{"id":6176,"date":"2014-04-30T14:52:58","date_gmt":"2014-04-30T18:52:58","guid":{"rendered":"http:\/\/southjerseytechies.net\/blog\/?p=6176"},"modified":"2018-07-17T08:50:00","modified_gmt":"2018-07-17T12:50:00","slug":"important-internet-explorer-vulnerability","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/","title":{"rendered":"Important:  Internet Explorer Vulnerability"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-6177 alignright\" src=\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png\" alt=\"IE\" width=\"259\" height=\"240\" srcset=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png 400w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE-300x277.png 300w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE-1024x948.png 1024w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE-216x200.png 216w, https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE-444x411.png 444w\" sizes=\"auto, (max-width: 259px) 100vw, 259px\" \/><strong><span style=\"color: #ff6600;\">IMPORTANT INFORMATION:<\/span>\u00a0<\/strong><strong>US-CERT and UK security agencies warn users to stop using Internet Explorer because of the severity in this security hole that has been used in &#8220;limited, targeted attacks&#8221;.<\/strong><\/p>\n<p>United States Computer Emergency Readiness Team released an alert on April 28, 2014 regarding vulnerabilities in Microsoft&#8217;s Internet Explorer. \u00a0Internet Explorer versions 6 through 11 are susceptible\u00a0to be victims of attacks to exploit the Remote Code Execution Vulnerability.<\/p>\n<p>US-CERT Vulnerability Note <a title=\"Vulnerability Note VU#222929\" href=\"http:\/\/www.kb.cert.org\/vuls\/id\/222929\">VU#22292<\/a><\/p>\n<p>Microsoft Security Advisory\u00a0<a title=\"Microsoft Security Advisory 2963983 \" href=\"https:\/\/technet.microsoft.com\/en-US\/library\/security\/2963983\">2963983<\/a><\/p>\n<h3><strong>Workarounds:<\/strong><\/h3>\n<p><span style=\"color: #000000;\">Basic protection includes the installation of Anti-malware software, enabling a Firewall and applying all Windows\/Microsoft updates. \u00a0In addition to basic protection, we recommend taking extra preventative steps listed below. \u00a0It is not necessary to apply all of the following workarounds, apply one to help protect your system and data.<\/span><\/p>\n<h2><span style=\"color: #ff6600;\">Enable Enhanced Protection Mode<\/span><\/h2>\n<ol>\n<ol>\n<li><span style=\"color: #000000;\">Open <strong>IE 10<\/strong> or <strong>IE 11<\/strong>.<\/span><\/li>\n<li><span style=\"color: #000000;\">Click the <strong>Tools<\/strong> menu and select <strong>Internet Options<\/strong>.<\/span><\/li>\n<li><span style=\"color: #000000;\">In the Internet Options window, click the <strong>Advanced<\/strong> tab.<\/span><\/li>\n<li><span style=\"color: #000000;\">Scroll down the list of options until you see the <strong>Security<\/strong> section, click the checkbox to <strong>Enable Enhanced Protected Mode<\/strong>. <em>\u00a0For\u00a0IE 11 in a 64-bit version of Windows, you also need to click the checkbox to &#8220;Enable 64-bit processes for Enhanced Protected Mode&#8221;.<\/em><\/span><\/li>\n<li><span style=\"color: #000000;\"><strong>Restart IE<\/strong> to force the new settings.<\/span><\/li>\n<\/ol>\n<\/ol>\n<h2><span style=\"color: #ff6600;\">Change Access Control List and unregister VGX.DLL:<\/span><\/h2>\n<p style=\"padding-left: 60px;\"><span style=\"color: #000000;\"><b>32-Bit Systems:<\/b><\/span><\/p>\n<ol>\n<ol>\n<ol>\n<li><span style=\"line-height: 13px; color: #000000;\">Open elevated Command Prompt\u00a0<em>(Run as Administrator)<\/em><\/span><\/li>\n<li><span style=\"color: #000000;\">Run the following command:<\/span><br \/>\n<h6><span style=\"color: #000000;\">&#8220;%SystemRoot%\\System32\\regsvr32.exe&#8221; -u &#8220;%CommonProgramFiles%\\Microsoft Shared\\VGX\\vgx.dll&#8221; <\/span><\/h6>\n<\/li>\n<li><span style=\"color: #000000;\">Click OK to close Dialog Box confirming un-registration has succeeded.<\/span><\/li>\n<\/ol>\n<\/ol>\n<\/ol>\n<p style=\"padding-left: 60px;\"><span style=\"color: #000000;\"><strong>64-Bit Systems:<\/strong><\/span><\/p>\n<ol>\n<ol>\n<ol>\n<li><span style=\"color: #000000;\">Open elevated Command Prompt\u00a0<em>(Run as Administrator)<\/em><\/span><\/li>\n<li><span style=\"color: #000000;\">Run the following command(s) separately:<\/span><br \/>\n<h6><span style=\"color: #000000;\">&#8220;%SystemRoot%\\System32\\regsvr32.exe&#8221; -u &#8220;%CommonProgramFiles%\\Microsoft Shared\\VGX\\vgx.dll&#8221; &#8220;%SystemRoot%\\System32\\regsvr32.exe&#8221; -u &#8220;%CommonProgramFiles(x86)%\\Microsoft Shared\\VGX\\vgx.dll&#8221; <\/span><\/h6>\n<\/li>\n<li><span style=\"color: #000000;\">Click OK to close Dialog Box confirming un-registration has succeeded.<\/span><\/li>\n<\/ol>\n<\/ol>\n<\/ol>\n<h2><span style=\"color: #ff6600;\">Windows XP and all other users.<\/span><\/h2>\n<p style=\"padding-left: 60px;\">For all user(s) that cannot follow recommendations from Microsoft are urged to use a different web browser. \u00a0For secure download(s) of <strong>Google <a title=\"Download Chrome\" href=\"https:\/\/www.google.com\/intl\/en\/chrome\/browser\/\">Chrome<\/a><\/strong>\u00a0or <strong>Mozilla <a title=\"Download Firefox\" href=\"http:\/\/www.mozilla.org\/en-US\/firefox\/new\/?f=31&amp;utm_expid=71153379-28.SNKFJ4VqRziIW1TLqjhpAw.2&amp;utm_referrer=https%3A%2F%2Fwww.google.com%2F\">Firefox<\/a><\/strong>, please follow the links provided.<\/p>\n<h3 style=\"text-align: center;\"><span style=\"color: #ff6600;\">For assistance with Changing IE Settings or Install a new Browser<\/span><\/h3>\n<h3 style=\"text-align: center;\"><span style=\"color: #ff6600;\"><strong>\u00a0<\/strong><strong>please contact us 856-745-9990 or\u00a0<a title=\"click here\" href=\"http:\/\/southjerseytechies.net\/contact.php\"><span style=\"color: #ff6600;\">click here<\/span><\/a>.