{"id":866,"date":"2018-04-18T16:18:42","date_gmt":"2018-04-18T16:18:42","guid":{"rendered":"http:\/\/hlrnet.com\/sites\/?page_id=866"},"modified":"2026-04-18T12:30:36","modified_gmt":"2026-04-18T12:30:36","slug":"internet-veiligheid","status":"publish","type":"page","link":"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/","title":{"rendered":"Internet: veiligheid"},"content":{"rendered":"<span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span><p>De belangrijkste bedreigingen zijn virussen (zie ook <a href=\"https:\/\/hlrnet.com\/sites\/virusbeveiliging\/\">hier<\/a>), inbraak en kaping, adware\/spyware\/parasieten, encryptie software \/ ransomware, hoaxen, phishing, en (<strong>nummer 1!<\/strong>) de domheid van de gebruiker.<\/p>\n<p>The most important threads are viruses (see also <a href=\"https:\/\/hlrnet.com\/sites\/virusbeveiliging\/\"> here<\/a>), intrusion and hijacking, adware\/spyware\/parasites, encrypters\/ransomware, phishing, stupidity of the user.<\/p>\n<p>Start hier. Start here.<\/p>\n<ul>\n<li>Te lezen. To read\n<ul>\n<li><a href=\"https:\/\/browserleaks.com\/\">Browserleaks<\/a><\/li>\n<li><a href=\"https:\/\/www.cert.ssi.gouv.fr\/\">CERT-FR<\/a><\/li>\n<li><a href=\"https:\/\/csrc.nist.gov\/\">Computer Security Resource Center<\/a> (CSRS &#8211; NIST)<\/li>\n<li><a href=\"https:\/\/www.cybersecuritycoalition.be\/\">Cyber Security Coalition (BE)<\/a><\/li>\n<li><a href=\"https:\/\/www.cyberpesten.be\/\">Cyberpesten<\/a><\/li>\n<li><a href=\"https:\/\/www.darkreading.com\/\">Dark Reading<\/a><\/li>\n<li><a href=\"https:\/\/digitalshadows.com\/\">Digital Shadows<\/a><\/li>\n<li><strong><a href=\"https:\/\/admin.kuleuven.be\/icts\/e-mune\">E-mune<\/a><\/strong> (KU Leuven)<\/li>\n<li><a href=\"https:\/\/www.eff.org\/\">EFF: electronic Frontier Foundation<\/a>\n<ul>\n<li><a href=\"https:\/\/coveryourtracks.eff.org\/\">Cover Your Tracks<\/a><\/li>\n<li><a href=\"https:\/\/ssd.eff.org\/\">Surveillance Self-Defense<\/a><\/li>\n<li>and <a href=\"https:\/\/amiunique.org\/\">Am I Unique?<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.fraudehelpdesk.nl\/\">Fraudehelpdesk.nl<\/a><\/li>\n<li><a href=\"https:\/\/www.getsafeonline.org\/\">Get Safe Online<\/a><\/li>\n<li><a href=\"https:\/\/foundation.mozilla.org\/en\/internet-health\/\">Internet Health<\/a><\/li>\n<li><a href=\"https:\/\/www.ic3.gov\/\">IC3<\/a><\/li>\n<li><a href=\"https:\/\/www.ikeepsafe.org\/\">iKeepSafe<\/a><\/li>\n<li><a href=\"https:\/\/blog.intego.com\/\">Intego: Mac security blog<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/\">Krebs on Security<\/a><\/li>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/portal\/threat\/threats.aspx\">Microsoft: Malware Encyclopaedia<\/a><\/li>\n<li><a href=\"https:\/\/www.mydigitalfootprint.com\/\">My Digital Footprint<\/a><\/li>\n<li><strong><a href=\"https:\/\/www.nomoreransom.org\/\">No More Ransom<\/a><\/strong><\/li>\n<li><a href=\"https:\/\/nordlayer.com\/learn\/\">Nordlayer Cybersecurity Learning Center<\/a>: <a href=\"https:\/\/nordlayer.com\/learn\/threats\/\">Cyber threats<\/a><\/li>\n<li><a href=\"https:\/\/www.owasp.org\/\">OWASP<\/a>: the free and open software security community<\/li>\n<li><a href=\"https:\/\/securityboulevard.com\/\">Security Boulevard<\/a><\/li>\n<li><a href=\"https:\/\/portswigger.net\/daily-swig\">The Daily Swig | Cybersecurity news and views<\/a><\/li>\n<li><a href=\"https:\/\/threatpost.com\/\">Threatpost | The first stop for security news<\/a><\/li>\n<li><a href=\"https:\/\/www.thethreatreport.com\/\">The Threat Report<\/a><\/li>\n<li><a href=\"https:\/\/veiliginternetten.nl\/\">Veiliginternetten.nl<\/a><\/li>\n<li><a href=\"https:\/\/www.eccbelgie.be\/themas\/onlineaankopen\/doe-de-webshopcheck\">WebshopCheck<\/a><\/li>\n<li><a href=\"https:\/\/www.welivesecurity.com\/\">Welivesecurity<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Software voor beveiliging\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Microsoft\n<ul>\n<li><a href=\"https:\/\/technet.microsoft.com\/en-us\/security\/cc184924.aspx\">Microsoft Baseline Security Analyzer<\/a> (for IT Pros)<\/li>\n<li><strong><a style=\"font-weight: bold;\" href=\"https:\/\/windows.microsoft.com\/en-US\/windows\/what-is-windows-defender-offline\">Windows Defender