{"id":826,"date":"2011-08-15T05:23:52","date_gmt":"2011-08-15T09:23:52","guid":{"rendered":"<p>For years now the traditional security programs have relied heavily on a definition data base to identify malware. This method, also known as signature based detection, is still being widely employed today.<\/p>\r\n<p>New viruses and malware variants are "},"modified":"2015-11-12T03:24:28","modified_gmt":"2015-11-12T08:24:28","slug":"freeware-security-programs","status":"publish","type":"post","link":"https:\/\/davescomputertips.com\/freeware-security-programs\/","title":{"rendered":"Freeware security programs"},"content":{"rendered":"<div id=\"daves-259076912\" class=\"daves-single-post-before-content\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div><p>For years now the traditional security programs have relied heavily on a definition data base to identify malware. This method, also known as signature based detection, is still being widely employed today.<\/p>\n<p>New viruses and malware variants are being created daily and this system of detection cannot defend against them until samples have been obtained and signatures created then added to the data base. That is why this traditional method is largely considered ineffective at protecting against unknown threats (otherwise known as zero day threats).<\/p>\n<p>Furthermore, in an attempt to stay one step ahead of signature based security software, the smarties are writing viruses which disguise themselves, either by encryption or other modifications, so they will not match virus signatures in the data base.<\/p>\n<p>Now that all sounds pretty scary but please don\u2019t be alarmed, signature based software remains a very effective way of protecting your computer plus, these days, most of the popular anti-virus freeware products are enhanced by the inclusion of a heuristics engine.<\/p><div id=\"daves-168937104\" class=\"daves-single-post-in-content\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<p>Heuristics is a system which helps identify malware via known behavioral characteristics, along the lines of&#8230;if it looks like a duck, walks like a duck and quacks like a duck it probably is a duck. Heuristics is also much more effective at protecting against zero day threats.<\/p>\n<p>You may also come across the term \u2018generic detection\u2019 associated with heuristics; most viruses start out as a single infection but can modify into many different strains through a process known as mutation. Heuristic based software has the ability to identify all the variants within a family via one single generic signature.<\/p>\n<p>Most popular anti-virus freeware products now also include other specialist components such as; anti rootkit and anti spyware. Although the anti spyware component would generally not be as thorough\/effective as software dedicated to that task.<br \/>\nSo, how much security is enough? The answer to that depends largely on the individual\u2019s routine and surfing habits. Before we continue with some recommendations, here are a few general points to bear in mind:<\/p>\n<ol>\n<li>One of the most effective ways to avoid malware is to adopt a safe surfing policy. Stay away from disreputable sites and be careful what you click on. Ideally, everyone would follow that creed but in reality not too many do. That is simply human nature and one of the main reasons we need that \u2018extra\u2019 security.<\/li>\n<li>Never install more than one product from the same genre which employs real time protection. Compatibility issues would almost certainly ensue.<\/li>\n<li>All security products which employ real time protection use up valuable resources (memory). Installing too many, even from different categories, will noticeably slow your computer.<\/li>\n<li>Do not put too much store in anti-virus test results. All these tests are very subjective. It would be nigh on impossible to test all components of all contenders under identical circumstances in an identical environment. I am not advocating ignoring these results altogether, just not to make them the sole criteria for selection.<\/li>\n<li>Remember to always keep all your security software right up to date.<\/li>\n<\/ol>\n<p>Anti Virus Software &#8211; is, in most cases, the number one defender of your computer realm and, it seems, many have a favorite to which they remain eternally faithful. Mine happens to be Avast. That opinion has been derived from many years successful usage, I can\u2019t even remember the last time my machine fell victim to any malware infection. That, plus the knowledge I have gleaned about the various available freeware products keeps Avast on top of my list.