{"id":2275,"date":"2017-08-04T15:19:04","date_gmt":"2017-08-04T19:19:04","guid":{"rendered":"https:\/\/www.knownhost.com\/blog\/?p=2275"},"modified":"2026-01-27T09:18:29","modified_gmt":"2026-01-27T14:18:29","slug":"root-access-can","status":"publish","type":"post","link":"https:\/\/www.knownhost.com\/blog\/root-access-can\/","title":{"rendered":"What is Root Access? What Can You Do With It?"},"content":{"rendered":"\n<h3 class=\"wp-block-heading\"><strong>Updated February 15, 2021<\/strong><\/h3>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Who cares about root access? Do you need it? If you do, what can you do with it? Learn about the Linux root, what it can do for you, and how a Unix-like operating system is organized as an upside-down tree.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>Why is root lower case?<\/strong><\/h3>\n\n\n<p>First, let\u2019s get into <em>root<\/em> vs. <em>Root<\/em>. It is possible for a person to argue that this piece should have been entitled, \u201cWhat is root access?\u201d to make it clearer that the root user is in lower-case.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Remember that the root user is <a href=\"http:\/\/www.linfo.org\/root.html\">specific to Linux<\/a>, BSD (Berkeley Software Distribution), and other Unix-like operating systems (see the next section regarding \u201cUnix-like\u201d). The bulk of Linux is <a href=\"https:\/\/digital-domain.net\/lug\/unix-linux-history.html\">written in C<\/a>. Like some other computer languages (C++, Java, Ruby, XML, etc.) and in contrast to others (Pascal, SQL, Ada, etc.), C is a case-sensitive coding language. Because of that, well, it matters whether you write <em>root<\/em> or <em>Root<\/em>. Why do people choose lower-case over the capitalized version of a word? Let\u2019s look at the discussion of why it might be used, or not used, to name a local variable \u2013 from a relatively popular post within <a href=\"https:\/\/softwareengineering.stackexchange.com\/questions\/202031\/what-is-the-reason-for-using-lowercase-for-the-first-word-in-a-local-variable-e\" rel=\"nofollow noreferrer\">Software Engineering Stack Exchange<\/a>.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>In the post, the user oscilatingcretin [sic] says he gets a lot of grief from other developers for capitalizing the first letter in words within his local variables. Standardly, coders will use employeeCount and firstName, as examples. Instead, oscilatingcretin would use EmployeeCount and FirstName in those instances. He uses capitalization across the board \u2013 for constants, properties, variables, return methods, void methods, etc. He notes that he even uses that same model within Javascript.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Why does this decision bother people? Well, because there is a certain logic to the non-use of capital letters in that context. The idea is that initial-caps of words \u2013 or \u201cproper case\u201d \u2013 within case-sensitive code is typically only a convention that is applied to void methods and properties; you should start with the lower case for methods that return a value and local variables, says this perspective.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>Oscilatingcretin notes that he has too often felt that the supposed <em>need<\/em> to use this convention is perhaps more arbitrary than it is rational \u2013 although he does note that he has \u201cnever needed a casing convention to tell me whether or not something is a local variable or property\u201d because he has \u201calways used a very intuitive naming convention.\u201d<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>The bottom line is that you should write root without a capital letter; and if you want, you can question whether the lack of a capital letter makes sense.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>The root user: the Linux version of Windows admin<\/strong><\/h3>\n\n\n<p>Have you worked with Windows servers? Then you are probably familiar with the administrator account. That, like root, is an example of a superuser account that is designated for system administration. The superuser name will vary depending on the operating system (OS).<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>It\u2019s important to understand scope, so what exactly do we mean by <em>Unix-like<\/em>? According to the Linux Information Project, <a href=\"http:\/\/www.linfo.org\/unix-like.html\"><em>Unix-like<\/em><\/a> is a term applied to computing operating systems to mean that it has numerous attributes that are similar to UNIX (created at Bell Labs by Ken Thompson in 1969) and the systems that followed soon after it.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>A superuser account such as root is able to edit whatever server files they want and perform any other tasks without getting blocked due to a lack of sufficient permission. Specific tasks that you can accomplish when logged in as root are covered in the <em>\u201cWhat can you do as root?\u201d<\/em> section below.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p><strong><a href=\"https:\/\/www.knownhost.com\/managed-vps\">KnownHost, buy your VPS Now!<\/a><\/strong><\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h3><strong>What exactly is root access? (possible sources of confusion)<\/strong><\/h3>\n<p>Within Linux or another Unix-like system, the root user \u2013 accessible with dedicated and some VPS servers \u2013 has overarching file access and command privileges. A term that can often be used interchangeably with <em>root user<\/em> is <em>root account<\/em>. The notion of root access can become a bit more muddled when you look at similar ways in which root is used within Linux, BSD, and similar (i.e. Unix-like) systems. Those are:<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<li><strong>root directory <\/strong>(\/) \u2013 The root directory is the top-level directory. To look at it from the bottom up, your files will typically be contained within subdirectories, which in turn are within directories, all of which are included in the root directory. A forward slash (this character \u2013 \/), indicates the root directory.