{"id":4550,"date":"2018-05-18T04:04:44","date_gmt":"2018-05-17T22:34:44","guid":{"rendered":"https:\/\/antivirus.comodo.com\/blog\/?p=4550"},"modified":"2021-02-24T13:16:03","modified_gmt":"2021-02-24T07:46:03","slug":"what-is-rootkit","status":"publish","type":"post","link":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/","title":{"rendered":"Rootkit: What is Rootkit &#038; it&#8217;s types? How to Detect it"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-518 size-full aligncenter\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg\" alt=\"Malware\" width=\"654\" height=\"435\" srcset=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg 654w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-300x199.jpg 300w, https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware-225x149.jpg 225w\" sizes=\"auto, (max-width: 654px) 100vw, 654px\" \/><\/p>\n<p>In simple language, &#8216;rootkit&#8217; is basically a software kit used to get to the root of the computer. In other words, a software kit used to gain admin access to the computer and thereby control it. Developed as a legitimate software to provide a &#8216;backdoor&#8217; to software developers in order to fix the respective software &#8211; in case any issue arises &#8211; today, unfortunately, it is used by the hacking community to take control of vulnerable computers and to steal vital data from them.<\/p>\n<p>Rootkits can make it to your computers via a number of ways \u2013 the most popular of them being phishing and social engineering attacks. Once they enter your computer, they usually take control of it and allow hackers to access it remotely so that they can carry out the intended task \u2013 which could be stealing information from the computer or simply crashing it. Legacy antimalware programs had a tough time detecting rootkits, but this is not an issue with the modern and powerful <em><strong>antivirus programs<\/strong><\/em> like Comodo Antivirus.<\/p>\n<p><strong>How To Detect Rootkit Infection?<\/strong><\/p>\n<p>Just like different types of malware, rootkit infections usually are accompanied with some typical signs, which include antivirus stopping to function, Windows Settings changing independently, background images changing or pinned items to the task bar disappearing for no reason. And not to forget slow system performance. All these are usually indicative of rootkit infection.<\/p>\n<p><strong>Types Of Rootkits<\/strong><\/p>\n<p><strong>Some of the most popular rootkits include:<\/strong><\/p>\n<ul>\n<li><strong>Kernel Rootkit:<\/strong> these are rootkits which operate at the kernel level (the core of the operating system) and have a serious effect on the system. These rootkits are usually difficult to detect since they operate at the kernel, meaning they have the same privileges like that of the operating system.<\/li>\n<li><strong>Firmware Rootkit:<\/strong> these rootkits affect the firmware devices like network devices. These rootkits are usually booted when the machine gets booted and is available as long as the device is. This too is hard to detect.<\/li>\n<li><strong>Application Rootkit:<\/strong> these rootkits operate at the application level. That is, they don&#8217;t infect the kernel but the application files inside your computer. These usually replace the applications files (which they are trying to infect) with the rootkit files or change the behavior of the application by injecting code.<\/li>\n<li><strong>Memory Rootkit:<\/strong> these rootkits usually hide themselves and operate from the computer&#8217;s memory. That is RAM (Random Access Memory).<\/li>\n<li><strong>Bootkit Rootkits:<\/strong> These rootkits \u2013 also known as Boot Loader Level kits \u2013 infect the legitimate boot loader of your system with the respective rootkit, so that they get activated whenever the operating system is started. Obviously, these rootkits too pose a serious threat to your system.<\/li>\n<li><strong>Persistent Rootkits:<\/strong> Another rootkit which starts up and stays active until the system is shut down. What&#8217;s more is the fact that this rootkit has the ability to restart the system processes.<\/li>\n<li><strong>Library Rootkits:<\/strong> As the name suggests, these rootkits affect the &#8216;library files&#8217; in your computer (system library). For example, windows ddls. Similar to other rootkits, these too intercept specific files and replace them with its own code.<\/li>\n<\/ul>\n<p><strong>Comodo Antivirus For Preventing Rootkit<\/strong><\/p>\n<p>Comodo Antivirus which comes equipped with impressive security features is easily the <a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/best-free-antivirus-software-of-2018\/\">best antivirus<\/a> software in the IT security market. It is effective in preventing not just rootkit infections but the entire gamut of malware types like adware, trojan, <a title=\"What is a Keylogger?\" href=\"https:\/\/enterprise.comodo.com\/what-is-a-keylogger.php\" target=\"_blank\" rel=\"noopener\">keyloggers<\/a>, ransomware and more. Moreover, it pretty effective against zero-day threats as well. All because of the patented &#8216;Default Deny Approach&#8217; implemented via its Containment technology.