{"id":12844,"date":"2025-04-28T04:39:23","date_gmt":"2025-04-28T11:39:23","guid":{"rendered":"https:\/\/www.coretechnologies.com\/blog\/?p=12844"},"modified":"2025-04-28T04:39:23","modified_gmt":"2025-04-28T11:39:23","slug":"secure-software-practices","status":"publish","type":"post","link":"https:\/\/www.coretechnologies.com\/blog\/company\/secure-software-practices\/","title":{"rendered":"Q&#038;A: How Do You Make Sure Your Software Is Secure?"},"content":{"rendered":"<div align=\"center\"><img loading=\"lazy\" decoding=\"async\" class=\"no-lazy-load\" src=\"\/blog\/images\/qa-security-practices.webp\" style=\"margin-bottom:20px;\" title=\"What Do You Do Make Sure Your Software Is Safe\/Secure?\" alt=\"What Do You Do Make Sure Your Software Is Safe\/Secure?\" border=\"0\" width=\"380\" height=\"160\" \/><\/div>\n<div class=\"blog-qa-question-box\">\n<img loading=\"lazy\" decoding=\"async\" class=\"no-lazy-load\" src=\"https:\/\/cdn.coretechnologies.com\/images\/quotes-transparent-21x21.webp\" width=\"21\" height=\"21\" \/>&nbsp;&nbsp;We&#8217;re conducting an evaluation of your software from a security perspective and have some questions that we&#8217;d like to address to ensure it meets our requirements. To start, can you please explain what your company does to make sure that your software and office infrastructure are free of viruses and malware?<\/p>\n<p align=\"right\">&mdash; Kimberly Z.<\/p>\n<\/div>\n<p>Hi, Kimberly.<\/p>\n<p>Even though we&#8217;re a tiny company, security is a big deal around here.<\/p>\n<p>Most importantly, we realize that our number one job is to keep customers like you safe, and that our reputation as a trusted, secure software partner depends on doing that.<\/p>\n<p>But it&#8217;s not only about protecting our commercial software. Yes, securing our code is very important, but so are the emails we send, the documents we share and the order information we collect. The truth is that all parts of our business must meet a high standard of privacy and security to fulfill our obligations to the hundreds of companies that have put their faith in us.<\/p>\n<p>So let&#8217;s dig into the details of our security program to answer your questions. Here are a dozen things that we do to make sure that we are good stewards of your trust.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">1. We digitally sign all our products<\/h2>\n<p>When you download a program over the internet, how can you be sure that it&#8217;s authentic? That it comes to you straight from the authors &mdash; and wasn&#8217;t doctored to include a virus or malware?<\/p>\n<p>To make sure that you receive our applications tamper-free, we <a href=\"https:\/\/en.wikipedia.org\/wiki\/Code_signing\" target=\"_blank\">code sign<\/a> all our executables. That way when you see our company information prominently displayed, you can rest assured that what you&#8217;re installing is valid and intact.<\/p>\n<p>Windows will prompt you with our company information when you&#8217;re installing one of our programs:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/alwaysup-uac-prompt-verified.png\" class=\"zoomPopup\" title=\"AlwaysUp is code signed secure software\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/alwaysup-uac-prompt-verified.png\" title=\"AlwaysUp is code signed secure software (click to enlarge)\" alt=\"AlwaysUp is code signed secure software\" border=\"1\" style=\"border-color:#d0d0d0\" \/><\/a><\/div>\n<p>And you&#8217;ll always find our digital certificate when you view the properties of any of our secure software:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/core-technologies-consulting-digital-certificate.png\" class=\"zoomPopup\" title=\"Core Technologies Consulting: Digital certificate\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/core-technologies-consulting-digital-certificate.png\" title=\"Core Technologies Consulting: Digital certificate (click to enlarge)\" alt=\"Core Technologies Consulting: Digital certificate\" border=\"0\" \/><\/a><\/div>\n<p>We should also mention that our company only deploys higher-grade <a href=\"https:\/\/en.wikipedia.org\/wiki\/Extended_Validation_Certificate\" target=\"_blank\">Extended Validation (EV)<\/a> code signing certificates, which are subject to additional validation and technical requirements. Because of their stringent requirements, only verified, legitimate companies are granted EV certificates.