<\/p><div id=\"daves-658706691\" class=\"daves-single-post-in-content-2\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<p>Avast protects via seven shields covering just about every online activity. It also has, in my opinion, the most comprehensive anti spyware component of the main contenders. Throw real time anti-rootkit protection into the equation as well as a superior heuristics engine and you have a truly excellent freeware.<\/p>\n<h2>Primary Computer Protection<\/h2>\n<p>Here is a short pr\u00e9cis of the main contenders:<\/p>\n<h3><a href=\"https:\/\/www.avast.com\/index\" title=\"Avast\" target=\"_blank\">AVAST Antivirus<\/a><\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/avast.jpg\" alt=\"\" title=\"avast\" width=\"750\" height=\"457\" class=\"alignnone size-full wp-image-827\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/avast.jpg 750w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/avast-150x91.jpg 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/avast-400x243.jpg 400w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<p><strong>Positives:<\/strong><\/p>\n<ul>\n<li>Full real time protection<\/li>\n<li>Fairly light on resources<\/li>\n<li>Low false positive rate<\/li>\n<li>Ability to perform boot time scans.<\/li>\n<li>Updated user interface in latest (v5) version<\/li>\n<\/ul>\n<p><strong>Negatives:<\/strong><\/p><div id=\"daves-1546869184\" class=\"daves-single-post-in-content-3\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<ul>\n<li>User interface has been somewhat confusing in older versions<\/li>\n<\/ul>\n<h3><a href=\"http:\/\/www.avira.com\/en\/avira-free-antivirus\" title=\"antivir anti virus\" target=\"_blank\">ANTIVIR Antivirus<\/a><\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/avira_antivir.jpg\" alt=\"\" title=\"avira_antivir\" width=\"538\" height=\"381\" class=\"alignnone size-full wp-image-828\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/avira_antivir.jpg 538w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/avira_antivir-150x106.jpg 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/avira_antivir-400x283.jpg 400w\" sizes=\"(max-width: 538px) 100vw, 538px\" \/><\/p>\n<p><strong>Positives:<\/strong><\/p>\n<ul>\n<li>Outstanding detection rate (best in its class)<\/li>\n<li>Light on resources<\/li>\n<\/ul>\n<p><strong>Negatives:<\/strong><\/p>\n<ul>\n<li>Too many false positives<\/li>\n<li>No email scanner (not a major drawback)<\/li>\n<li>Nag screen<\/li>\n<li>Update process can be iffy<\/li>\n<\/ul>\n<h3><a href=\"http:\/\/windows.microsoft.com\/en-us\/windows\/security-essentials-download\" title=\"microsoft security essentials\" target=\"_blank\">MICROSOFT SECURITY ESSENTIALS<\/a><\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/Microsoft_security_essentials.png\" alt=\"\" title=\"Microsoft_security_essentials\" width=\"713\" height=\"550\" class=\"alignnone size-full wp-image-829\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/Microsoft_security_essentials.png 713w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/Microsoft_security_essentials-150x115.png 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/Microsoft_security_essentials-400x308.png 400w\" sizes=\"(max-width: 713px) 100vw, 713px\" \/><\/p>\n<p><strong>Positives:<\/strong><\/p>\n<ul>\n<li>Very user friendly with a simple intuitive interface<\/li>\n<li>Low rate of false positives<\/li>\n<li>Light on resources<\/li>\n<\/ul>\n<p><strong>Negatives:<\/strong><\/p><div id=\"daves-2355825885\" class=\"daves-single-post-in-content-4\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<ul>\n<li>Slightly lower rates of detection than Avast and AntiVir<\/li>\n<li>Both scan and removal a little on the slow side<\/li>\n<\/ul>\n<h3><a href=\"http:\/\/www.avg.com\/au-en\/homepage\" title=\"avg anti virus\" target=\"_blank\">AVG<\/a><\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/AVG_antivirus.png\" alt=\"\" title=\"AVG_antivirus\" width=\"628\" height=\"460\" class=\"alignnone size-full wp-image-830\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/AVG_antivirus.png 628w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/AVG_antivirus-150x109.png 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/AVG_antivirus-400x292.png 400w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/><\/p>\n<p><strong>Positives:<\/strong><\/p>\n<ul>\n<li>Provides adequate protection<\/li>\n<\/ul>\n<p><strong>Negatives:<\/strong><\/p>\n<ul>\n<li>No anti-rootkit component<\/li>\n<li>Heavy on resources<\/li>\n<li>Not what it used to