Offline<\/a><\/strong><\/li>\n<\/ul>\n<\/li>\n<li>Paswoord managers\n<ul>\n<li><a href=\"https:\/\/1password.com\/\">1Password<\/a><\/li>\n<li><a href=\"https:\/\/bitwarden.com\/\">Bitwarden<\/a><\/li>\n<li><a href=\"https:\/\/www.dashlane.com\/\">Dashlane<\/a><\/li>\n<li><a href=\"https:\/\/jumpcloud.com\">JumpCloud<\/a><\/li>\n<li><a href=\"https:\/\/keepass.info\/\">KeyPass<\/a><\/li>\n<li><a href=\"https:\/\/keepassxc.org\/\">KeePassXC<\/a><\/li>\n<li><a href=\"https:\/\/www.lastpass.com\/\">LastPass<\/a><\/li>\n<li>LogMeOnce<\/li>\n<li><a href=\"https:\/\/nordpass.com\">NordPass<\/a><\/li>\n<li><a href=\"https:\/\/www.roboform.com\">RoboForm<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li><a href=\"https:\/\/zeltser.com\/malicious-ip-blocklists\/\">Blocklists of Suspected Malicious IPs and URLs<\/a><\/li>\n<li><a href=\"https:\/\/wiki.mozilla.org\/Collusion\">Collusion<\/a>: Firefox extensie<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/download\/combofix\/\">Combofix<\/a><\/li>\n<li><a href=\"https:\/\/www.abine.com\/dntdetail.php\">Do Not Track<\/a><\/li>\n<li><a href=\"https:\/\/www.emsisoft.com\/\">Emsisoft<\/a> antimalware<\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/download\/farbar-recovery-scan-tool\/\"><strong>Farbar Recovery Scan Tool<\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.fireeye.com\/\">FireEye<\/a><\/li>\n<li><a href=\"https:\/\/www.glasswire.com\/\">Glasswire<\/a>: free firewall<\/li>\n<li><a href=\"https:\/\/www.gmer.net\/\">GMER<\/a>: rootkit detection<\/li>\n<li><a href=\"https:\/\/www.identityfinder.com\/\">IdentityFinder<\/a>: search computers for personal information<\/li>\n<li><a href=\"https:\/\/www.iobit.com\/\">IObit<\/a><\/li>\n<li><a href=\"https:\/\/virusscan.jotti.org\/\">Jotti&#8217;s malware scan<\/a><\/li>\n<li><a href=\"https:\/\/www.adaware.com\/antivirus\">Lavasoft adaware<\/a><\/li>\n<li><a href=\"https:\/\/logrhythm.com\/\">LogRh.orgythm<\/a><\/li>\n<li><a style=\"font-weight: bold;\" href=\"https:\/\/www.malwarebytes.org\/\">Malwarebytes <\/a>(free version available) [Antimalwarebtes, antirootkit, antiransomware]<\/li>\n<li><strong><a href=\"https:\/\/www.malwarebytes.com\/adwcleaner\">AdwCleaner<\/a><\/strong><\/li>\n<li><a href=\"https:\/\/www.nomoreransom.org\/\">Nomoreransom<\/a>: anti ransomware tools<\/li>\n<li><a href=\"https:\/\/www.oo-software.com\">O&amp;OSoftware<\/a>: backup, rescue data &amp; systems, protect data &amp; systems<\/li>\n<li><a href=\"https:\/\/embeddedsw.net\/OpenPuff_Steganography_Home.html\">OpenPuff<\/a>: free steganography<\/li>\n<li><a href=\"https:\/\/preyproject.com\/\">Prey<\/a> lets you keep track of your laptop, phone and tablet whenever stolen or<br \/>\nmissing<\/li>\n<li><a href=\"https:\/\/prism-break.org\/\">Prism-break<\/a>: software die spionage omzeilt<\/li>\n<li><a href=\"https:\/\/www.privacyware.com\/\">PrivacyWare<\/a><\/li>\n<li><a href=\"https:\/\/www.rapid7.com\/products\/\">Rapid7<\/a>: Metasploit<\/li>\n<li><a href=\"https:\/\/www.roboscan.com\/\">Roboscan<\/a><\/li>\n<li><a href=\"https:\/\/www.bleepingcomputer.com\/download\/roguekiller\/\">Roguekiller<\/a><\/li>\n<li><a href=\"https:\/\/www.sandboxie.com\/\">Sandboxie<\/a>: free program to run applications in a sandbox<\/li>\n<li><a href=\"https:\/\/securityxploded.com\">SecurityXploded<\/a>: SpyDLLRemover, BHORemover<\/li>\n<li><a href=\"https:\/\/www.lavasoft.com\" target=\"_blank\" rel=\"noopener noreferrer\">Lavasoft Adaware<\/a>: freeware to remove spyware from your computer\n<ul>\n<li><a href=\"https:\/\/www.lavasoftsupport.com\">Lavasoft Support forum<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/browsercheck.qualys.com\/\">Qualis BrowserCheck<\/a><\/li>\n<li><a href=\"https:\/\/www.safer-networking.org\/products\/spybot-anti-beacon\/\">Spybot Anti-Beacon<\/a><\/li>\n<li><a href=\"https:\/\/www.superantispyware.com\">SUPERantispyware<\/a><\/li>\n<li><a href=\"https:\/\/www.tenable.com\/\">Tenable<\/a><\/li>\n<li><a href=\"https:\/\/www.truste.com\/\">TRUSTe<\/a><\/li>\n<li><a href=\"https:\/\/unchecky.com\/\">Unchecky<\/a>: vermijd de installatie van crapware door de checkboxes te laten aan- of uitvinken<\/li>\n<li><a href=\"https:\/\/www.untangle.com\/\">Untangle<\/a>: spam blocker, virus control, phish blocker (open source)<\/li>\n<li><a