<\/li>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<li><strong>slash root<\/strong> (\/root) \u2013 Although this may sound like a sloppy effort at harvesting ingredients for sarsaparilla, it is actually the home directory of the root account (\/root). In other words, it is the main place where the root user\u2019s files (configuration and otherwise) are stored. Typically it is the location where a user will start when they log into Linux. Remember that the forward slash designates the root directory; that means <em>slash root<\/em> is a subdirectory of it. Any typical (non-root) home directories populate within a different default subdirectory of root, slash home (\/home).<\/li>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<li><strong>root privileges <\/strong>\u2013 This term refers to the capabilities that the root user has to control the system, distinct from those of other users. The root account is the king and queen of the castle, as described above. It has 100% management control, with full access to every command and file. Let\u2019s get into these privileges in the next section.<\/li>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<li><strong>rootkit<\/strong> \u2013 You may want root privileges, but you don\u2019t want to get them through a <em>rootkit<\/em>, no matter how user-friendly its name may sound. A rootkit is applications that are clandestinely placed on a server by an unauthorized party, often for malicious reasons. The Linux Information Project notes that \u201cwell designed rootkits are able to obtain root access\u2026 and to hide most or all traces of their presence and activities.\u201d<\/li>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<h3><strong>Linux as an upside-down tree<\/strong><\/h3>\n<p>To better understand how the concepts in the above section interrelate, this account is called root because it has exclusive write permissions within the root directory \u2013 i.e. it can change any files contained therein.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>The root directory is called that because the hierarchy of a Unix-like OS is designed to be similar to a tree, with everything sprouting and branching off from one directory that serves as the roots. Flip the tree over, and you see the hierarchy, with root on top.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>What can you do as root?<\/strong><\/h3>\n\n\n<p>This question could be rephrased as, \u201cWhat are example root privileges?\u201d That is essentially what we are talking about with privileges is the ability to do other stuff on your dedicated or VPS server (the latter provided you have full root access). Here are 5 broad examples of what you can do within this account:<\/p>\n<ol><\/ol>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n<p>1. Edit whatever files you choose\n<\/p>\n<p>2. Change the system however you want\n<\/p>\n<p>3. Provide and remove permissions to other accounts (which will affect whether they can read, change, or execute certain directories and files)\n<\/p>\n<p>4. Install software server-wide (MySQL, Apache, etc.)\n<\/p>\n<p>5. Set up configurations for software throughout the server<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h3 class=\"wp-block-heading\"><strong>How to get root access for your website:<\/strong><\/h3>\n\n\n<p>You can get root access on a dedicated or virtual private server, provided this feature is available through your hosting provider. With a good service, logging in as root should be a snap. At <strong><a href=\"https:\/\/www.knownhost.com\">KnownHost<\/a><\/strong>, support is something we pride ourselves on, so you can rest easy knowing we&#8217;ve got your back. See our full-root-access <strong><a href=\"https:\/\/www.knownhost.com\/managed-vps\">fully managed VPS plans<\/a><\/strong>.<\/p>\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<div style=\"height:20px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Updated February 15, 2021 Who cares about root access? Do you need it? If you do, what can you do with it? Learn about the Linux root, what it can do for you, and how a Unix-like operating system is organized as an upside-down tree. Why is root lower case? First, let\u2019s get into root [&hellip;]<\/p>\n","protected":false},"author":137,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1452],"tags":[1295,107],"class_list":["post-2275","post","type-post","status-publish","format-standard","hentry","category-basics","tag-root","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What is Root Access? What Can You Do With It? - KnownHost<\/title>\n<meta name=\"description\" content=\"What is Root access and why do I want it? Learn why root access is the key to being able to do what you want with your server.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.knownhost.com\/blog\/root-access-can\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Root Access? What Can You Do With It? - KnownHost\" \/>\n<meta property=\"og:description\" content=\"What is Root access and why do I want it? Learn why root access is the key to being able to do what you want with your server.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.knownhost.com\/blog\/root-access-can\/\" \/>\n<meta property=\"og:site_name\" content=\"KnownHost\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/KnownHost\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-04T19:19:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-01-27T14:18:29+00:00\" \/>\n<meta name=\"author\" content=\"Jerry\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:site\" content=\"@KnownHost\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jerry\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/root-access-can\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/root-access-can\\\/\"},\"author\":{\"name\":\"Jerry\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e8335f865579ddedb2ab3553b100afdc\"},\"headline\":\"What is Root Access? What Can You Do With It?