{"id":1182,"date":"2010-10-25T17:45:38","date_gmt":"2010-10-25T16:45:38","guid":{"rendered":"http:\/\/paulgoodchild.net\/blog\/?p=1182"},"modified":"2011-11-23T00:08:10","modified_gmt":"2011-11-23T00:08:10","slug":"how-i-compute-part-1-anti-virus","status":"publish","type":"post","link":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/","title":{"rendered":"How I compute \u2013 Part 1: Exorcise the demons in your PC"},"content":{"rendered":"<p>If the term &#8216;security&#8217; is new to you, I&#8217;d wager you have never been  online before and this is, randomly, the first article you&#8217;ve ever  read.\u00a0 You don&#8217;t have to go very far to meet some reference to the concept,  and for very good reason.\u00a0 Whether you&#8217;re aware of it or not, you are  being assailed by the threat of a personal security breach just by being  online. Am I letting my drama-queen side loose for the afternoon?\u00a0 No.\u00a0 If you&#8217;re experiencing weird glitches on your PC, then you should follow through this article.\u00a0 Viruses, Spyware and other nasties is what we&#8217;re targeting here, and it&#8217;s <em>very<\/em> easy to do.<\/p>\n<p>In this series of articles I&#8217;m going to take a break away from my normal theme to relay to you how I do the &#8220;computer&#8221;  things I do in an attempt to save time and minimize trouble caused by PC glitches.\u00a0 Prevention in this case, is far better, cheaper, quicker, than the cure.\u00a0 I  touched upon this idea of being more time efficient with my <a href=\"http:\/\/paulgoodchild.net\/blog\/2010\/07\/how-to-reclaim-time-google-reader\/\" target=\"_self\">article on Google Reader<\/a> for tracking RSS  feeds.\u00a0 This particular article will deal with the deadly, and often <em>silent<\/em>, demons lurking in your computer.<\/p>\n<p>I&#8217;m going to attempt to make it <em>really<\/em> easy for you, so put away your lame excuses and show yourself that you aint afraid of no ghosts!\u00a0 \ud83d\ude09<\/p>\n<p><!--more--><\/p>\n<h2>What is security, and what am I at risk from exactly?<\/h2>\n<p>Think of security as filing your tax returns.\u00a0 You don&#8217;t wake up in the morning with an intense desire to get it done, but it&#8217;s there, just waiting to be done.\u00a0 It&#8217;s not difficult to do, it&#8217;s not really that time consuming, and price you pay for not doing it is far greater than not.<\/p>\n<p>Security is easy.\u00a0 Trust me.<\/p>\n<p>So why does it need to be done?\u00a0 Increasingly we are putting our lives on the internet in one form or another. The more we use it, the more we are vulnerable to identity theft and fraud.\u00a0 Even private information on our computers is vulnerable, believe it or not.\u00a0 There is an amusing saying that goes something like:<\/p>\n<blockquote>\n<p style=\"text-align: center;\">&#8220;The only secure computer is one that is buried in concrete and turned off.&#8221;<\/p>\n<\/blockquote>\n<p>It&#8217;s a bit of an exaggeration maybe, but it&#8217;s not too far off the mark.\u00a0 If you&#8217;re PC is connected to a network, then you&#8217;re at risk from a breach and access to your private data.<\/p>\n<h2>Step 1 &#8211; secure your computer<\/h2>\n<p>If everything you do is done on your PC, then that is the first place to start.\u00a0 We will begin by attempting to remove all nasty programs that may already be on your computer.<\/p>\n<h3>a) Clean up using &#8216;Housecall&#8217;<\/h3>\n<p style=\"padding-left: 30px;\">Restart your computer.\u00a0 This isn&#8217;t essential, but it cleans up your computer a little bit to make it run a little faster.<\/p>\n<p style=\"padding-left: 30px;\">Once you&#8217;re up and running again, open up the &#8220;internet&#8221; (Internet Explorer or Mozilla Firefox, or equivalent) and copy and paste the following address:<\/p>\n<blockquote>\n<p style=\"text-align: center;\"><a href=\"http:\/\/housecall.trendmicro.com\/\">http:\/\/housecall.trendmicro.com\/<\/a><\/p>\n<\/blockquote>\n<p style=\"text-align: left; padding-left: 30px;\">Depending on the design of the page there will be a link to download a program called: &#8216;Housecall&#8217;.\u00a0 At the time of writing it is on the upper-right corner, and the available version is 7.1.\u00a0 Currently there are two links offered &#8211; <em>32-bit<\/em> and <em>64-bit<\/em>.\u00a0 If you know which one you are, click the required link.\u00a0 If you don&#8217;t know, then you&#8217;re probably 32-bit.\u00a0 Choose the other one if you download one and it doesn&#8217;t work.<\/p>\n<p style=\"text-align: left; padding-left: 30px;\">Depending on your setup when you click to download you&#8217;ll be asked to either &#8216;Run&#8217; it or &#8216;Save&#8217; it.