{"version":"1.0","provider_name":"C-Know Media","provider_url":"https:\/\/www.cknow.com\/cms","title":"Computer Knowledge Newsletter - October 1999 Issue - C-Know Media","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"4BwY8oqrQ7\"><a href=\"https:\/\/www.cknow.com\/cms\/newsletters\/computer-knowledge-newsletter-october-1999-issue.html\">Computer Knowledge Newsletter &#8211; October 1999 Issue<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.cknow.com\/cms\/newsletters\/computer-knowledge-newsletter-october-1999-issue.html\/embed#?secret=4BwY8oqrQ7\" width=\"600\" height=\"338\" title=\"&#8220;Computer Knowledge Newsletter &#8211; October 1999 Issue&#8221; &#8212; C-Know Media\" data-secret=\"4BwY8oqrQ7\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script type=\"text\/javascript\">\n\/* <![CDATA[ *\/\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.cknow.com\/cms\/wp-includes\/js\/wp-embed.min.js\n\/* ]]> *\/\n<\/script>\n","description":"In This Issue: Melissa Redo Badass Worm NT\/Infis.4608 Virus FreeLinks Word97\/2000 Suppl.A Worm Y2K Malicious Fixes Security Myths Personal Internet Security More IE Holes FSISAC Virus News Melissa Redo. Several variants of the original Melissa virus have started to circulate. Most scanners will catch them; some will require updating. The variants are not as benign [&hellip;]","thumbnail_url":"https:\/\/www.cknow.com\/cms\/wp-content\/uploads\/2013\/02\/weblink.png"}