href=\"https:\/\/websafely.net\/\">Websafely<\/a>: Quickly check if website is a scam<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>Settings<\/p>\n<ul>\n<li>Facebook advertentievoorkeuren (steeds op een andere plaats verstopt&#8230;)<\/li>\n<li><a href=\"https:\/\/www.google.ca\/settings\/ads\/\">Google ads settings<\/a><\/li>\n<li><a href=\"https:\/\/www.youronlinechoices.com\/\">Youronlinechoices<\/a><\/li>\n<\/ul>\n<p>Services<\/p>\n<ul>\n<li><a href=\"https:\/\/www.cloudflare.com\/\">CloudFare<\/a><\/li>\n<li><a href=\"https:\/\/www.cybermalveillance.gouv.fr\/\">Cybermalveillance<\/a>: assistance aux victimes de malveillance<\/li>\n<li><a href=\"https:\/\/www.belgium.be\/nl\/justitie\/veiligheid\/criminaliteit\/computercriminaliteit\">Computerveiligheid (Ministerie van Justitie)<\/a><\/li>\n<li><a href=\"https:\/\/www.cyberark.com\/\">Cyberark<\/a><\/li>\n<li><a href=\"https:\/\/monitor.firefox.com\/\">Firefox Monitor<\/a><\/li>\n<li><a href=\"https:\/\/safety.google\/\">Google Veligheidscentrum<\/a><\/li>\n<li><a href=\"https:\/\/sec.hpi.de\/\">Hasso-Plattner Institut<\/a><\/li>\n<li style=\"font-weight: bold;\"><a href=\"https:\/\/haveibeenpwned.com\/\">Have I been pwned?<\/a>\n<ul>\n<li><a href=\"https:\/\/haveibeenpwned.com\/Passwords\">Pwned passwords<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/privacy.microsoft.com\/\">Microsoft Privacy Center<\/a><\/li>\n<li><a href=\"https:\/\/www.securitykiss.com\/\">SecurityKiss<\/a><\/li>\n<\/ul>\n<p>Password creation<\/p>\n<ul>\n<li><a href=\"https:\/\/www.domaindiagnosis.com\/password.php\">Domain Diagnosis<\/a><\/li>\n<li><a href=\"https:\/\/www.webfx.com\/tools\/new-password-generator\/\">Online Password Generator<\/a><\/li>\n<li><a href=\"https:\/\/passcreator.com\/\">PassCreator<\/a><\/li>\n<li><a href=\"https:\/\/www.random.org\/\">Random.org<\/a><\/li>\n<li><a href=\"https:\/\/www.passwordchart.com\/\">Password Chart<\/a><\/li>\n<li><a href=\"https:\/\/www.password-generator.com\/free.html\">Password Generator<\/a><\/li>\n<li><a href=\"https:\/\/passwordsgenerator.net\/\">Passwords Generator<\/a><\/li>\n<li><a href=\"https:\/\/www.autistici.org\/rpg\/\">RPG<\/a><\/li>\n<li><a href=\"https:\/\/www.safepasswd.com\/\">SafePasswd<\/a><\/li>\n<\/ul>\n<p>Informatie. Information<\/p>\n<ul>\n<li><a href=\"https:\/\/www.2-spyware.com\" target=\"_blank\" rel=\"noopener noreferrer\">2-spyware<\/a><\/li>\n<li><a href=\"https:\/\/www.aboutidentitytheft.co.uk\/\">About Identity Thefth<\/a> (UK)<\/li>\n<li><a href=\"https:\/\/www.amtso.org\/\">AMTSO: Anti-Malware Testing Standards Organization<\/a><\/li>\n<li><a href=\"https:\/\/getbadnews.com\/\">Badnews<\/a>: how fake news is spread<\/li>\n<li><a href=\"https:\/\/www.beveiligingnieuws.nl\/\">Beveiliging Nieuws<\/a><\/li>\n<li><a href=\"https:\/\/www.incibe.es\/\">INCIBE<\/a>: Centro de Respuesta a Incidentes de Seguridad (ES)<\/li>\n<li><a href=\"https:\/\/www.comparitech.com\/identity-theft-protection\/identity-fraud-protection-resources\/\">Comparitech: A list of resources to keep you safe from identity fraud<\/a><\/li>\n<li><a href=\"https:\/\/www.digibewust.nl\/\">Digibewust<\/a><\/li>\n<li><a href=\"https:\/\/hlrnet.com\/sites\/silverlight\/\">Doxpara Research<\/a><\/li>\n<li><a href=\"https:\/\/www.epic.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">EPIC: Electronic Privacy Information Center<\/a><\/li>\n<li><a href=\"https:\/\/www.esecurityplanet.com\/\">eSecurity Planet<\/a><\/li>\n<li><a href=\"https:\/\/www.exterminate-it.com\/\">Exterminate It<\/a><\/li>\n<li><a href=\"https:\/\/www.helpnetsecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Help Net Security<\/a><\/li>\n<li><a href=\"https:\/\/www.incibe-cert.es\/\">INCIBE-CERT<\/a> (ES)<\/li>\n<li><a href=\"https:\/\/isc.sans.edu\">Internet Storm Center<\/a><\/li>\n<li><a href=\"https:\/\/krebsonsecurity.com\/\">Krebs on Security<\/a><\/li>\n<li><a href=\"https:\/\/www.malwarehelp.org\/\">MalwareHelp<\/a><\/li>\n<li>Microsoft\n<ul>\n<li><a href=\"https:\/\/www.microsoft.com\/security\/portal\/default.aspx\">Microsoft Malware Protection Center<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.ncsc.nl\/\">Nationaal Cyber Security Center <\/a>(NL)<\/li>\n<li><a href=\"https:\/\/www.osi.es\/\">Oficina de Seguridad del Internauta (ES)<\/a><\/li>\n<li><a href=\"https:\/\/www.pcthreat.com\/\">PC Threat<\/a>: beschrijvingen van spyware en instructies voor het verwijderen<\/li>\n<li><a href=\"https:\/\/seclists.org\/\">SecLists.Org Security Mailing List Archive<\/a><\/li>\n<li><a href=\"https:\/\/www.securemac.