\u00a0 Pick &#8216;Save&#8217; and <em>remember <\/em>where you put it &#8211; your &#8216;Desktop&#8217; is probably easiest since you will run this more than once.<\/p>\n<p style=\"text-align: left; padding-left: 30px;\">Once finished downloading, run it (double-click).\u00a0 It will open up a progress window and begin downloading the updates it requires.\u00a0 Allow that to finish for a couple of minutes and you&#8217;ll then be asked to accept the license agreement.\u00a0 Assuming you do accept, the next step is easy &#8211; just click the big blue &#8216;Scan Now&#8217; button.<\/p>\n<p style=\"text-align: left; padding-left: 30px;\">Go make a cuppa tea, have a smoke, or do whatever it is you do to kill time.\u00a0 Depending on your computer speed, how much stuff is currently running, this shouldn&#8217;t take much longer than 5~10 minutes average.\u00a0 But allow it finish.<\/p>\n<p style=\"text-align: left; padding-left: 30px;\">If there were any nasties discovered on the scan, they will present a list of them for you.\u00a0 Going with their recommendations is a good idea, though personally I change the ones they suggest as &#8220;Ignore&#8221; to &#8220;Fix&#8221;.\u00a0 They may just be dodgy Cookies, but I don&#8217;t want anything dodgy near my computer.<\/p>\n<p style=\"text-align: left; padding-left: 30px;\">Now, <em><strong>restart<\/strong><\/em> your PC.\u00a0 I would recommend running the Housecall program all over again &#8211; you don&#8217;t need to go to the website and download it, but just run it from the &#8216;Desktop&#8217;, or wherever it was you downloaded.<\/p>\n<p style=\"text-align: left; padding-left: 30px;\">Note: You did<em> not<\/em> install any new software on your computer here, just downloaded a very good cleaner.\u00a0 You can delete it any time you like, though I recommend keeping it on-hand and running it whenever the mood takes you.<\/p>\n<h3 style=\"text-align: left;\">b) Protect with anti-virus<\/h3>\n<p style=\"text-align: left; padding-left: 30px;\">Now that you have your computer in a reliable state, you need to help ensure in the future that nasty programs don&#8217;t get on there again.<\/p>\n<p style=\"padding-left: 30px;\">You&#8217;ve heard this talked about a million times I&#8217;m sure, but you need it.<\/p>\n<p style=\"padding-left: 30px;\">To check if you have anti-virus on your computer, Windows XP users please use the <a href=\"http:\/\/onecare.live.com\/site\/en-us\/article\/avworking.htm\" target=\"_blank\">first part of this page<\/a>.\u00a0 Windows 7 users, should look in &#8216;Control Panel&#8217; -&gt; &#8216;System and Security&#8217; -&gt; &#8216;Action Center&#8217; and read down the Security section to confirm that there is an anti-virus program operating normally.<\/p>\n<p style=\"padding-left: 30px;\">If there is none, then you need to get one.<\/p>\n<p style=\"padding-left: 30px;\">I have never paid for anti-virus software in my life, but I don&#8217;t necessarily think it&#8217;s a bad idea to do so.\u00a0 I have consistently used, and had good results with, <a href=\"http:\/\/free.avg.com\/us-en\/download-free-antivirus.tpl-crp\" target=\"_blank\">AVG Free antivirus<\/a>, and <a href=\"http:\/\/www.avira.com\/en\/avira-free-antivirus\" target=\"_blank\">Avira Antivir Personal edition<\/a> (free).\u00a0 Alternatively, you could use the free edition from <a href=\"http:\/\/www.avast.com\/en-gb\/free-antivirus-download\" target=\"_blank\">Avast<\/a>!\u00a0 All these products are provided for personal, non-commercial use, so consider this in your environment.\u00a0 Right now I recommend Avira or Avast, and wouldn&#8217;t go for AVG.\u00a0 I avoid Norton\/Symantec, Kaspersky, and McAfee from past experience, unless you feel more comfortable paying for these services.<\/p>\n<p style=\"padding-left: 30px;\">If you discovered earlier you don&#8217;t have an anti-virus installed, pick one of the programs linked to above, download the installer file and run it.\u00a0 Probably a good idea to restart your machine afterwards.<\/p>\n<p style=\"padding-left: 30px;\">If you already have a paid-for anti-virus solution, you can either keep with it, or remove it and install one of the free packages mentioned above.\u00a0 I would recommend not renewing your license when the time comes, removing the program you have, and then installing one of the free options.<\/p>\n<p style=\"padding-left: 30px;\">Also, if in the first step a) when we cleaned the computer using Housecleaner it detected bad software on your computer <em><strong>and<\/strong><\/em> you learned you already had an antivirus installed, then you need to change the program you use (whether you paid for it or not).\u00a0 Remove it and download one of the free programs.