{"id":330,"date":"2009-12-30T21:37:55","date_gmt":"2009-12-31T02:37:55","guid":{"rendered":"http:\/\/192.168.33.66\/wp\/?p=330"},"modified":"2009-12-31T21:54:43","modified_gmt":"2010-01-01T02:54:43","slug":"330","status":"publish","type":"post","link":"https:\/\/www.wildow.com\/blog\/?p=330","title":{"rendered":"interesting Link to how spyware infects your computer"},"content":{"rendered":"<p>Who Profits from Security Holes?<\/p>\n<p><a href=\"http:\/\/www.benedelman.org\/news\/111804-1.html\">http:\/\/www.benedelman.org\/news\/111804-1.html<\/a><\/p>\n<p>How bad is this problem? How much junk can get installed on a user\u2019s PC by merely visiting a single site? I set out to see for myself \u2013 by visiting a single web page taking advantage of a security hole (in an ordinary fresh copy of Windows XP), and by recording what programs that site caused to be installed on my PC. In the course of my testing, my test PC was brought to a virtual stand-still \u2013 with at least 16 distinct programs installed. I was not shown licenses or other installation prompts for any of these programs, and I certainly didn\u2019t consent to their installation on my PC<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Who Profits from Security Holes? http:\/\/www.benedelman.org\/news\/111804-1.html How bad is this problem? How much junk can get installed on a user\u2019s PC by merely visiting a single site? I set out to see for myself \u2013 by visiting a single web &#8230; <a class=\"more-link\" href=\"https:\/\/www.wildow.com\/blog\/?p=330\">Read More &raquo;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-330","post","type-post","status-publish","format-standard","hentry","category-virus"],"_links":{"self":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=330"}],"version-history":[{"count":4,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/330\/revisions"}],"predecessor-version":[{"id":367,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=\/wp\/v2\/posts\/330\/revisions\/367"}],"wp:attachment":[{"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.wildow.com\/blog\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}