{"version":"1.0","provider_name":"CompuClever","provider_url":"https:\/\/www.compuclever.com\/posts","author_name":"Andy Thompson","author_url":"https:\/\/www.compuclever.com\/posts\/author\/yida\/","title":"Secure Computing Practices - CompuClever","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"nSrb9x6aMP\"><a href=\"https:\/\/www.compuclever.com\/posts\/secure-computing-practices\/\">Secure Computing Practices<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.compuclever.com\/posts\/secure-computing-practices\/embed\/#?secret=nSrb9x6aMP\" width=\"600\" height=\"338\" title=\"&#8220;Secure Computing Practices&#8221; &#8212; CompuClever\" data-secret=\"nSrb9x6aMP\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/* ]]> *\/\n<\/script>\n","description":"This blog article focuses on the privacy and personal security functionality of PC Clean Maestro\u2013 the removal of personal and private files. There are numerous examples of cybercrime and online hacking which exemplify damages that can be lost in terms of financial wealth, private data, and personal information that can be used against your will. In this article we will offer some examples of how you can prevent falling into malicious traps. For more detail of cybercrime examples refer to our newsletter. While encryption and firewall techniques are available, experts agree that there are always vulnerable points of entry. We emphasize eliminating the risk by removal of data where possible.","thumbnail_url":"https:\/\/www.compuclever.com\/posts\/wp-content\/uploads\/robot_broom_2_128x128_shadow1.png"}