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">2. We virus-check every software release<\/h2>\n<p>It&#8217;s very important to check for viruses at every stage of the software production pipeline. And, most importantly, the final product must be pristine. That&#8217;s why we engage third-party services to verify that nothing strange has crept into our software.<\/p>\n<p><a href=\"https:\/\/www.virustotal.com\/\" target=\"_blank\">Virustotal<\/a> &mdash; a well-respected online virus-scanning engine owned by Google &mdash; is our tool of choice in this area. We run all our applications through Virustotal &mdash; and we don&#8217;t release if it detects any oddities.<\/p>\n<p>For example, you can see the results of checking Service Protector <a href=\"https:\/\/www.virustotal.com\/gui\/url\/4a84e1b2c6af9d998d509de99e6fd8857bf8871df54692bae95015a838c51d21\" target=\"_blank\">here<\/a>. None of the 96 virus scanners found a problem: <\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/service-protector-virustotal-summary.png\" class=\"zoomPopup\" title=\"Service Protector Virustotal Summary\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/service-protector-virustotal-summary.png\" title=\"Service Protector Virustotal Summary (click to enlarge)\" alt=\"Service Protector Virustotal Summary\" border=\"1\" style=\"border-color:#d0d0d0\" width=\"520\" \/><\/a><\/div>\n<p>In addition to Virustotal, we also rely on <a href=\"https:\/\/www.download3k.com\/\" target=\"_blank\">Download3K<\/a>. They regularly verify our programs with popular antivirus engines, including <a href=\"https:\/\/www.mcafee.com\/en-us\/antivirus.html\" target=\"_blank\">McAfee<\/a>, <a href=\"https:\/\/www.avast.com\/\" target=\"_blank\">Avast<\/a> and <a href=\"https:\/\/www.avira.com\/en\/free-antivirus-windows\" target=\"_blank\">Avira<\/a>.<\/p>\n<p>As you can see below, Download3K&#8217;s <a href=\"https:\/\/www.download3k.com\/Antivirus-Report-Service-Protector.html\" target=\"_blank\">Service Protector Antivirus Report<\/a> shows no trouble either:<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/serviceprotector-download3k-antivirus-summary.png\" class=\"zoomPopup\" title=\"Service Protector Antivirus Report\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/serviceprotector-download3k-antivirus-summary.png\" title=\"Service Protector Antivirus Report (click to enlarge)\" alt=\"Service Protector Antivirus Report\" border=\"1\" style=\"border-color:#d0d0d0\" width=\"520\" \/><\/a><\/div>\n<p>Note that in the unusual circumstance where one of the antivirus scanners actually raises a flag with our software (or site), it usually turns out to be a false alarm. To resolve the issue, we promptly <a href=\"https:\/\/forums.malwarebytes.com\/topic\/319631-4579160212\/\" target=\"_blank\">report the details to the antivirus manufacturer<\/a> and they update their scanners to fix the problem. That happens once or twice a year &mdash; often after we publish a new release.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">3. We&#8217;re trained in secure coding practices<\/h2>\n<div align=\"center\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/owasp-top-ten-logo.webp\" title=\"We're trained in the OWASP Top Ten\" alt=\"We're trained in the OWASP Top Ten\" border=\"0\" \/><\/div>\n<p>Our team of senior engineers is well versed in secure coding techniques. Indeed, we&#8217;ve seen a lot of exploits over the past 20+ years!<\/p>\n<p>But new threats are constantly emerging and resting on our experience is not an option.<\/p>\n<p>To keep us on our toes, regular developer training focuses on the <a href=\"https:\/\/www.owasptopten.org\/\" target=\"_blank\">OWASP Top Ten<\/a> and covers common issues like:<\/p>\n<ul style=\"margin-bottom:24px\">\n<li>Buffer overflows<\/li>\n<li>SQL injection<\/li>\n<li>Input validation and sanitization<\/li>\n<li>Cross-Site Scripting (XSS)<\/li>\n<\/ul>\n<p>Everyone on the technical team must participate.