{"id":391,"date":"2016-06-01T11:09:56","date_gmt":"2016-06-01T08:09:56","guid":{"rendered":""},"modified":"2016-06-01T11:09:56","modified_gmt":"2016-06-01T08:09:56","slug":"","status":"publish","type":"post","link":"https:\/\/cc.uobaghdad.edu.iq\/?p=391","title":{"rendered":"There are plenty of great antivirusproducts out there, but sometimes"},"content":{"rendered":"<div style=\"text-align: left;\"> <\/div>\n<div style=\"text-align: left;\">\n<div style=\"text-align: center;\"><img decoding=\"async\" alt=\"\" src=\"https:\/\/cc.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/48\/uploads\/2016\/technology%20news\/pc\/Metadata.jpg\" \/> <\/div>\n<p> <\/div>\n<div style=\"text-align: left;\"><span style=\"font-family: 'simplified arabic'; font-size: 16px;\"> <\/p>\n<p style=\"text-align: left; margin: 0px 0px 15px; font-size: 18px; line-height: 25px; font-weight: normal; color: #000000; letter-spacing: 0.5px; font-family: open-sans-n4, open-sans, sans-serif; font-style: normal; font-variant: normal; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\"><span>There are plenty of great<span class=\"Apple-converted-space\">&nbsp;<\/span><a class=\"internal\" href=\"http:\/\/uk.pcmag.com\/antivirus-reviews\/8141\/guide\/the-best-antivirus-for-2016\" style=\"text-decoration: none; color: #e20309; font-weight: bold; background: transparent;\">antivirus<\/a>products out there, but sometimes they miss the mark. Seeing how much malware a security program catches is one way to evaluate it, but so is recording its number of<span class=\"Apple-converted-space\">&nbsp;<\/span><a class=\"internal\" href=\"http:\/\/uk.pcmag.com\/feature\/72261\/fewer-false-positives-mean-better-antivirus-scores\" style=\"text-decoration: none; color: #e20309; font-weight: bold; background: transparent;\">false positives<\/a>. A false positive is when antivirus mistakenly reports a safe and legitimate program as dangerous malware. That&#8217;s annoying for users trying to access trusted programs but even worse for the creators of the unfairly demonized software. The Institute of Electrical and Electronics Engineers (IEEE) wants to put a stop to this, and PCMag&#8217;s resident security ascetic&nbsp;Neil Rubenking has brought us the details of its plans.<\/span><\/p>\n<p style=\"text-align: left; margin: 0px 0px 15px; font-size: 18px; line-height: 25px; font-weight: normal; color: #000000; letter-spacing: 0.5px; font-family: open-sans-n4, open-sans, sans-serif; font-style: normal; font-variant: normal; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\"><span>False positives are often the result of antivirus software encountering a safe program too new to recognize. IEEE&#8217;s solution hinges on the Clean File Metadata Exchange (<a class=\"external\" href=\"http:\/\/standards.ieee.org\/develop\/indconn\/icsg\/amss.html\" target=\"_blank\" style=\"text-decoration: none; color: #e20309; font-weight: bold; background: transparent;\">CMX<\/a><\/span><span>) service. With CMX, software authors can submit metadata for new files such as new programs or updates to existing programs before they are even released. Security vendors could then access this data in real-time to stay current with the latest legitimate files and prevent their programs from flagging them as malware. CMX is not a database, though. It holds onto data for a week or two as it validates and delivers it to subscribers. Anyone checking in less frequently and looking for older data will have to pull an archive.<\/span><\/p>\n<p style=\"text-align: left; margin: 0px 0px 15px; font-size: 18px; line-height: 25px; font-weight: normal; color: #000000; letter-spacing: 0.5px; font-family: open-sans-n4, open-sans, sans-serif; font-style: normal; font-variant: normal; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\"><span>&#8220;The system from our side is more geared toward big software houses,&#8221; said Professor Igor Muttik, Senior Principal Research Architect at McAfee, in an interview with Rubenking. Vendors can submit if they have a Class 3 Digital Signature. &#8220;If they wish to build reputation, now they have a way of doing it.