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SecureMac<\/a>: Security for Mac Platform<\/li>\n<li><a href=\"https:\/\/www.security.nl\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security.NL<\/a><\/li>\n<li><a href=\"https:\/\/segu-info.com.ar\/\">Segu-info<\/a>: seguridad de la informaci\u00f3n (AR)<\/li>\n<li><a href=\"https:\/\/www.signal-arnaques.com\">Signal-arnaque<\/a><\/li>\n<li><a href=\"https:\/\/www.signal-spam.fr\" target=\"_blank\" rel=\"noopener noreferrer\">Signal Spam<\/a><\/li>\n<li><a href=\"https:\/\/www.spyware-techie.com\/\">Spyware Techie<\/a><\/li>\n<li><a href=\"https:\/\/threatpost.com\/\">Threatpost<\/a><\/li>\n<li><a href=\"https:\/\/www.troyhunt.com\/\">Troy Hunt<\/a><\/li>\n<li><a href=\"https:\/\/veiliginternetten.nl\/\">Veiliginternetten.nl<\/a><\/li>\n<li><a href=\"https:\/\/www.virusbtn.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">VirusBulletin<\/a><\/li>\n<\/ul>\n<p>Bedrijven en verenigingen. Companies and organizations.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.anfibia-soft.com\/\">Anfibia Software<\/a><\/li>\n<li><a href=\"https:\/\/www.checkpoint.com\/\">CheckPoint<\/a>: firewall<\/li>\n<li><a href=\"https:\/\/www.eff.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Electronic Frontier Foundation<\/a><\/li>\n<li><a href=\"https:\/\/www.nucia.eu\/forum\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nucia Security Forum<\/a> (NL)<\/li>\n<li><a href=\"https:\/\/www.s21sec.com\/\">S21Sec<\/a>: seguridad digital<\/li>\n<li><a href=\"https:\/\/www.superantispyware.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SuperAntiSpyware<\/a><\/li>\n<li><a href=\"https:\/\/www.tripwire.com\/\">Tripwire<\/a><\/li>\n<\/ul>\n<p>Bescherming van servers en applicaties (zie ook hier)<\/p>\n<ul>\n<li><a href=\"https:\/\/www.acunetix.com\/vulnerability-scanner\/register-online-vulnerability-scanner\/\">Acunetix<\/a>: online vulnerability scan<\/li>\n<li><a href=\"https:\/\/asafaweb.com\/\">ASafaWeb<\/a><\/li>\n<li><a href=\"https:\/\/detectify.com\/\">Detectify<\/a>: web security scanner<\/li>\n<li><a href=\"https:\/\/www.ssllabs.com\/ssltest\/\">Quals<\/a>: SSL Server test<\/li>\n<li><a href=\"https:\/\/www.qualys.com\/forms\/freescan\/\">Qualys online vulnerability scan<\/a><\/li>\n<li><a href=\"https:\/\/www.quttera.com\/\">Quttery<\/a>: threatsign website antimalware<\/li>\n<li><a href=\"https:\/\/securityheaders.com\/\">Securityheaders<\/a><\/li>\n<li><a href=\"https:\/\/www.siteguarding.com\">SiteGuarding<\/a><\/li>\n<li><a href=\"https:\/\/code.google.com\/p\/skipfish\/\">Skipfish<\/a><\/li>\n<li><a href=\"https:\/\/sucuri.net\/\">Sucuri<\/a>: web integrity monitor \/ Free Website Malware and Security Scanner<\/li>\n<li><a href=\"https:\/\/www.upguard.com\/\">Upguard<\/a><\/li>\n<li><a href=\"https:\/\/www.webinspector.com\/\">Webinspector<\/a><\/li>\n<li><a href=\"https:\/\/www.websecurify.com\/\">Websecurify<\/a><\/li>\n<\/ul>\n<p>Software en oplossingen. Software and solutions.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.abylonsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Abylonsoft<\/a>: security and encryption software<\/li>\n<li><a href=\"https:\/\/www.admuncher.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Ad Muncher<\/a>: ad remover<\/li>\n<li><a href=\"https:\/\/www.aluriasoftware.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Aluria spyware removal<\/a><\/li>\n<li><a href=\"https:\/\/www.anti-keyloggers.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Anti-Keyloggers<\/a><\/li>\n<li><a href=\"https:\/\/www.anti-spy.info\/\" target=\"_blank\" rel=\"noopener noreferrer\">Anti Spy<\/a><\/li>\n<li><a href=\"https:\/\/www.armortools.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ArmorTools<\/a>: privacy tools<\/li>\n<li><a href=\"https:\/\/www.articsoft.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Articsoft<\/a>: encryption and digital signature software<\/li>\n<li><a href=\"https:\/\/www.arovaxantispyware.