<\/p>\n<h2>Conclusion<\/h2>\n<p>This article is already over 1200 words long and I may have lost some of you already, so I think this is a good place to stop.\u00a0 By following through to the end here you have done two things &#8211; cleaned your PC of some nasty pieces of software and followed up with installing protection so that you wont get them again in the future.<\/p>\n<p>There is much more to say about Security, but I&#8217;ll leave it there for now and cover a few other basic security issues in future articles.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If the term &#8216;security&#8217; is new to you, I&#8217;d wager you have never been online before and this is, randomly, the first article you&#8217;ve ever read.\u00a0 You don&#8217;t have to go very far to meet some reference to the concept, and for very good reason.\u00a0 Whether you&#8217;re aware of it or not, you are being [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ngg_post_thumbnail":0,"footnotes":""},"categories":[5],"tags":[214,211,213,212],"class_list":["post-1182","post","type-post","status-publish","format-standard","hentry","category-how-to","tag-anti-virus","tag-computing","tag-housecall","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How I compute \u2013 Part 1: Exorcise the demons in your PC - Plog - Paulie&#039;s Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How I compute \u2013 Part 1: Exorcise the demons in your PC - Plog - Paulie&#039;s Blog\" \/>\n<meta property=\"og:description\" content=\"If the term &#8216;security&#8217; is new to you, I&#8217;d wager you have never been online before and this is, randomly, the first article you&#8217;ve ever read.\u00a0 You don&#8217;t have to go very far to meet some reference to the concept, and for very good reason.\u00a0 Whether you&#8217;re aware of it or not, you are being [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/\" \/>\n<meta property=\"og:site_name\" content=\"Plog - Paulie&#039;s Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/paulgoodchild\" \/>\n<meta property=\"article:published_time\" content=\"2010-10-25T16:45:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2011-11-23T00:08:10+00:00\" \/>\n<meta name=\"author\" content=\"Paul Goodchild\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@paulgoodchild\" \/>\n<meta name=\"twitter:site\" content=\"@paulgoodchild\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Paul Goodchild\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/how-i-compute-part-1-anti-virus\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/how-i-compute-part-1-anti-virus\\\/\"},\"author\":{\"name\":\"Paul Goodchild\",\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/#\\\/schema\\\/person\\\/70c56506206f6016fe2491a960f5b86c\"},\"headline\":\"How I compute \u2013 Part 1: Exorcise the demons in your PC\",\"datePublished\":\"2010-10-25T16:45:38+00:00\",\"dateModified\":\"2011-11-23T00:08:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/how-i-compute-part-1-anti-virus\\\/\"},\"wordCount\":1321,\"commentCount\":4,\"keywords\":[\"anti-virus\",\"computing\",\"Housecall\",\"security\"],\"articleSection\":[\"How-To\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/how-i-compute-part-1-anti-virus\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/how-i-compute-part-1-anti-virus\\\/\",\"url\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/how-i-compute-part-1-anti-virus\\\/\",\"name\":\"How I compute \u2013 Part 1: Exorcise the demons in your PC - Plog - Paulie&#039;s Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/#website\"},\"datePublished\":\"2010-10-25T16:45:38+00:00\",\"dateModified\":\"2011-11-23T00:08:10+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/#\\\/schema\\\/person\\\/70c56506206f6016fe2491a960f5b86c\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/how-i-compute-part-1-anti-virus\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/how-i-compute-part-1-anti-virus\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/how-i-compute-part-1-anti-virus\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How I compute \u2013 Part 1: Exorcise the demons in your PC\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/\",\"name\":\"Plog - Paulie&#039;s Blog\",\"description\":\"A personal blog exploring life, learning, business, and travel\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/#\\\/schema\\\/person\\\/70c56506206f6016fe2491a960f5b86c\",\"name\":\"Paul Goodchild\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c32571a05dd7b8c54e9cdbcf66cdb1ef09da99269cf40eb4e21b47a9dd5764b8?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c32571a05dd7b8c54e9cdbcf66cdb1ef09da99269cf40eb4e21b47a9dd5764b8?