903\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media\/59939"}],"wp:attachment":[{"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/media?parent=61903"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/categories?post=61903"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcmatic.com\/blog\/wp-json\/wp\/v2\/tags?post=61903"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}