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Arovax Antispyware<\/a><\/li>\n<li><a href=\"https:\/\/www.ccleaner.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">CCleaner<\/a>: cleans crap (but might break your Windows!!)<\/li>\n<li><a href=\"https:\/\/www.brightfort.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">BrightFort<\/a>: SpywareBlaster, SpywareGuard<\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kapersky<\/a><\/li>\n<li><a href=\"https:\/\/www.pandasecurity.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Panda Security<\/a><\/li>\n<li><a href=\"https:\/\/technet.microsoft.com\/en-us\/sysinternals\/bb897445.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Sysinternals RootkitRevealer<\/a><\/li>\n<li><a href=\"https:\/\/www.webroot.com\">Webroot firewall<\/a><\/li>\n<li><a href=\"https:\/\/www.mywot.com\/\">WOT<\/a>: alerts you for untrustworthy websites<\/li>\n<\/ul>\n<p>Misglopen?<\/p>\n<ul>\n<li><a href=\"https:\/\/forensiccontrol.com\/\">Forensic Control<\/a><\/li>\n<li>Tools<\/li>\n<li><a href=\"https:\/\/www.caine-live.net\/\">CAINE: Computer forensics Linux live distribution<\/a><\/li>\n<li><a href=\"https:\/\/digital-forensics.sans.org\/\">SANS Digital Forensics<\/a>\n<ul>\n<li><a href=\"https:\/\/digital-forensics.sans.org\/community\/downloads\">SIFT Workstation<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.sleuthkit.org\/\">Sleuthkit<\/a>: open source digital forensics<\/li>\n<li><a href=\"https:\/\/www.xplico.org\/\">Xplico<\/a> network forensics<\/li>\n<li><a href=\"https:\/\/www.x-ways.net\/forensics\/\">X-Ways forensics<\/a><\/li>\n<\/ul>\n<p>Identificatie<\/p>\n<ul>\n<li><a href=\"https:\/\/openid.net\/\">OpenID<\/a><\/li>\n<\/ul>\n<p>Identity theft: wat is er over mij geweten op internet?<\/p>\n<ul>\n<li><a href=\"https:\/\/www.peekyou.com\/\">PeekYou<\/a><\/li>\n<\/ul>\n<p>Password storage<\/p>\n<ul>\n<li><a href=\"https:\/\/lastpass.com\/\">Lastpass<\/a>:<span class=\"maintext\"> online password manager and form filler that makes web browsing easier and more secure<\/span><span class=\"maintext\"><br \/>\n<\/span><\/li>\n<li><a href=\"https:\/\/uniqkey.eu\/\">UniqKey<\/a><\/li>\n<\/ul>\n<p>Andere. Other. &#8211; zie ook <a href=\"https:\/\/hlrnet.com\/sites\/?page_id=1301\">Virusbeveiliging<\/a><\/p>\n<ul>\n<li><a href=\"https:\/\/www.auditmypc.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Audit my PC<\/a><\/li>\n<li><a href=\"https:\/\/www.cert.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">CERT Coordination Center <\/a><\/li>\n<li><a href=\"https:\/\/www.contentguard.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">ContentGuard<\/a>: interoperability inDigital Rights<\/li>\n<li><a href=\"https:\/\/www.doxdesk.com\/parasite\/\" target=\"_blank\" rel=\"noopener noreferrer\">Doxdesk.com: parasite<\/a> &#8211; unsollicited commercial software detector<\/li>\n<li><a href=\"https:\/\/eid.belgium.be\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>eID<\/strong><\/a> (BE) &#8211; electronic identity card, with identification and signing<\/li>\n<li><a href=\"https:\/\/www.enigmasoftware.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Enigma Software Group<\/a>: SpyHunter<\/li>\n<li><a href=\"https:\/\/www.fortego.com\/en\/ase.html\" target=\"_blank\" rel=\"noopener noreferrer\">Fortego All-Seeing Eye <\/a><\/li>\n<li><a href=\"https:\/\/www.freesafeip.com\">Free Safe IP<\/a><\/li>\n<li><a href=\"https:\/\/www.hackerwatch.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hackerwatch<\/a><\/li>\n<li><a href=\"https:\/\/www.hexview.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hexview<\/a>: security headlines<\/li>\n<li><a href=\"https:\/\/sourceforge.net\/projects\/hjt\/\" target=\"_blank\" rel=\"noopener noreferrer\">HijackThis<\/a><\/li>\n<li><a href=\"https:\/\/www.hitmanpro.nl\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hitmanpro<\/a> (NL): een alles in \u00e9\u00e9n oplossing om spyware te bestrijden<\/li>\n<li><a href=\"https:\/\/www.hotspotshield.com\/\">Hotspot Shield<\/a><\/li>\n<li><a href=\"https:\/\/www.firewallguide.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Home PC Firewall Guide<\/a><\/li>\n<li><a href=\"https:\/\/www.insecure.org\/\">Insecure.org<\/a><\/li>\n<li><a href=\"https:\/\/www.isafe.org\/\">i-Safe<\/a>: Internet Safety education<\/li>\n<li><a href=\"https:\/\/www.ithenticate.