{"id":621,"date":"2024-04-05T15:40:01","date_gmt":"2024-04-05T15:40:01","guid":{"rendered":"https:\/\/cwatch.comodo.com\/blog\/?p=621"},"modified":"2024-05-28T18:56:34","modified_gmt":"2024-05-28T18:56:34","slug":"ddos-in-a-nutshell","status":"publish","type":"post","link":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/","title":{"rendered":"DDoS In A Nutshell: DDoS Attack Protection, Prevention, Attack Types, and Mitigation Methods"},"content":{"rendered":"<h2>What is a Distributed Denial of Service (DDoS) Attack?<\/h2>\n<p>Distributed Denial of Service (DDoS) is a major threat to your website. Here\u00e2\u20ac\u2122s why\u00e2\u20ac\u00a6<\/p>\n<p><strong>DDoS attacks<\/strong> target websites and businesses of every size, including individual live streamers.<\/p>\n<p>With more than 50 million attacks every year, they\u00e2\u20ac\u2122re on the rise and growing in frequency, strength, and hacktivism.<\/p>\n<p>That\u00e2\u20ac\u2122s almost two attacks for every second of each day in a year!<\/p>\n<p>The attacks have increased by 125 percent year-on-year with a 35% jump in attack duration, lasting between 6-24 hours.<\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/onboard-buyer-journey\/?product_plan=pro&amp;track=10110\u00c2\u00a4cy&amp;af=10110\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-pro-new.png\" alt=\"cWatch Pro\" \/><\/a><\/p>\n<h2>What Does DDoS Mean?<\/h2>\n<p>With the emergence of the IoT, <strong>DDoS attacks<\/strong> have seen even higher traffic rates.<\/p>\n<p>They account for a staggering one-third of all website downtime and can be purchased for as low as $150 on the black market.<\/p>\n<p>In a nutshell, DDoS attacks have existed for years, but now they\u00e2\u20ac\u2122ve evolved to be more devastating and easier to launch than ever before.<\/p>\n<p>As cyber criminals develop more destructive techniques, everyone who uses the internet should learn about DDoS attacks and how to protect against them.<\/p>\n<h2><strong>How Do DDoS Attacks Occur?<\/strong><\/h2>\n<p>DDoS attacks disrupt normal operations by destroying performance and availability. How?<\/p>\n<p>At its most basic level, a <a href=\"https:\/\/cwatch.comodo.com\/what-is-a-ddos-attack\/\" target=\"_blank\" rel=\"noopener\">DDoS attack<\/a> overwhelms your website with so much traffic that your website becomes slow, unresponsive, and ultimately crashes.<\/p>\n<p>To orchestrate this symphony of traffic, a hacker uses a remotely controlled device that has already been infected, otherwise known as a bot, short for robot.<\/p>\n<p>A collection of these infected devices are called botnets<\/p>\n<p>Basically, an army of <a title=\"Remote Access\" href=\"https:\/\/remoteaccess.itarian.com?product_plan=pro&amp;track=10110\" target=\"_blank\" rel=\"noopener noreferrer\">remote control<\/a> zombies is ready to disable or destroy any system in its path.<\/p>\n<p>Unfortunately, the bad news doesn\u00e2\u20ac\u2122t end there because not all DDoS attacks come from botnets.<\/p>\n<h2><strong>Types Of DDoS Attacks\u00a0<\/strong><\/h2>\n<p>DDoS attacks can fall into three broad categories, depending on the attack.<\/p>\n<p>1. Volumetric Attacks (also known as Network-Centric Attacks)<br \/>\na. The most common types of DDoS attacks<br \/>\nb. Use botnets to consume bandwidth<br \/>\nc. Examples include NTP Amplification, DNS Amplification, UDP Flood, TCP Flood<\/p>\n<p>2. State-Exhaustion Attacks (also known as Protocol Attacks)<br \/>\na. Exploits a weakness in the Layer 3 and Layer 4 protocol stack<br \/>\nb. Targets the connection state in firewalls, web application servers, load balancers<br \/>\nc. Examples include Syn Flood, Ping of Death<\/p>\n<p>3. Application-Layer Attacks<br \/>\na. The most sophisticated of attacks and most challenging to identify\/mitigate<br \/>\nb. Operated by a single machine, it\u00e2\u20ac\u2122s very stealthy and able to fly &#8220;under the radar&#8221;<br \/>\nc. Examples include HTTP Flood, Attack on DNS Services, HTTPS, and SMTP<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>DDoS Protection &#8211; Tips to Prevent Against DDoS attacks<\/strong><\/h2>\n<p>Here are some security measures for successful <a href=\"https:\/\/cwatch.comodo.com\/website-security\/ddos-attack-protection.php\" target=\"_blank\" rel=\"noopener noreferrer\">DDoS protection<\/a>:<\/p>\n<p><strong>1. Extra Bandwidth:<\/strong> An effective way to enhance <strong>DDoS protection<\/strong> is by increasing the bandwidth available for your web server. This allows your website to handle sudden and unexpected surges in traffic. However, this is more of a buffer than a complete solution providing critical time to act before your resources are overwhelmed.<\/p>\n<p><strong>2. Defend Network Perimeter<\/strong>: You can also enhance your network&#8217;s defense perimeter by taking additional security measures such as<\/p>\n<p>i) rate-limiting your router to prevent web server overwhelming<br \/>\nii) dropping spoofed or malformed packages<br \/>\niii) set lower SYN, ICMP, and UDP flood up thresholds<\/p>\n<p>However, this is very technical and will require some level of <a href=\"https:\/\/mdr.xcitium.com\/incident-handling\/\" target=\"_blank\" rel=\"noopener noreferrer\">incident handling<\/a> knowledge to effectively respond to DDoS attacks.<\/p>\n<p><strong>3. DDoS Specialist:<\/strong> Another option is to hire a DDoS specialist who can save you from the attack during the time of crisis. However, this will require deep pockets as it is very costly.<\/p>\n<p><strong>4. cWatch Web: <\/strong>Since the above options may not be in your budget or scope of knowledge, cWatch Web arms you with DDoS protection as a turnkey defense system. This <a href=\"https:\/\/cwatch.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">web security solution<\/a> comes equipped with the cure, the prevention, and live 24\/7\/365 assistance.<\/p>\n<p><a class=\"get_started_cta\" href=\"https:\/\/cwatch.comodo.com\/free-malware-removal-form.php?af=9679\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-website-security.jpg\" alt=\"website-security\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is a Distributed Denial of Service (DDoS) Attack? Distributed Denial of Service (DDoS) is a major threat to your website. Here\u00e2\u20ac\u2122s why\u00e2\u20ac\u00a6 DDoS attacks target websites and businesses of every size, including individual live streamers. With more than 50 million attacks every year, they\u00e2\u20ac\u2122re on the rise and growing in frequency, strength, and hacktivism. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":631,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-621","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>DDoS In A Nutshell | DDoS Attack Protection<\/title>\n<meta name=\"description\" content=\"DDOS in a nutshell protection prevents the destruction of the performance and availability of websites. To Know DDoS Attack Types and Mitigation Methods.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"DDoS In A Nutshell | DDoS Attack Protection\" \/>\n<meta property=\"og:description\" content=\"DDOS in a nutshell protection prevents the destruction of the performance and availability of websites. To Know DDoS Attack Types and Mitigation Methods.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/\" \/>\n<meta property=\"og:site_name\" content=\"cWatch Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-04-05T15:40:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-28T18:56:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"751\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seoindia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\"},\"headline\":\"DDoS In A Nutshell: DDoS Attack Protection, Prevention, Attack Types, and Mitigation Methods\",\"datePublished\":\"2024-04-05T15:40:01+00:00\",\"dateModified\":\"2024-05-28T18:56:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/\"},\"wordCount\":635,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/\",\"name\":\"DDoS In A Nutshell | DDoS Attack Protection\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg\",\"datePublished\":\"2024-04-05T15:40:01+00:00\",\"dateModified\":\"2024-05-28T18:56:34+00:00\",\"description\":\"DDOS in a nutshell protection prevents the destruction of the performance and availability of websites. To Know DDoS Attack Types and Mitigation Methods.\",\"breadcrumb\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#primaryimage\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg\",\"width\":751,\"height\":351,\"caption\":\"DDOS Attack Protection - Website Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cwatch.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"DDoS In A Nutshell: DDoS Attack Protection, Prevention, Attack Types, and Mitigation Methods\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"name\":\"cWatch Blog\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\",\"name\":\"cWatch Blog\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"width\":106,\"height\":52,\"caption\":\"cWatch Blog\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/x.com\/seoindia\"],\"url\":\"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"DDoS In A Nutshell | DDoS Attack Protection","description":"DDOS in a nutshell protection prevents the destruction of the performance and availability of websites. To Know DDoS Attack Types and Mitigation Methods.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/","og_locale":"en_US","og_type":"article","og_title":"DDoS In A Nutshell | DDoS Attack Protection","og_description":"DDOS in a nutshell protection prevents the destruction of the performance and availability of websites. To Know DDoS Attack Types and Mitigation Methods.","og_url":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/","og_site_name":"cWatch Blog","article_published_time":"2024-04-05T15:40:01+00:00","article_modified_time":"2024-05-28T18:56:34+00:00","og_image":[{"width":751,"height":351,"url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg","type":"image\/jpeg"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@seoindia","twitter_misc":{"Written by":"Admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#article","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/"},"author":{"name":"Admin","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d"},"headline":"DDoS In A Nutshell: DDoS Attack Protection, Prevention, Attack Types, and Mitigation Methods","datePublished":"2024-04-05T15:40:01+00:00","dateModified":"2024-05-28T18:56:34+00:00","mainEntityOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/"},"wordCount":635,"commentCount":0,"publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg","articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/","url":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/","name":"DDoS In A Nutshell | DDoS Attack Protection","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#primaryimage"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg","datePublished":"2024-04-05T15:40:01+00:00","dateModified":"2024-05-28T18:56:34+00:00","description":"DDOS in a nutshell protection prevents the destruction of the performance and availability of websites. To Know DDoS Attack Types and Mitigation Methods.","breadcrumb":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#primaryimage","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/37.jpg","width":751,"height":351,"caption":"DDOS Attack Protection - Website Security"},{"@type":"BreadcrumbList","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/ddos-in-a-nutshell\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwatch.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"DDoS In A Nutshell: DDoS Attack Protection, Prevention, Attack Types, and Mitigation Methods"}]},{"@type":"WebSite","@id":"https:\/\/cwatch.comodo.com\/blog\/#website","url":"https:\/\/cwatch.comodo.com\/blog\/","name":"cWatch Blog","description":"Just another WordPress site","publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cwatch.comodo.com\/blog\/#organization","name":"cWatch Blog","url":"https:\/\/cwatch.comodo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","width":106,"height":52,"caption":"cWatch Blog"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/x.com\/seoindia"],"url":"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/"}]}},"_links":{"self":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/621","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=621"}],"version-history":[{"count":20,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/621\/revisions"}],"predecessor-version":[{"id":21101,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/621\/revisions\/21101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media\/631"}],"wp:attachment":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=621"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=621"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=621"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}