<\/p>\n<p><strong>Security Features Offered:<\/strong><\/p>\n<ul>\n<li><strong>Default Deny Approach:<\/strong> Technology unique to Comodo which ensures all files or applications are denied entry into your PC(s) by default, whether they are known good (whitelisted ones), known bad (blacklisted ones) or unknown (not identified or encountered so far), until they prove themselves to be harmless.<\/li>\n<li><strong>Host Intrusion Protection (HIPS):<\/strong> Comodo Antivirus also ships with a default HIPS rule-set which offer protection to your PC(s). Simply put, Comodo HIPS protects system critical files or folders from malware infections by enforcing a set of security rules that offer high levels of protection. HIPS rule-set is highly customizable.<\/li>\n<li><strong>Viruscope:<\/strong> this technology unique to Comodo, basically monitors all the processes running on your computer and alerts you when a process behaves abnormally or has gone rogue (indications of malware infection). Using Viruscope, PC users can potentially reverse or undo such undesirable processes.<\/li>\n<li><strong>And More:<\/strong> other crucial security features like protection against file-less malware, rescue disk, protection against <strong>Man-in-the-Middle<\/strong> (MITM) attacks and much more.<\/li>\n<\/ul>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\">Virus Removal Tool<\/a><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/download\/thank-you.php?prod=cloud-antivirus&#038;track=16678&#038;af=16678\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Download', eventLabel: 'Bottom FREE DOWNLOAD banner Product AV'});\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2018\/04\/Comodo-Free-Antivirus.png\" alt=\"comodo antivirus\"\/><\/a><\/p>\n<p><a href=\"https:\/\/secure.nurd.com\/home\/purchase.php?pid=109&#038;af=16166\" target=\"_blank\" rel=\"noopener\" onclick=\"ga('send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});ga('nT.send', 'event', {eventCategory: 'Antivirus Blog', eventAction: 'Click', eventLabel: 'GET COMPLETE PROTECTION banner Product CIS Pro'});\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-8604\" src=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/2020\/08\/complete-antivirus.png\" alt=\"comodo antivirus\" width=\"650\" height=\"83\" \/><\/a><\/p>\n<p><strong>Related Resources<\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/perform-website-safety-check.php\" target=\"blank\" rel=\"noopener\">Website Safety Check<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n<p><strong><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/wikipedia-taken-offline-massive-ddos-attack\/\" target=\"blank\" rel=\"noopener\">Wikipedia Down by DDoS Attack<\/a><\/strong><\/p>\n<p><a href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/five-best-virus-and-malware-removal-tools\/\"><strong>Best Virus Removal Tool<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/webinspector.com\/website-malware-scanner\/\" target=\"_blank\" rel=\"noopener\"><strong>Free Website Malware Scanner<\/strong><\/a><\/p>\n<p><a href=\"https:\/\/www.belugacdn.com\/blog\/hosting\/free-web-hosting\/\" rel=\"noopener\" target=\"_blank\"><strong>Free Web Hosting<\/strong><\/a><\/p>\n<p><strong><a href=\"https:\/\/cwatch.comodo.com\/website-backup\/\" rel=\"noopener\" target=\"_blank\">Website Backup<\/a><\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/www.itarian.com\/itsm\/itsm-products.php\" rel=\"noopener\" target=\"_blank\">ITSM Products<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>In simple language, &#8216;rootkit&#8217; is basically a software kit used to get to the root of the computer. In other words, a software kit used to gain admin access to the computer and thereby control it. Developed as a legitimate software to provide a &#8216;backdoor&#8217; to software developers in order to fix the respective software [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":518,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[180,12,153],"class_list":["post-4550","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-safety","tag-antivirus-programs","tag-antivirus-software","tag-best-antivirus"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Rootkit: What is Rootkit &amp; it&#039;s types? How to Detect it<\/title>\n<meta name=\"description\" content=\"Rootkit is basically a malicious software used to gain administrator-level access to a computer or network. Know more about the types of rootkit &amp; its prevention.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rootkit: What is Rootkit &amp; it&#039;s types? How to Detect it\" \/>\n<meta property=\"og:description\" content=\"Rootkit is basically a malicious software used to gain administrator-level access to a computer or network. Know more about the types of rootkit &amp; its prevention.