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">4. We review 100% of our code for security issues<\/h2>\n<div align=\"center\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/security-code-review.webp\" title=\"We do security code reviews\" alt=\"We do security code reviews\" border=\"0\" \/><\/div>\n<p>With our deeper understanding of the pitfalls associated with developing secure software, all code changes must be double-checked for quality, accuracy, and security before committing the updates to our repository. Quite often, that second look identifies <a href=\"https:\/\/en.wikipedia.org\/wiki\/Edge_case\" target=\"_blank\">edge cases<\/a> which we must cover prior to release, so it&#8217;s well worth the investment.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">5. We keep third-party libraries up to date for security<\/h2>\n<div align=\"center\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/update-software-libraries.webp\" title=\"We update third-party libraries for security\" alt=\"We update third-party libraries for security\" border=\"0\" \/><\/div>\n<p>As part of good software hygiene, we regularly update third-party libraries and tools to fix relevant security vulnerabilities. All dependencies are checked at least once per year.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">6. We patch our computers regularly<\/h2>\n<div align=\"center\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/apply-operating-system-patches.webp\" title=\"We patch our computers regularly\" alt=\"We patch our computers regularly\" border=\"0\" \/><\/div>\n<p>While bulletproofing our code is essential, it&#8217;s just as important to secure the supporting systems. That&#8217;s why we make it a point to apply operating system patches on a regular basis.<\/p>\n<p>In general:<\/p>\n<ol style=\"margin-bottom:24px\">\n<li>Patches to fix critical vulnerabilities are applied as soon as possible &mdash; automatically if possible and usually within 30 days.<\/li>\n<li>On Linux, high, medium and low vulnerabilities are addressed as part of quarterly updates.<\/li>\n<li>We update Windows machines at least monthly (after <a href=\"https:\/\/en.wikipedia.org\/wiki\/Patch_Tuesday\" target=\"_blank\">Patch Tuesday<\/a>).<\/li>\n<\/ol>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">7. We protect all our PC&#8217;s with auto-updating antivirus software<\/h2>\n<p>All our Windows machines are protected by <a href=\"https:\/\/www.microsoft.com\/en-us\/windows\/comprehensive-security\" target=\"_blank\">Microsoft Defender Antivirus<\/a>, often in conjunction with well-known anti-malware packages like <a href=\"https:\/\/www.avira.com\/en\/free-antivirus-windows\" target=\"_blank\">Avira Free Antivirus<\/a> or <a href=\"https:\/\/www.malwarebytes.com\/solutions\/virus-scanner\" target=\"_blank\">Malwarebytes<\/a>.<\/p>\n<div align=\"center\"><a href=\"\/blog\/images\/windows-security-virus-threat-protection.webp\" class=\"zoomPopup\" title=\"Windows security virus and threat protection\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/windows-security-virus-threat-protection.webp\" title=\"Windows security virus and threat protection (click to enlarge)\" alt=\"Windows security virus and threat protection\" border=\"0\" \/><\/a><\/div>\n<p>Virus definition files are updated automatically and manual scans are performed at least once per year (and whenever anything suspicious happens).<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">8. Everyone attends annual security training<\/h2>\n<div align=\"center\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/data-security-and-privacy-training.webp\" title=\"Everyone takes Data Security and Privacy training\" alt=\"Everyone takes Data Security and Privacy training\" border=\"1\" width=\"520\" style=\"border-color:#d0d0d0\"\/><\/div>\n<p>Each year, our entire staff must attend information security training. The most recent sessions focused on the major threats and defenses relevant to online businesses, including:<\/p>\n<ul style=\"margin-bottom:24px\">\n<li>Phishing<\/li>\n<li>Password hygiene<\/li>\n<li>Multi Factor Authentication (MFA)<\/li>\n<li>Ransomware<\/li>\n<li>Data security and privacy<\/p>\n<\/li>\n<\/ul>\n<p>Side note: If you&#8217;re looking for free, high-quality security training modules for your small business be sure to check out <a href=\"https:\/\/www.cyber101.com\/training\" target=\"_blank\">Cyber101.com<\/a>. Their courses are friendly and concise &mdash; and the short quizzes after each module do a good job of measuring the learning.