<\/strong><\/span><\/h3>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IMPORTANT INFORMATION:\u00a0US-CERT and UK security agencies warn users to stop using Internet Explorer because of the severity in this security hole that has been used in &#8220;limited, targeted attacks&#8221;. United States Computer Emergency Readiness Team released an alert on April &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[107,45,103],"tags":[622,514,94,918,180,93,87,1464,916,917],"class_list":["post-6176","post","type-post","status-publish","format-standard","hentry","category-news","category-quick-reference-guides","category-tips-info","tag-applications","tag-chrome","tag-firefox","tag-ie","tag-internet","tag-internet-explorer","tag-microsoft","tag-security","tag-us-cert","tag-vulnerable"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>South Jersey Techies - Important: Internet Explorer Vulnerability<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"South Jersey Techies - Important: Internet Explorer Vulnerability\" \/>\n<meta property=\"og:description\" content=\"IMPORTANT INFORMATION:\u00a0US-CERT and UK security agencies warn users to stop using Internet Explorer because of the severity in this security hole that has been used in &#8220;limited, targeted attacks&#8221;. United States Computer Emergency Readiness Team released an alert on April &hellip;Continue Reading&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2014-04-30T18:52:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-07-17T12:50:00+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\"},\"headline\":\"Important: Internet Explorer Vulnerability\",\"datePublished\":\"2014-04-30T18:52:58+00:00\",\"dateModified\":\"2018-07-17T12:50:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/\"},\"wordCount\":352,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png\",\"keywords\":[\"Applications\",\"Chrome\",\"Firefox\",\"IE\",\"Internet\",\"Internet Explorer\",\"Microsoft\",\"Security\",\"US-CERT\",\"Vulnerable\"],\"articleSection\":[\"News\",\"Quick Reference Guides\",\"Tips &amp; Info\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/\",\"name\":\"South Jersey Techies - Important: Internet Explorer Vulnerability\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png\",\"datePublished\":\"2014-04-30T18:52:58+00:00\",\"dateModified\":\"2018-07-17T12:50:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#primaryimage\",\"url\":\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png\",\"contentUrl\":\"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Important: Internet Explorer Vulnerability\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"South Jersey Techies - Important: Internet Explorer Vulnerability","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/","og_locale":"en_US","og_type":"article","og_title":"South Jersey Techies - Important: Internet Explorer Vulnerability","og_description":"IMPORTANT INFORMATION:\u00a0US-CERT and UK security agencies warn users to stop using Internet Explorer because of the severity in this security hole that has been used in &#8220;limited, targeted attacks&#8221;. United States Computer Emergency Readiness Team released an alert on April &hellip;Continue Reading&rarr;","og_url":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2014-04-30T18:52:58+00:00","article_modified_time":"2018-07-17T12:50:00+00:00","og_image":[{"url":"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png","type":"","width":"","height":""}],"author":"Website Admin","twitter_card":"summary_large_image","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f"},"headline":"Important: Internet Explorer Vulnerability","datePublished":"2014-04-30T18:52:58+00:00","dateModified":"2018-07-17T12:50:00+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/"},"wordCount":352,"commentCount":0,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#primaryimage"},"thumbnailUrl":"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png","keywords":["Applications","Chrome","Firefox","IE","Internet","Internet Explorer","Microsoft","Security","US-CERT","Vulnerable"],"articleSection":["News","Quick Reference Guides","Tips &amp; Info"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/","url":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/","name":"South Jersey Techies - Important: Internet Explorer Vulnerability","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#primaryimage"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#primaryimage"},"thumbnailUrl":"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png","datePublished":"2014-04-30T18:52:58+00:00","dateModified":"2018-07-17T12:50:00+00:00","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#primaryimage","url":"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png","contentUrl":"http:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2014\/04\/IE.png"},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/important-internet-explorer-vulnerability\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Important: Internet Explorer Vulnerability"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/support\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-1BC","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/6176","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=6176"}],"version-history":[{"count":5,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/6176\/revisions"}],"predecessor-version":[{"id":12029,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/6176\/revisions\/12029"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=6176"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=6176"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=6176"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}