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/c32571a05dd7b8c54e9cdbcf66cdb1ef09da99269cf40eb4e21b47a9dd5764b8?s=96&d=wavatar&r=g\",\"caption\":\"Paul Goodchild\"},\"sameAs\":[\"http:\\\/\\\/www.icontrolwp.com\\\/\",\"https:\\\/\\\/x.com\\\/paulgoodchild\"],\"url\":\"https:\\\/\\\/paulgoodchild.me\\\/blog\\\/author\\\/paulgoodchild\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How I compute \u2013 Part 1: Exorcise the demons in your PC - Plog - Paulie&#039;s Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/","og_locale":"en_US","og_type":"article","og_title":"How I compute \u2013 Part 1: Exorcise the demons in your PC - Plog - Paulie&#039;s Blog","og_description":"If the term &#8216;security&#8217; is new to you, I&#8217;d wager you have never been online before and this is, randomly, the first article you&#8217;ve ever read.\u00a0 You don&#8217;t have to go very far to meet some reference to the concept, and for very good reason.\u00a0 Whether you&#8217;re aware of it or not, you are being [&hellip;]","og_url":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/","og_site_name":"Plog - Paulie&#039;s Blog","article_publisher":"https:\/\/www.facebook.com\/paulgoodchild","article_published_time":"2010-10-25T16:45:38+00:00","article_modified_time":"2011-11-23T00:08:10+00:00","author":"Paul Goodchild","twitter_card":"summary_large_image","twitter_creator":"@paulgoodchild","twitter_site":"@paulgoodchild","twitter_misc":{"Written by":"Paul Goodchild","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/#article","isPartOf":{"@id":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/"},"author":{"name":"Paul Goodchild","@id":"https:\/\/paulgoodchild.me\/blog\/#\/schema\/person\/70c56506206f6016fe2491a960f5b86c"},"headline":"How I compute \u2013 Part 1: Exorcise the demons in your PC","datePublished":"2010-10-25T16:45:38+00:00","dateModified":"2011-11-23T00:08:10+00:00","mainEntityOfPage":{"@id":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/"},"wordCount":1321,"commentCount":4,"keywords":["anti-virus","computing","Housecall","security"],"articleSection":["How-To"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/","url":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/","name":"How I compute \u2013 Part 1: Exorcise the demons in your PC - Plog - Paulie&#039;s Blog","isPartOf":{"@id":"https:\/\/paulgoodchild.me\/blog\/#website"},"datePublished":"2010-10-25T16:45:38+00:00","dateModified":"2011-11-23T00:08:10+00:00","author":{"@id":"https:\/\/paulgoodchild.me\/blog\/#\/schema\/person\/70c56506206f6016fe2491a960f5b86c"},"breadcrumb":{"@id":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/paulgoodchild.me\/blog\/how-i-compute-part-1-anti-virus\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/paulgoodchild.me\/blog\/"},{"@type":"ListItem","position":2,"name":"How I compute \u2013 Part 1: Exorcise the demons in your PC"}]},{"@type":"WebSite","@id":"https:\/\/paulgoodchild.me\/blog\/#website","url":"https:\/\/paulgoodchild.me\/blog\/","name":"Plog - Paulie&#039;s Blog","description":"A personal blog exploring life, learning, business, and travel","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/paulgoodchild.me\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/paulgoodchild.me\/blog\/#\/schema\/person\/70c56506206f6016fe2491a960f5b86c","name":"Paul Goodchild","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c32571a05dd7b8c54e9cdbcf66cdb1ef09da99269cf40eb4e21b47a9dd5764b8?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c32571a05dd7b8c54e9cdbcf66cdb1ef09da99269cf40eb4e21b47a9dd5764b8?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c32571a05dd7b8c54e9cdbcf66cdb1ef09da99269cf40eb4e21b47a9dd5764b8?s=96&d=wavatar&r=g","caption":"Paul Goodchild"},"sameAs":["http:\/\/www.icontrolwp.com\/","https:\/\/x.com\/paulgoodchild"],"url":"https:\/\/paulgoodchild.me\/blog\/author\/paulgoodchild\/"}]}},"_links":{"self":[{"href":"https:\/\/paulgoodchild.me\/blog\/wp-json\/wp\/v2\/posts\/1182","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/paulgoodchild.me\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/paulgoodchild.me\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/paulgoodchild.me\/blog\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/paulgoodchild.me\/blog\/wp-json\/wp\/v2\/comments?post=1182"}],"version-history":[{"count":0,"href":"https:\/\/paulgoodchild.me\/blog\/wp-json\/wp\/v2\/posts\/1182\/revisions"}],"wp:attachment":[{"href":"https:\/\/paulgoodchild.me\/blog\/wp-json\/wp\/v2\/media?parent=1182"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/paulgoodchild.me\/blog\/wp-json\/wp\/v2\/categories?post=1182"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/paulgoodchild.me\/blog\/wp-json\/wp\/v2\/tags?post=1182"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}