&#8221; Initially, Microsoft was the only big&nbsp;company committed to CMX. But as&nbsp;the service continues&nbsp;to court partners it now contains millions of EXE records from groups like major security companies, PC OEMs, and even<span class=\"Apple-converted-space\">&nbsp;<\/span><a class=\"internal\" href=\"http:\/\/uk.pcmag.com\/steam\" style=\"text-decoration: none; color: #e20309; font-weight: bold; background: transparent;\">Steam<\/a>.<\/span><\/p>\n<p style=\"text-align: left; margin: 0px 0px 15px; font-size: 18px; line-height: 25px; font-weight: normal; color: #000000; letter-spacing: 0.5px; font-family: open-sans-n4, open-sans, sans-serif; font-style: normal; font-variant: normal; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\"><span>That doesn&#8217;t mean smaller third parties are out of luck. Mark Kennedy, Distinguished Engineer of Security Technology and Response at Symantec, explained how a company like Symantec could endorse software it thinks is clean. Consumers then see that opinion and choose to trust it or not. CMX also uses Software Identification (<a class=\"external\" href=\"http:\/\/tagvault.org\/swid-tags\/\" target=\"_blank\" style=\"text-decoration: none; color: #e20309; font-weight: bold; background: transparent;\">SWID<\/a><\/span><span>) tags to add more information to the service. The US government requires any software it uses to feature SWID tags, giving CMX even more data to draw from as a bonus.<\/span><\/p>\n<p style=\"text-align: left; margin: 0px 0px 15px; font-size: 18px; line-height: 25px; font-weight: normal; color: #000000; letter-spacing: 0.5px; font-family: open-sans-n4, open-sans, sans-serif; font-style: normal; font-variant: normal; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\"><span>CMX is part of the larger Anti-Malware Support Service (AMSS) initiative. Another component, the malware packer-identifying<span class=\"Apple-converted-space\">&nbsp;<\/span><a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2390388,00.asp\" style=\"text-decoration: none; color: #e20309; font-weight: bold; background: transparent;\">Taggant System<\/a>, was proposed by Kennedy and Muttik five years ago at the<span class=\"Apple-converted-space\">&nbsp;<\/span><a href=\"http:\/\/www.pcmag.com\/blackhat\" target=\"_blank\" style=\"text-decoration: none; color: #e20309; font-weight: bold; background: transparent;\">Black Hat conference<\/a>. Some criticize these collaborations as anticompetitive, but James Wendorf, Director of Cross-Industry and Multiple-Stakeholder Collaborations at the IEEE, sees it a different way.<\/span><\/p>\n<p style=\"text-align: left; margin: 0px 0px 15px; font-size: 18px; line-height: 25px; font-weight: normal; color: #000000; letter-spacing: 0.5px; font-family: open-sans-n4, open-sans, sans-serif; font-style: normal; font-variant: normal; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\"><span>&#8220;Standards are about bringing together interested parties, often competitors, to combat problems. The bad guys collaborate and share, so we need a way for the good guys to collaborate as they can,&#8221; said Wendorf. &#8220;Without being anticompetitive, we don&#8217;t want those problems. It matches IEEE&#8217;s overall goals and purpose, which is to advance technology for the benefit of humanity.&#8221;&nbsp;<\/span><\/p>\n<p style=\"text-align: left; margin: 0px 0px 15px; font-size: 18px; line-height: 25px; font-weight: normal; color: #000000; letter-spacing: 0.5px; font-family: open-sans-n4, open-sans, sans-serif; font-style: normal; font-variant: normal; orphans: auto; text-indent: 0px; text-transform: none; white-space: normal; widows: 1; word-spacing: 0px; -webkit-text-stroke-width: 0px; background-color: #ffffff;\">This article<span class=\"Apple-converted-space\">&nbsp;<\/span>on<span class=\"Apple-converted-space\">&nbsp;<\/span><span style=\"color: #e20309; background-image: initial; background-attachment: initial; background-size: initial; background-origin: initial; background-clip: initial; background-position: initial; background-repeat: initial;\"><strong>PCMag.com<\/strong><\/span>.