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">iThenticate<\/a>: system to combat the piracy<\/li>\n<li><a href=\"https:\/\/www.javacoolsoftware.com\/products.html\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Javacool Spywareblaster <\/strong><\/a><\/li>\n<li><a href=\"https:\/\/www.kaspersky.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Kapersky<\/a>: anti-virus, anti-hacker<\/li>\n<li>Kerio: firewall (not free any more)<\/li>\n<li><a href=\"https:\/\/www.malwarehelp.org\/\">Malware Help<\/a><\/li>\n<li><a href=\"https:\/\/www.messagelabs.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">MessageLabs<\/a>: e-mail security<\/li>\n<li><a href=\"https:\/\/nvd.nist.gov\/\">National Vulnerability Database<\/a> (NIST-NVD)<\/li>\n<li><a href=\"https:\/\/www.nirsoft.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Nirsoft<\/a>: password recovery tools and more<\/li>\n<li><a href=\"https:\/\/privnote.com\/\">PrivNote<\/a>: send notes that will self-destruct after read<\/li>\n<li><a href=\"https:\/\/quickforget.com\/\">QuickForget<\/a>: send sensitive information through e-mail &#8211; it is deleted afterwards<\/li>\n<li><a href=\"https:\/\/www.sandboxie.com\/\"><span style=\"text-decoration: underline;\">Sandboxie: run a program in a sandbox<\/span><\/a><\/li>\n<li><a href=\"https:\/\/www.sans.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">SANS<\/a> &#8211; <a href=\"https:\/\/isc.sans.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">SANS Internet Storm Center <\/a><\/li>\n<li><a href=\"https:\/\/secunia.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>Secunia<\/strong><\/a>: Security, virus and vulnerabilities information<\/li>\n<li><a href=\"https:\/\/www.security.nl\/\" target=\"_blank\" rel=\"noopener noreferrer\">Security.nl<\/a><\/li>\n<li><a href=\"https:\/\/www.securitydatabase.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">SecurityDatabase.net<\/a> (NL)<\/li>\n<li>Security certificates\n<ul>\n<li><a href=\"https:\/\/www.comodogroup.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Comodo<\/a><\/li>\n<li><a href=\"https:\/\/www.equifax.com\/\">EquiFax<\/a><\/li>\n<li><a href=\"https:\/\/www.geotrust.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">GeoTrust<\/a><\/li>\n<li><a href=\"https:\/\/www.securitymetrics.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SecurityMetrics<\/a><\/li>\n<li><a href=\"https:\/\/www.thawte.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Thawte<\/a><\/li>\n<li><a href=\"https:\/\/www.verisign.com\" target=\"_blank\" rel=\"noopener noreferrer\">Verisign<\/a><\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.smoothwall.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Smoothwall<\/a>: open source firewall<\/li>\n<li><a href=\"https:\/\/www.snapfiles.com\/Freeware\/security\/fwantispy.html\" target=\"_blank\" rel=\"noopener noreferrer\">Snapfiles: anti-spy tools<\/a><\/li>\n<li><a href=\"https:\/\/www.sophos.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sophos<\/a>: anti-spam and anti-virus<\/li>\n<li><a href=\"https:\/\/www.spamlaws.com\/\">Spam Laws<\/a><\/li>\n<li><a href=\"https:\/\/www.spywarewarrior.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">SpywareWarrior<\/a><\/li>\n<li><a href=\"https:\/\/www.spywareremove.com\/\">Spyware remove<\/a><\/li>\n<li><a href=\"https:\/\/tails.boum.org\/\">Tails Live Operating System<\/a><\/li>\n<li><a href=\"https:\/\/www.torproject.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Tor<\/a>: anonimity online<\/li>\n<li><a href=\"https:\/\/ubcd4win.com\/\">UBCD4Win<\/a>: Ultimate Boot CD for Windows &#8211; recovery CD<\/li>\n<li><a href=\"https:\/\/www.us-cert.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">US-CERT<\/a><\/li>\n<li><a href=\"https:\/\/www.webroot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Webroot software<\/a>: Spy Sweeper, Window Washer, &#8230;<\/li>\n<li><a href=\"https:\/\/www.webroot.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Webroot Spy Sweeper<\/a><\/li>\n<li><a href=\"https:\/\/www.xblock.com\" target=\"_blank\" rel=\"noopener noreferrer\">Xblock<\/a>: anti spyware, identity theft and browser cleaner software<\/li>\n<li><a href=\"https:\/\/xp-antispy.