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">9. We subscribe to industry security alerts<\/h2>\n<div align=\"center\"><img decoding=\"async\" class=\"image-padding\" src=\"\/blog\/images\/cisa-logo.webp\" title=\"We subscribe to CISA alerts\" alt=\"We subscribe to CISA alerts\" border=\"0\" \/><\/div>\n<p>It&#8217;s important to be aware of the threat landscape and get an early warning of what other businesses are facing. That&#8217;s why we subscribe to several well respected security sources, which keep us in the loop on cyberattacks, ransomware and much more.<\/p>\n<p>Our team relies on timely alerts from:<\/p>\n<ul style=\"margin-bottom:24px\">\n<li><a href=\"https:\/\/www.cisa.gov\/\" target=\"_blank\">Cybersecurity and Infrastructure Security Agency (CISA)<\/a><\/li>\n<li><a href=\"https:\/\/www.securityweek.com\/\" target=\"_blank\">SecurityWeek<\/a><\/li>\n<li><a href=\"https:\/\/www.ncsc.gov.uk\" target=\"_blank\">National Cyber Security Centre (NCSC)<\/a><\/li>\n<li><a href=\"https:\/\/blog.knowbe4.com\/\" target=\"_blank\">KnowBe4<\/a><\/li>\n<\/ul>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">10. We&#8217;re trained in the ISO 27001 information security framework<\/h2>\n<div align=\"center\"><img decoding=\"async\" src=\"\/blog\/images\/lead-implelenter-badge-200x200.png\" class=\"image-padding\" title=\"Certified ISO 27001:2022 ISMS Lead Implementer Training\" alt=\"Certified ISO 27001:2022 ISMS Lead Implementer Training\" border=\"0\" \/><\/div>\n<p>In 2025, the chief security principal at Core Technologies Consulting completed <a href=\"https:\/\/www.itgovernanceusa.com\/shop\/product\/certified-iso-270012022-isms-lead-implementer-training-course\" target=\"_blank\">Certified ISO 27001 ISMS Lead Implementer Training<\/a>. The in-depth, 3-day course focused on designing an information security management system (ISMS) and a framework for its continual management and improvement.<\/p>\n<p>The knowledge obtained from the coursework guides our corporate activities &mdash; pushing us to maintain confidentiality, integrity and accuracy in everything that we do. <\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">11. We&#8217;ve documented (and enforce) our data privacy obligations<\/h2>\n<div align=\"center\"><img decoding=\"async\" src=\"\/blog\/images\/privacy-policy.webp\" class=\"image-padding\" title=\"We've documented our privacy obligations\" alt=\"We've documented our privacy obligations\" border=\"1\" style=\"border-color:#d0d0d0\" \/><\/div>\n<p>Core Technologies Consulting is committed to protecting your privacy. <b>We will never sell, market or abuse your information.<\/b><\/p>\n<p>In fact, the limited information we collect when you purchase our software (name and email address) is used only to process your order, notify you of your order status, and assist you after your purchase. Please see our  <a href=\"\/company\/privacy.html\">privacy policy<\/a> for additional details.<\/p>\n<hr class=\"blog-section\">\n<h2 class=\"blog-caption-numbered\">12. We&#8217;ve created an information security program<\/h2>\n<div align=\"center\"><img decoding=\"async\" src=\"\/blog\/images\/isms.webp\" class=\"image-padding\" title=\"We've created an information security program\" alt=\"We've created an information security program\" border=\"1\" style=\"border-color:#d0d0d0\" \/><\/div>\n<p>Even though we&#8217;re a tiny company, we felt that it was important to create an information security program to guide our work.<\/p>\n<p>All employees and independent contractors must read, acknowledge and abide by our ISO 27001-aligned information security policy. We do that because we understand that information security decisions extend well beyond the bounds of the IT department. Everyone is responsible for security.<\/p>\n<hr class=\"blog-section\">\n<p style=\"margin-top:30px\">\nHopefully this gives you a better understanding of how we infuse security best practices throughout our company. Thanks again for your question, and, of course, please be sure to <a href=\"\/support\/\">get in touch<\/a> if you have any other questions about our security posture or practices.