\",\"datePublished\":\"2017-08-04T19:19:04+00:00\",\"dateModified\":\"2026-01-27T14:18:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/root-access-can\\\/\"},\"wordCount\":1215,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"keywords\":[\"root\",\"security\"],\"articleSection\":[\"Basics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/root-access-can\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/root-access-can\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/root-access-can\\\/\",\"name\":\"What is Root Access? What Can You Do With It? - KnownHost\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\"},\"datePublished\":\"2017-08-04T19:19:04+00:00\",\"dateModified\":\"2026-01-27T14:18:29+00:00\",\"description\":\"What is Root access and why do I want it? Learn why root access is the key to being able to do what you want with your server.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/root-access-can\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/root-access-can\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/root-access-can\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Root Access? What Can You Do With It?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"name\":\"KnownHost.com\",\"description\":\"Quality Managed Web Hosting by KnownHost\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#organization\",\"name\":\"KnownHost, LLC\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"contentUrl\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/logo.png\",\"width\":1200,\"height\":400,\"caption\":\"KnownHost, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/KnownHost\\\/\",\"https:\\\/\\\/x.com\\\/KnownHost\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/knownhost\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/#\\\/schema\\\/person\\\/e8335f865579ddedb2ab3553b100afdc\",\"name\":\"Jerry\",\"url\":\"https:\\\/\\\/www.knownhost.com\\\/blog\\\/author\\\/jerrysteadydemand-com\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Root Access? What Can You Do With It? - KnownHost","description":"What is Root access and why do I want it? Learn why root access is the key to being able to do what you want with your server.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.knownhost.com\/blog\/root-access-can\/","og_locale":"en_US","og_type":"article","og_title":"What is Root Access? What Can You Do With It? - KnownHost","og_description":"What is Root access and why do I want it? Learn why root access is the key to being able to do what you want with your server.","og_url":"https:\/\/www.knownhost.com\/blog\/root-access-can\/","og_site_name":"KnownHost","article_publisher":"https:\/\/www.facebook.com\/KnownHost\/","article_published_time":"2017-08-04T19:19:04+00:00","article_modified_time":"2026-01-27T14:18:29+00:00","author":"Jerry","twitter_card":"summary_large_image","twitter_creator":"@KnownHost","twitter_site":"@KnownHost","twitter_misc":{"Written by":"Jerry","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.knownhost.com\/blog\/root-access-can\/#article","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/root-access-can\/"},"author":{"name":"Jerry","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e8335f865579ddedb2ab3553b100afdc"},"headline":"What is Root Access? What Can You Do With It?","datePublished":"2017-08-04T19:19:04+00:00","dateModified":"2026-01-27T14:18:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.knownhost.com\/blog\/root-access-can\/"},"wordCount":1215,"commentCount":1,"publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"keywords":["root","security"],"articleSection":["Basics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.knownhost.com\/blog\/root-access-can\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.knownhost.com\/blog\/root-access-can\/","url":"https:\/\/www.knownhost.com\/blog\/root-access-can\/","name":"What is Root Access? What Can You Do With It? - KnownHost","isPartOf":{"@id":"https:\/\/www.knownhost.com\/blog\/#website"},"datePublished":"2017-08-04T19:19:04+00:00","dateModified":"2026-01-27T14:18:29+00:00","description":"What is Root access and why do I want it? Learn why root access is the key to being able to do what you want with your server.","breadcrumb":{"@id":"https:\/\/www.knownhost.com\/blog\/root-access-can\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.knownhost.com\/blog\/root-access-can\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.knownhost.com\/blog\/root-access-can\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.knownhost.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Root Access? What Can You Do With It?"}]},{"@type":"WebSite","@id":"https:\/\/www.knownhost.com\/blog\/#website","url":"https:\/\/www.knownhost.com\/blog\/","name":"KnownHost.com","description":"Quality Managed Web Hosting by KnownHost","publisher":{"@id":"https:\/\/www.knownhost.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.knownhost.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.knownhost.com\/blog\/#organization","name":"KnownHost, LLC","url":"https:\/\/www.knownhost.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","contentUrl":"https:\/\/www.knownhost.com\/blog\/wp-content\/uploads\/2021\/04\/logo.png","width":1200,"height":400,"caption":"KnownHost, LLC"},"image":{"@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/KnownHost\/","https:\/\/x.com\/KnownHost","https:\/\/www.linkedin.com\/company\/knownhost"]},{"@type":"Person","@id":"https:\/\/www.knownhost.com\/blog\/#\/schema\/person\/e8335f865579ddedb2ab3553b100afdc","name":"Jerry","url":"https:\/\/www.knownhost.com\/blog\/author\/jerrysteadydemand-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/2275","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/users\/137"}],"replies":[{"embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/comments?post=2275"}],"version-history":[{"count":1,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/2275\/revisions"}],"predecessor-version":[{"id":19839,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/posts\/2275\/revisions\/19839"}],"wp:attachment":[{"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/media?parent=2275"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/categories?post=2275"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.knownhost.com\/blog\/wp-json\/wp\/v2\/tags?post=2275"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}