be<\/li>\n<\/ul>\n<h2>Secondary Computer Protection<\/h2>\n<p>Now let\u2019s take a look at that \u2018extra\u2019 protection. First thing I would be looking at is some sort of HIPS based software:<\/p>\n<p><strong>H<\/strong>ost <strong>I<\/strong>ntrusion <strong>P<\/strong>rotection <strong>S<\/strong>ystem (HIPS) programs are fully compatible with traditional security software and compliment those products nicely. Protection is real time with constant monitoring of the system for any behavior which is characteristic of malware activity. They do come with a couple of issues however; decision making is, initially, largely based on user input and they can be quite \u2018talkative\u2019 at first. This behavior does recede in a relatively short space of time though, as the program learns from your responses.<\/p><div id=\"daves-2947538414\" class=\"daves-single-post-in-content-5\" style=\"margin-bottom: 25px;\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"2700504761\" \ndata-ad-format=\"auto\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>\n<h3><a href=\"http:\/\/www.pctools.com\/norton-offer\/pctEOL\/\" title=\"threatfire protection\" target=\"_blank\">THREATFIRE<\/a><\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/threatfire.png\" alt=\"\" title=\"threatfire\" width=\"693\" height=\"493\" class=\"alignnone size-full wp-image-831\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/threatfire.png 693w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/threatfire-150x106.png 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/threatfire-400x284.png 400w\" sizes=\"(max-width: 693px) 100vw, 693px\" \/><\/p>\n<p><strong>Positives:<\/strong><\/p>\n<ul>\n<li>Requires very little input from the user as it makes most decisions for you<\/li>\n<li>Works well right out of the box without the need for any additional configuration<\/li>\n<\/ul>\n<p><strong>Negatives:<\/strong><\/p>\n<ul>\n<li>Rare compatibility issues with other software<\/li>\n<\/ul>\n<h3><a href=\"http:\/\/www.spywareterminator.com\/\" title=\"spyware terminator\" target=\"_blank\">SPYWARE TERMINATOR<\/a><\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/spyware_terminator.jpg\" alt=\"\" title=\"spyware_terminator\" width=\"750\" height=\"567\" class=\"alignnone size-full wp-image-832\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/spyware_terminator.jpg 750w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/spyware_terminator-150x113.jpg 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/spyware_terminator-400x302.jpg 400w\" sizes=\"(max-width: 750px) 100vw, 750px\" \/><\/p>\n<p><strong>Positives:<\/strong><\/p>\n<ul>\n<li>Well established<\/li>\n<li>Full blown real time anti-spyware program with excellent HIPS component included<\/li>\n<\/ul>\n<p><strong>Negatives:<\/strong><\/p>\n<ul>\n<li>Quite heavy on resources (not so suitable for older machines)<\/li>\n<li>No real time protection for 64-bit systems<\/li>\n<li>Reports of poor detection rates from on demand scanning<\/li>\n<\/ul>\n<h3><a href=\"http:\/\/www.winpatrol.com\/download.html\" title=\"Winpatrol\" target=\"_blank\">WINPATROL<\/a><\/h3>\n<p><img decoding=\"async\" src=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/winpatrol.png\" alt=\"\" title=\"winpatrol\" width=\"659\" height=\"461\" class=\"alignnone size-full wp-image-833\" srcset=\"https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/winpatrol.png 659w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/winpatrol-150x104.png 150w, https:\/\/davescomputertips.com\/wp-content\/uploads\/2011\/08\/winpatrol-400x279.png 400w\" sizes=\"(max-width: 659px) 100vw, 659px\" \/><\/p>\n<p><strong>Positives:<\/strong><\/p>\n<ul>\n<li>Well established product with quite comprehensive protection<\/li>\n<li>One of the first products to employ behavioral based technology<\/li>\n<\/ul>\n<p><strong>Negatives<\/strong><\/p>\n<ul>\n<li>None worth mentioning<\/li>\n<\/ul>\n<p>Also extremely worthy of consideration are the free firewalls which monitor outgoing as well as incoming connections and also include a HIPS component. Based on ease of use combined with an excellent level of effectiveness, <a href=\"http:\/\/blog.emsisoft.com\/2015\/03\/31\/emsisoft-online-armor-support-roadmap\/\" title=\"online armor firewall\" target=\"_blank\">Online Armor<\/a> is my number one recommendation. Another contender, purely because of its ease of use, is <a href=\"http:\/\/www.privacyware.com\/personal_firewall.html\" title=\"private firewall\" target=\"_blank\">PrivateFirewall<\/a>. Both are quite light on resources but PrivateFirewall is reported to be rather poor at self protection.