\n<\/p>\n<div style=\"margin-top:30px\" align=\"center\">\n<div class=\"cta-button-1\">\n<table role=\"presentation\" cellspacing=\"0\" cellpadding=\"0\" border=\"0\" align=\"left\">\n<tbody>\n<tr>\n<td align=\"center\"><a href=\"\/blog\/tag\/security\/\" title=\"More articles about security\"><span><nobr>More articles about security&#8230;<\/nobr><\/span><\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<\/div>\n<!-- relpost-thumb-wrapper --><div class=\"relpost-thumb-wrapper\"><!-- filter-class --><div class=\"relpost-thumb-container\"><style>.relpost-block-single-image, .relpost-post-image { margin-bottom: 10px; }<\/style><h3>You may also like...<\/h3><div style=\"clear: both\"><\/div><div style=\"clear: both\"><\/div><!-- relpost-block-container --><div class=\"relpost-block-container relpost-block-column-layout\" style=\"--relposth-columns: 3;--relposth-columns_t: 2; --relposth-columns_m: 2\"><a href=\"https:\/\/www.coretechnologies.com\/blog\/windows\/is-auto-logon-safe\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"Is it Safe to Automatically Log In to my Computer?\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/login-password-150x150-1.webp\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">Is it Safe to Automatically Log In to my Computer?<\/h2><\/div><\/div><\/a><a href=\"https:\/\/www.coretechnologies.com\/blog\/alwaysup\/rename-service\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"Q&amp;A: How do I Rename my Application\/Service in AlwaysUp?\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/rename-150x150.png\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">Q&amp;A: How do I Rename my Application\/Service in AlwaysUp?<\/h2><\/div><\/div><\/a><a href=\"https:\/\/www.coretechnologies.com\/blog\/windows\/microsoft-smartscreen-filter\/\"class=\"relpost-block-single\" ><div class=\"relpost-custom-block-single\"><img decoding=\"async\" loading=\"lazy\" class=\"relpost-block-single-image\" alt=\"Why Does Windows SmartScreen Flag Our Software?\"  src=\"https:\/\/www.coretechnologies.com\/blog\/wp-content\/uploads\/smartscreen-150x150.png\" style=\"aspect-ratio:1\/1\" style=\"aspect-ratio:1\/1\"><\/img><div class=\"relpost-block-single-text\"  style=\"height: 75px;font-family: Arial;  font-size: 12px;  color: #333333;\"><h2 class=\"relpost_card_title\">Why Does Windows SmartScreen Flag Our Software?<\/h2><\/div><\/div><\/a><\/div><!-- close relpost-block-container --><div style=\"clear: both\"><\/div><\/div><!-- close filter class --><\/div><!-- close relpost-thumb-wrapper -->","protected":false},"excerpt":{"rendered":"<p>&nbsp;&nbsp;We&#8217;re conducting an evaluation of your software from a security perspective and have some questions that we&#8217;d like to address to ensure it meets our requirements. To start, can you please explain what your company does to make sure that &hellip; <a href=\"https:\/\/www.coretechnologies.com\/blog\/company\/secure-software-practices\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":12851,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[312],"tags":[26,31,368,280,378,143,369,147,377],"class_list":["post-12844","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-company","tag-alwaysup-tag","tag-antivirus","tag-code-review","tag-code-signing","tag-iso-27001","tag-security","tag-security-alerts","tag-service-protector-tag","tag-threat-detection"],"_links":{"self":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/12844","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/comments?post=12844"}],"version-history":[{"count":35,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/12844\/revisions"}],"predecessor-version":[{"id":12970,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/posts\/12844\/revisions\/12970"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/media\/12851"}],"wp:attachment":[{"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/media?parent=12844"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/categories?post=12844"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.coretechnologies.com\/blog\/wp-json\/wp\/v2\/tags?post=12844"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}