{"id":513,"date":"2017-06-15T07:38:42","date_gmt":"2017-06-15T07:38:42","guid":{"rendered":"http:\/\/www.protegent360.com\/blog\/?p=513"},"modified":"2022-09-09T15:16:48","modified_gmt":"2022-09-09T09:46:48","slug":"how-many-categories-of-computer-viruses-do-exist","status":"publish","type":"post","link":"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/","title":{"rendered":"How Many Categories of Computer Viruses do exist?"},"content":{"rendered":"<p>We all love working on your computer system or PC, surfing over the internet, watching movies, playing games, etc. But most of the people don\u2019t care about their computer if they basic daily tasks are getting fulfilled. They even don\u2019t care that they should have some of the basic data security utilities like <a href=\"https:\/\/protegent360.com\/antivirus\/\">Antivirus software<\/a>, firewall, etc which will provide protection from all sought of viruses and also block any unauthorised access to your personal data through phishing and spam attacks.<\/p>\n<p><!--more--><\/p>\n<p>Today we are here to present the various categories of computer viruses that do exist and can create bring big financial and non-financial losses to an individual and business.<\/p>\n<ol>\n<li><strong><u>Resident Virus<\/u><\/strong><\/li>\n<\/ol>\n<p>Resident Virus work similar to its name and is a permanent stays in the RAM of the computer system. The virus can control, overcome and interrupt execution of any program running in the computer system. This particular antivirus can perform operations on any running programs like open, close, copy, paste, etc.<\/p>\n<ol start=\"2\">\n<li><strong><u>Direct Action Virus<\/u><\/strong><\/li>\n<\/ol>\n<p>This type of virus doesn\u2019t stay in the computer system for a longer period of time. It normally waits for the particular time for any event action as programmed in it and then goes live with replicating itself in the computer system. This virus generally infects the files and folders includes in the file AUTOEXEC.BAT. This file is responsible for performing operations during boot time.<\/p>\n<ol start=\"3\">\n<li><strong><u>Boot Virus<\/u><\/strong><\/li>\n<\/ol>\n<p>This is the most dangerous virus which attacks the boot sector of the hard disk. Boot Sector contains all the files and folders responsible of booting the operating system on the hard disk. If this virus gets on your computer system, then it will not allows OS in your computer to boot at start.<\/p>\n<ol start=\"4\">\n<li><strong><u>Override Virus<\/u><\/strong><\/li>\n<\/ol>\n<p>This virus has a typical feature that when it infects a particular data file, it not only corrupts the file but also over the data present in it with some random cake making it worse for the computer user. In this case, the user even won\u2019t be able to recover the data present in the data file.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"5\">\n<li><strong><u>Multipartite Virus<\/u><\/strong><\/li>\n<\/ol>\n<p>Multipartite viruses stay hided in the computer memory and starts infecting multiple media files. This virus starts infecting the computer system beginning with the boot sector of hard drive, executable files and thereafter the whole computer system.<\/p>\n<ol start=\"6\">\n<li><strong><u>Encrypted Virus<\/u><\/strong><\/li>\n<\/ol>\n<p>This is one of the advanced encrypted virus contains malicious code which doesn\u2019t allows it to be detected by any antivirus. The antivirus can only detect this particular type of when it decrypts it to start infecting computer system.<\/p>\n<ol start=\"7\">\n<li><strong><u>Network Virus<\/u><\/strong><\/li>\n<\/ol>\n<p>Network viruses are most common in offices where the computers are connect with LANs with each other. The network virus has the functionalities of spreading over the network with the use of shared folders and drive used by all the computers in the LAN network. This virus has the tendency of move from one computer to the other after its task is completed.<\/p>\n<ol start=\"8\">\n<li><strong><u>Non-Resident Virus<\/u><\/strong><\/li>\n<\/ol>\n<p>Nonresident Viruses role as finder module which can infect to files when it found one.<\/p>\n<ol start=\"9\">\n<li><strong><u>Trojans<\/u><\/strong><\/li>\n<\/ol>\n<p>Trojans or Trojan horse is the most commonly found viruses in computer system. It is a malware program which is programmed to leak out confidential information from user\u2019s computer including credit card info, passwords and other credentials.<\/p>\n<ol start=\"10\">\n<li><strong><u>Worms <\/u><\/strong><\/li>\n<\/ol>\n<p>A worm is not a virus and is programmed with the same functionalities. It is the feature of Self-replicating and can put up adverse effect on computer system performance. One thing is good about worms, that they are very easily detectable by any antivirus software.<\/p>\n<p>We do recommend use of <a href=\"https:\/\/protegent360.com\/antivirus\/\">best antivirus software<\/a> for your computer system to stay it protected from any viruses, Spyware and other online cyber threats.<\/p>\n<p>That\u2019s it in today discussion about the various categorizes of viruses. There might be some more categories of viruses which we will come up with in our next blog.<\/p>\n<p>We always appreciate any suggestion and comments on the above discussed topic. The fact and figures which are mentioned above are true as per our research.<\/p>\n<p>Thanks readers for going through our blog. We will be back with some more interesting blogs.<\/p>\n<h4><strong>Follow us on:-<\/strong><\/h4>\n<p><a href=\"https:\/\/protegent360.com\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-13\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2022\/06\/logo.png\" alt=\"\" width=\"148\" height=\"32\" \/><\/a> \u00a0<a href=\"https:\/\/twitter.com\/UnistalGlobal\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11066\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-300x300.png\" alt=\"\" width=\"36\" height=\"36\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/twitter-icon-circle-blue-logo-0902F48837-seeklogo.com_-100x100.png 100w\" sizes=\"auto, (max-width: 36px) 100vw, 36px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.linkedin.com\/company\/unistal-systems-pvt-ltd\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11067\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-300x300.png\" alt=\"\" width=\"36\" height=\"36\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/640px-LinkedIn_logo_initials.png 640w\" sizes=\"auto, (max-width: 36px) 100vw, 36px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.instagram.com\/unistalglobal\/?hl=en\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11068\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-300x300.png\" alt=\"\" width=\"35\" height=\"35\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-1024x1024.png 1024w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-768x768.png 768w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-1536x1536.png 1536w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Instagram_logo_2016.svg_-100x100.png 100w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.facebook.com\/UnistalGlobal\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11069\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-300x300.png\" alt=\"\" width=\"35\" height=\"35\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-768x768.png 768w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-550x550.png 550w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-600x600.png 600w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/Facebook_Logo_2019.png 800w\" sizes=\"auto, (max-width: 35px) 100vw, 35px\" \/><\/a>\u00a0\u00a0 <a href=\"https:\/\/www.youtube.com\/c\/UnistalGlobal\/\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-11070\" src=\"http:\/\/protegent360.com\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-300x300.png\" alt=\"\" width=\"37\" height=\"37\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-300x300.