<\/p>\n<p> <\/span><\/div>\n","protected":false},"excerpt":{"rendered":"<p>There are plenty of great antivirusproducts out there, but sometimes &#8230; <a class=\"cz_readmore\" href=\"https:\/\/cc.uobaghdad.edu.iq\/?p=391\"><i class=\"fa fa-angle-left\" aria-hidden=\"true\"><\/i><span>\u0627\u0644\u0645\u0632\u064a\u062f<\/span><\/a><\/p>\n","protected":false},"author":50,"featured_media":15301,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_lmt_disableupdate":"","_lmt_disable":"","footnotes":""},"categories":[13],"tags":[],"class_list":["post-391","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-13"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>There are plenty of great antivirusproducts out there, but sometimes - \u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cc.uobaghdad.edu.iq\/?p=391\" \/>\n<meta property=\"og:locale\" content=\"ar_AR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"There are plenty of great antivirusproducts out there, but sometimes - \u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629\" \/>\n<meta property=\"og:description\" content=\"There are plenty of great antivirusproducts out there, but sometimes ... \u0627\u0644\u0645\u0632\u064a\u062f\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cc.uobaghdad.edu.iq\/?p=391\" \/>\n<meta property=\"og:site_name\" content=\"\u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-01T08:09:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cc.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/48\/uploads\/2016\/technology%20news\/pc\/Metadata.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"589\" \/>\n\t<meta property=\"og:image:height\" content=\"238\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"cc\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629\" \/>\n\t<meta name=\"twitter:data1\" content=\"cc\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 \u062f\u0642\u0627\u0626\u0642\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/?p=391\",\"url\":\"https:\/\/cc.uobaghdad.edu.iq\/?p=391\",\"name\":\"There are plenty of great antivirusproducts out there, but sometimes - \u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629\",\"isPartOf\":{\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/?p=391#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/?p=391#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cc.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/48\/uploads\/2016\/technology news\/pc\/Metadata.jpg\",\"datePublished\":\"2016-06-01T08:09:56+00:00\",\"author\":{\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/#\/schema\/person\/1fe76ce393fb87b0b84628772a1dfc6f\"},\"breadcrumb\":{\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/?p=391#breadcrumb\"},\"inLanguage\":\"ar\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cc.uobaghdad.edu.iq\/?p=391\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/?p=391#primaryimage\",\"url\":\"https:\/\/cc.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/48\/uploads\/2016\/technology news\/pc\/Metadata.jpg\",\"contentUrl\":\"https:\/\/cc.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/48\/uploads\/2016\/technology news\/pc\/Metadata.jpg\",\"width\":589,\"height\":238},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/?p=391#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cc.uobaghdad.edu.iq\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"There are plenty of great antivirusproducts out there, but sometimes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/#website\",\"url\":\"https:\/\/cc.uobaghdad.edu.iq\/\",\"name\":\"\u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cc.uobaghdad.edu.iq\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"ar\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/#\/schema\/person\/1fe76ce393fb87b0b84628772a1dfc6f\",\"name\":\"cc\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"ar\",\"@id\":\"https:\/\/cc.uobaghdad.edu.iq\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b4093a8d8378e56919fc709c96e33f1dba7cc0bb50855b139e73cbcd1c974f19?