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">xp-Antispy<\/a><\/li>\n<li><a href=\"https:\/\/www.xblock.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">X-Cleaner<\/a>: spyware detection &amp; cache cleaner<\/li>\n<li><a href=\"https:\/\/www.zone-h.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Zone-H<\/a>: security and hacking<\/li>\n<li><a name=\"hosts\"><\/a>Je kan ook beperkingen inbouwen in het HOSTS bestand. You can also build limitations into the HOSTS file.\n<ul>\n<li><a href=\"https:\/\/winhelp2002.mvps.org\/hosts.htm\">Blocking Spyware, Adware, Parasites, Hijackers, Trojans, with a HOSTS file<\/a><\/li>\n<li><a href=\"https:\/\/someonewhocares.org\/hosts\/\">Dan Pollock<\/a><\/li>\n<li><a href=\"https:\/\/datadragon.com\/banners\/hosts.shtml\" target=\"_blank\" rel=\"noopener noreferrer\">Host file updates<\/a><\/li>\n<li><a href=\"https:\/\/www.raymarron.com\/hostess\/\" target=\"_blank\" rel=\"noopener noreferrer\">Hostess &#8211; a free utility for maintaining your Hosts file<\/a><\/li>\n<li><a href=\"https:\/\/remember.mine.nu\/\" target=\"_blank\" rel=\"noopener noreferrer\">Remember Mine<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Privacy\n<ul>\n<li><a href=\"https:\/\/ec.europa.eu\/digital-single-market\/en\/online-privacy\">Digital privacy (EU)<\/a><\/li>\n<li><a href=\"https:\/\/www.gegevensbeschermingsautoriteit.be\/\">Gegevensbescherminsautoriteit (BE)<\/a><\/li>\n<li><a href=\"https:\/\/autoriteitpersoonsgegevens.nl\/\">Autoriteit Persoonsgegevens (NL)<\/a><\/li>\n<\/ul>\n<\/li>\n<li>Cybercrime \/ identity theft\n<ul>\n<li><a href=\"https:\/\/www.baselinemag.com\" target=\"_blank\" rel=\"noopener noreferrer\">Baseline<\/a><\/li>\n<li><a href=\"https:\/\/www.cybercrime.gov\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybercrime.gov<\/a><\/li>\n<li><a href=\"https:\/\/www.cybercrimelaw.net\/\" target=\"_blank\" rel=\"noopener noreferrer\">Cybercrimelaw<\/a><\/li>\n<li><a href=\"https:\/\/www.forensicfocus.com\/\">Forensic focus<\/a><\/li>\n<li><a href=\"https:\/\/www.idtheftcenter.org\" target=\"_blank\" rel=\"noopener noreferrer\">Identity Theft Resource Center<\/a><\/li>\n<li><a href=\"https:\/\/www.privacyinternational.org\/\" target=\"_blank\" rel=\"noopener noreferrer\">Privacy International<\/a><\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<span class=\"last-modified-timestamp\">Apr 18, 2026 @ 12:30 pm<\/span>\n","protected":false},"excerpt":{"rendered":"<p><span class=\"span-reading-time rt-reading-time\" style=\"display: block;\"><span class=\"rt-label rt-prefix\">Reading Time: <\/span> <span class=\"rt-time\"> 4<\/span> <span class=\"rt-label rt-postfix\">minutes<\/span><\/span>De belangrijkste bedreigingen zijn virussen (zie ook hier), inbraak en kaping, adware\/spyware\/parasieten, encryptie software \/ ransomware, hoaxen, phishing, en (nummer 1!) de domheid van de gebruiker. The most important threads are viruses (see also here), intrusion and hijacking, adware\/spyware\/parasites, encrypters\/ransomware, phishing, stupidity of the user. Start hier. Start here. Te<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"iawp_total_views":6,"footnotes":"","_wp_rev_ctl_limit":""},"class_list":["post-866","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Internet: veiligheid - hlrnet.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Internet: veiligheid - hlrnet.com\" \/>\n<meta property=\"og:description\" content=\"Reading Time:  4 minutesDe belangrijkste bedreigingen zijn virussen (zie ook hier), inbraak en kaping, adware\/spyware\/parasieten, encryptie software \/ ransomware, hoaxen, phishing, en (nummer 1!) de domheid van de gebruiker. The most important threads are viruses (see also here), intrusion and hijacking, adware\/spyware\/parasites, encrypters\/ransomware, phishing, stupidity of the user. Start hier. Start here. Te\" \/>\n<meta property=\"og:url\" content=\"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/\" \/>\n<meta property=\"og:site_name\" content=\"hlrnet.com\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-18T12:30:36+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/internet-veiligheid\\\/\",\"url\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/internet-veiligheid\\\/\",\"name\":\"Internet: veiligheid - hlrnet.com\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/#website\"},\"datePublished\":\"2018-04-18T16:18:42+00:00\",\"dateModified\":\"2026-04-18T12:30:36+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/internet-veiligheid\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/hlrnet.com\\\/sites\\\/internet-veiligheid\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/internet-veiligheid\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet: veiligheid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/#website\",\"url\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/\",\"name\":\"hlrnet.com\",\"description\":\"Hans Le Roy\",\"publisher\":{\"@id\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/#organization\",\"name\":\"hlrnet.com\",\"url\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cropped-default512x512-trans-1.png\",\"contentUrl\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/wp-content\\\/uploads\\\/2018\\\/04\\\/cropped-default512x512-trans-1.png\",\"width\":512,\"height\":160,\"caption\":\"hlrnet.com\"},\"image\":{\"@id\":\"https:\\\/\\\/hlrnet.com\\\/sites\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Internet: veiligheid - hlrnet.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/","og_locale":"en_US","og_type":"article","og_title":"Internet: veiligheid - hlrnet.com","og_description":"Reading Time:  4 minutesDe belangrijkste bedreigingen zijn virussen (zie ook hier), inbraak en kaping, adware\/spyware\/parasieten, encryptie software \/ ransomware, hoaxen, phishing, en (nummer 1!) de domheid van de gebruiker. The most important threads are viruses (see also here), intrusion and hijacking, adware\/spyware\/parasites, encrypters\/ransomware, phishing, stupidity of the user. Start hier. Start here. Te","og_url":"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/","og_site_name":"hlrnet.com","article_modified_time":"2026-04-18T12:30:36+00:00","twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/","url":"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/","name":"Internet: veiligheid - hlrnet.com","isPartOf":{"@id":"https:\/\/hlrnet.com\/sites\/#website"},"datePublished":"2018-04-18T16:18:42+00:00","dateModified":"2026-04-18T12:30:36+00:00","breadcrumb":{"@id":"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/hlrnet.com\/sites\/internet-veiligheid\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/hlrnet.com\/sites\/internet-veiligheid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/hlrnet.com\/sites\/"},{"@type":"ListItem","position":2,"name":"Internet: veiligheid"}]},{"@type":"WebSite","@id":"https:\/\/hlrnet.com\/sites\/#website","url":"https:\/\/hlrnet.com\/sites\/","name":"hlrnet.com","description":"Hans Le Roy","publisher":{"@id":"https:\/\/hlrnet.com\/sites\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/hlrnet.com\/sites\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/hlrnet.com\/sites\/#organization","name":"hlrnet.com","url":"https:\/\/hlrnet.com\/sites\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/hlrnet.com\/sites\/#\/schema\/logo\/image\/","url":"https:\/\/hlrnet.com\/sites\/wp-content\/uploads\/2018\/04\/cropped-default512x512-trans-1.png","contentUrl":"https:\/\/hlrnet.com\/sites\/wp-content\/uploads\/2018\/04\/cropped-default512x512-trans-1.png","width":512,"height":160,"caption":"hlrnet.com"},"image":{"@id":"https:\/\/hlrnet.com\/sites\/#\/schema\/logo\/image\/"}}]}},"publishpress_future_action":{"enabled":false,"date":"2026-05-03 17:16:23","action":"change-status","newStatus":"draft","terms":[],"taxonomy":"","extraData":[]},"publishpress_future_workflow_manual_trigger":{"enabledWorkflows":[]},"_links":{"self":[{"href":"https:\/\/hlrnet.com\/sites\/wp-json\/wp\/v2\/pages\/866","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/hlrnet.com\/sites\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/hlrnet.com\/sites\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/hlrnet.com\/sites\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/hlrnet.com\/sites\/wp-json\/wp\/v2\/comments?post=866"}],"version-history":[{"count":0,"href":"https:\/\/hlrnet.com\/sites\/wp-json\/wp\/v2\/pages\/866\/revisions"}],"wp:attachment":[{"href":"https:\/\/hlrnet.com\/sites\/wp-json\/wp\/v2\/media?parent=866"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}