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-150x150.png 150w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-200x200.png 200w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-50x50.png 50w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb-100x100.png 100w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2020\/09\/free-youtube-logo-icon-2431-thumb.png 512w\" sizes=\"auto, (max-width: 37px) 100vw, 37px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>We all love working on your computer system or PC, surfing over the internet, watching movies, playing games, etc. But most of the people don\u2019t care about their computer if they basic daily tasks are getting fulfilled. They even don\u2019t care that they should have some of the basic data security utilities like Antivirus software, firewall, etc which will provide protection from all sought of viruses and also block any unauthorised access to your personal data through phishing and spam attacks.<\/p>\n","protected":false},"author":20,"featured_media":514,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[103,104,133,105,106],"tags":[246,247,248,249,250,251,252,253,254,255,256],"class_list":["post-513","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-antivirus-software-2","category-our-complete-security-software","category-internet-security","category-p360","category-our-total-security-software","tag-boot-virus","tag-category-of-computer-viruses","tag-encrypted-virus","tag-multipartite-virus","tag-network-virus","tag-non-resident-virus","tag-override-virus","tag-resident-virus","tag-trojans","tag-types-of-viruses","tag-worms"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Many Categories of Computer Viruses do exist?<\/title>\n<meta name=\"description\" content=\"The various categories of computer viruses that do exist and can create bring big financial and non-financial losses to an individual and business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Many Categories of Computer Viruses do exist?\" \/>\n<meta property=\"og:description\" content=\"The various categories of computer viruses that do exist and can create bring big financial and non-financial losses to an individual and business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/\" \/>\n<meta property=\"og:site_name\" content=\"Our Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-06-15T07:38:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-09-09T09:46:48+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/protegent360.com\/blog\/#website\",\"url\":\"https:\/\/protegent360.com\/blog\/\",\"name\":\"Our Blog\",\"description\":\"World&#039;s Only Antivirus with Data Recovery Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/protegent360.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/\",\"url\":\"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/\",\"name\":\"How Many Categories of Computer Viruses do exist?\",\"isPartOf\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#website\"},\"datePublished\":\"2017-06-15T07:38:42+00:00\",\"dateModified\":\"2022-09-09T09:46:48+00:00\",\"author\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790\"},\"description\":\"The various categories of computer viruses that do exist and can create bring big financial and non-financial losses to an individual and business.\",\"breadcrumb\":{\"@id\":\"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/protegent360.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Many Categories of Computer Viruses do exist?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Many Categories of Computer Viruses do exist?","description":"The various categories of computer viruses that do exist and can create bring big financial and non-financial losses to an individual and business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/","og_locale":"en_US","og_type":"article","og_title":"How Many Categories of Computer Viruses do exist?","og_description":"The various categories of computer viruses that do exist and can create bring big financial and non-financial losses to an individual and business.","og_url":"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/","og_site_name":"Our Blog","article_published_time":"2017-06-15T07:38:42+00:00","article_modified_time":"2022-09-09T09:46:48+00:00","author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/protegent360.com\/blog\/#website","url":"https:\/\/protegent360.com\/blog\/","name":"Our Blog","description":"World&#039;s Only Antivirus with Data Recovery Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/protegent360.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/","url":"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/","name":"How Many Categories of Computer Viruses do exist?","isPartOf":{"@id":"https:\/\/protegent360.com\/blog\/#website"},"datePublished":"2017-06-15T07:38:42+00:00","dateModified":"2022-09-09T09:46:48+00:00","author":{"@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790"},"description":"The various categories of computer viruses that do exist and can create bring big financial and non-financial losses to an individual and business.","breadcrumb":{"@id":"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/protegent360.com\/blog\/how-many-categories-of-computer-viruses-do-exist\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/protegent360.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How Many Categories of Computer Viruses do exist?"}]},{"@type":"Person","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/ee21d31223ed61b92f09de8f39040790","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/40e3fe95bdfe6f93a4395dda498d49c4a79d3f702b81ad6fb6a9cc55d07338eb?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/513","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/comments?post=513"}],"version-history":[{"count":0,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/513\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/media?parent=513"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/categories?post=513"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/tags?post=513"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}