Having root-level access to a server signifies that you will be able to view and modify any file on it, which includes important system files. You may also install software that can modify certain settings on your server throughout the, so that the installation can be performed only if you're signed in as the root user. The latter has full privileges, which means that you will have full control over the machine at any time and you will be able to do anything you want. You can also make various other users either with the same rights or with fewer rights, depending on what you require them for - day-to-day tasks, other server administrators, etcetera. To be on the safe side, it's usually recommended to employ the root account only when you really need it and not for tasks that you can do through other accounts. You may use a web-based graphical interface or a Secure Shell console to be able to connect with the server and to control it at the root level.

Full Root-level Access in Dedicated Hosting

Each and every dedicated server that we offer gives you full root-level access, if the server is ordered with no Control Panel, or with cPanel or DirectAdmin. If you wish to set up and run heavy, resource-demanding applications and they have specific requirements with regard to the server software setting that can't be fulfilled by a conventional shared hosting package, our servers are the perfect solution. Without Control Panel at hand, you can access the server and modify its settings and the content which you upload with a console, whereas with cPanel and DirectAdmin, you will have a graphical interface to manage everything related to your web content, as well as the majority of server-side settings. Needless to say, if you get a dedicated server with no Control Panel, you can set up some third-party software tool manually, as long as it is compatible with the Operating System that you have chosen at registration. When you choose our Hepsia Control Panel on your order page, you'll have restricted root access, but you can still do many different things using a Secure Shell console.