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/\" \/>\n<meta property=\"og:site_name\" content=\"Comodo Antivirus Blogs | Anti-Virus Software Updates\" \/>\n<meta property=\"article:published_time\" content=\"2018-05-17T22:34:44+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-24T07:46:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"654\" \/>\n\t<meta property=\"og:image:height\" content=\"435\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"seo\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"seo\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/\",\"name\":\"Rootkit: What is Rootkit & it's types? How to Detect it\",\"isPartOf\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg\",\"datePublished\":\"2018-05-17T22:34:44+00:00\",\"dateModified\":\"2021-02-24T07:46:03+00:00\",\"author\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\"},\"description\":\"Rootkit is basically a malicious software used to gain administrator-level access to a computer or network. Know more about the types of rootkit & its prevention.\",\"breadcrumb\":{\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#primaryimage\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg\",\"contentUrl\":\"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg\",\"width\":654,\"height\":435,\"caption\":\"Nonocore\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/antivirus.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rootkit: What is Rootkit &#038; it&#8217;s types? How to Detect it\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#website\",\"url\":\"https:\/\/antivirus.comodo.com\/blog\/\",\"name\":\"Comodo Antivirus Blogs | Anti-Virus Software Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462\",\"name\":\"seo\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g\",\"caption\":\"seo\"},\"url\":\"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rootkit: What is Rootkit & it's types? How to Detect it","description":"Rootkit is basically a malicious software used to gain administrator-level access to a computer or network. Know more about the types of rootkit & its prevention.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/","og_locale":"en_US","og_type":"article","og_title":"Rootkit: What is Rootkit & it's types? How to Detect it","og_description":"Rootkit is basically a malicious software used to gain administrator-level access to a computer or network. Know more about the types of rootkit & its prevention.","og_url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/","og_site_name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","article_published_time":"2018-05-17T22:34:44+00:00","article_modified_time":"2021-02-24T07:46:03+00:00","og_image":[{"width":654,"height":435,"url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg","type":"image\/jpeg"}],"author":"seo","twitter_card":"summary_large_image","twitter_misc":{"Written by":"seo","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/","url":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/","name":"Rootkit: What is Rootkit & it's types? How to Detect it","isPartOf":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#primaryimage"},"image":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#primaryimage"},"thumbnailUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg","datePublished":"2018-05-17T22:34:44+00:00","dateModified":"2021-02-24T07:46:03+00:00","author":{"@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462"},"description":"Rootkit is basically a malicious software used to gain administrator-level access to a computer or network. Know more about the types of rootkit & its prevention.","breadcrumb":{"@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#primaryimage","url":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg","contentUrl":"https:\/\/antivirus.comodo.com\/blog\/wp-content\/uploads\/catching-malware.jpg","width":654,"height":435,"caption":"Nonocore"},{"@type":"BreadcrumbList","@id":"https:\/\/antivirus.comodo.com\/blog\/computer-safety\/what-is-rootkit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/antivirus.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Rootkit: What is Rootkit &#038; it&#8217;s types? How to Detect it"}]},{"@type":"WebSite","@id":"https:\/\/antivirus.comodo.com\/blog\/#website","url":"https:\/\/antivirus.comodo.com\/blog\/","name":"Comodo Antivirus Blogs | Anti-Virus Software Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/antivirus.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/e534eccce9a7e6ced088443c73329462","name":"seo","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/antivirus.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3b7714e98dafc3a3b391832c0f5e2b406856b62c8e81ad94382c197cdb380790?s=96&d=mm&r=g","caption":"seo"},"url":"https:\/\/antivirus.comodo.com\/blog\/author\/seo\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4550","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=4550"}],"version-history":[{"count":22,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4550\/revisions"}],"predecessor-version":[{"id":15866,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/4550\/revisions\/15866"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media\/518"}],"wp:attachment":[{"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=4550"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=4550"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/antivirus.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=4550"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}