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b4093a8d8378e56919fc709c96e33f1dba7cc0bb50855b139e73cbcd1c974f19?s=96&d=mm&r=g\",\"caption\":\"cc\"},\"url\":\"https:\/\/cc.uobaghdad.edu.iq\/?author=50\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"There are plenty of great antivirusproducts out there, but sometimes - \u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cc.uobaghdad.edu.iq\/?p=391","og_locale":"ar_AR","og_type":"article","og_title":"There are plenty of great antivirusproducts out there, but sometimes - \u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629","og_description":"There are plenty of great antivirusproducts out there, but sometimes ... \u0627\u0644\u0645\u0632\u064a\u062f","og_url":"https:\/\/cc.uobaghdad.edu.iq\/?p=391","og_site_name":"\u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629","article_published_time":"2016-06-01T08:09:56+00:00","og_image":[{"width":589,"height":238,"url":"https:\/\/cc.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/48\/uploads\/2016\/technology news\/pc\/Metadata.jpg","type":"image\/jpeg"}],"author":"cc","twitter_card":"summary_large_image","twitter_misc":{"\u0643\u064f\u062a\u0628 \u0628\u0648\u0627\u0633\u0637\u0629":"cc","\u0648\u0642\u062a \u0627\u0644\u0642\u0631\u0627\u0621\u0629 \u0627\u0644\u0645\u064f\u0642\u062f\u0651\u0631":"3 \u062f\u0642\u0627\u0626\u0642"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/cc.uobaghdad.edu.iq\/?p=391","url":"https:\/\/cc.uobaghdad.edu.iq\/?p=391","name":"There are plenty of great antivirusproducts out there, but sometimes - \u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629","isPartOf":{"@id":"https:\/\/cc.uobaghdad.edu.iq\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cc.uobaghdad.edu.iq\/?p=391#primaryimage"},"image":{"@id":"https:\/\/cc.uobaghdad.edu.iq\/?p=391#primaryimage"},"thumbnailUrl":"https:\/\/cc.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/48\/uploads\/2016\/technology news\/pc\/Metadata.jpg","datePublished":"2016-06-01T08:09:56+00:00","author":{"@id":"https:\/\/cc.uobaghdad.edu.iq\/#\/schema\/person\/1fe76ce393fb87b0b84628772a1dfc6f"},"breadcrumb":{"@id":"https:\/\/cc.uobaghdad.edu.iq\/?p=391#breadcrumb"},"inLanguage":"ar","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cc.uobaghdad.edu.iq\/?p=391"]}]},{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/cc.uobaghdad.edu.iq\/?p=391#primaryimage","url":"https:\/\/cc.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/48\/uploads\/2016\/technology news\/pc\/Metadata.jpg","contentUrl":"https:\/\/cc.uobaghdad.edu.iq\/wp-content\/uploads\/sites\/48\/uploads\/2016\/technology news\/pc\/Metadata.jpg","width":589,"height":238},{"@type":"BreadcrumbList","@id":"https:\/\/cc.uobaghdad.edu.iq\/?p=391#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cc.uobaghdad.edu.iq\/"},{"@type":"ListItem","position":2,"name":"There are plenty of great antivirusproducts out there, but sometimes"}]},{"@type":"WebSite","@id":"https:\/\/cc.uobaghdad.edu.iq\/#website","url":"https:\/\/cc.uobaghdad.edu.iq\/","name":"\u0645\u0631\u0643\u0632 \u0627\u0644\u062d\u0627\u0633\u0628\u0629 \u0627\u0644\u0627\u0644\u0643\u062a\u0631\u0648\u0646\u064a\u0629","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cc.uobaghdad.edu.iq\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"ar"},{"@type":"Person","@id":"https:\/\/cc.uobaghdad.edu.iq\/#\/schema\/person\/1fe76ce393fb87b0b84628772a1dfc6f","name":"cc","image":{"@type":"ImageObject","inLanguage":"ar","@id":"https:\/\/cc.uobaghdad.edu.iq\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b4093a8d8378e56919fc709c96e33f1dba7cc0bb50855b139e73cbcd1c974f19?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b4093a8d8378e56919fc709c96e33f1dba7cc0bb50855b139e73cbcd1c974f19?s=96&d=mm&r=g","caption":"cc"},"url":"https:\/\/cc.uobaghdad.edu.iq\/?author=50"}]}},"modified_by":null,"_links":{"self":[{"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/391","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/users\/50"}],"replies":[{"embeddable":true,"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=391"}],"version-history":[{"count":0,"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/posts\/391\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=\/wp\/v2\/media\/15301"}],"wp:attachment":[{"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=391"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=391"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cc.uobaghdad.edu.iq\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=391"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}