<\/p>\n<p>At this stage I should mention a couple of peripheral security products;<br \/>\nI have become so accustomed to having one of the site advisory services installed in my browser, I must admit I would now be lost without them. These small, unobtrusive apps are extremely light on resources yet offer an invaluable aid in avoiding dangerous sites. After using McAfee Site Advisor for quite some time I am now using the <a href=\"https:\/\/addons.mozilla.org\/en-US\/firefox\/addon\/linkextend-safety-kidsafe-site\/\" title=\"linkextend firefox extension\" target=\"_blank\">LinkExtend<\/a> Firefox extension, which includes ratings from no less than 7 advisories, including WOT and MSA&#8230; highly recommended!<\/p>\n<p>If, out of necessity, you are required to visit dangerous sites or regularly test obscure software you might consider using one of the freeware virtual environments, a process which has become commonly known as sandboxing. This involves surfing\/downloading in a completely isolated environment, i.e. a sandbox. Nothing gets near the system unless you want it to and when your session is finished, simply delete the contents of the sandbox and everything is gone! <a href=\"http:\/\/www.sandboxie.com\/\" title=\"sandboxie browser isolation\" target=\"_blank\">Sandboxie<\/a> is my current recommendation; it is simplicity personified, very easy to use and just works!<\/p>\n<p>So, if you are a \u2018safe surfer\u2019 who uses the computer mostly just for the basics, one of better free anti-virus programs alone plus Windows Firewall would probably suffice.<\/p>\n<p>If you are looking for just a simple layer of extra protection, anti-virus plus HIPS or firewall should do you nicely.<\/p>\n<p>If you are prone to surf unsafe\/disreputable sites or have a propensity for downloading copious amounts of software  then go the whole hog; anti-virus plus HIPS\/firewall* plus dedicated anti spyware plus a sandboxing tool. If you take either or both of those practices to the extreme then freeware security is probably not the answer for you.<\/p>\n<p>I couldn\u2019t leave this subject without at least touching on the latest trend&#8230; Cloud Anti-Virus. I currently remain unconvinced, not because I have any evidence to suggest this is not a viable solution. Rather, simply because of my own ignorance, the unknown factor versus the devil you already know. Many \u2018experts\u2019 are in fact declaring Cloud AV to be superior.<\/p>\n<p>What security do I have installed? Avast free version (naturally) + Online Armor free firewall + LinkExtend + Sandboxie (so I can safely test freeware for you guys). Th-th-th-th that\u2019s all folks!!!<\/p>\n<p style=\"color:#999\">*As with other real time monitoring security software, best not to install more than one product which includes any HIPS component.<\/p>\n<div id=\"daves-4271434265\" class=\"daves-after-content\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-7205184075006101\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-7205184075006101\" \ndata-ad-slot=\"3225321574\" \ndata-ad-format=\"autorelaxed\" data-full-width-responsive=\"false\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>For years now the traditional security programs have relied heavily on a definition data base to identify malware. This method, also known as signature based detection, is still being widely employed today. New viruses and malware variants are being created daily and this system of [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":18234,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[15,13],"tags":[118,117,120,124,119,123,121,114,122,125],"class_list":["post-826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-freeware","category-security","tag-antivir","tag-avast","tag-avg","tag-mcafee-site-advisor","tag-microsoft-security-essentials","tag-online-armor","tag-spyware-terminator","tag-threatfire","tag-winpatrol","tag-wot"],"_links":{"self":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts\/826","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/comments?post=826"}],"version-history":[{"count":0,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/posts\/826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/media\/18234"}],"wp:attachment":[{"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/media?parent=826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/categories?post=826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/davescomputertips.com\/wp-json\/wp\/v2\/tags?post=826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}