Having root-level access to a server means that you'll be able to view and update any file on it, including important system files. You may also set up software which can modify certain settings on your server during the process, so the installation can be done only if you are signed in as the root user. The aforementioned has full privileges, which means that you will have full control over your machine whenever you want and you can perform anything you'd like. You may also create other users either with the same rights or with fewer rights, based on what you require them for - daily tasks, other server admins, etc. To be on the safe side, it is generally recommended to employ the root account only when you really need it and not for tasks that you can do using other accounts. You may use a web-based graphical interface or a Secure Shell console in order to connect to the server and to control it at the root level.

Full Root-level Access in Dedicated Web Hosting

Each and every dedicated server that we provide comes with full root-level access, if the server is ordered without a Control Panel, or with cPanel or DirectAdmin. If you'd like to set up and run heavy, resource-demanding apps and they have special requirements with regard to the server software setting that cannot be fulfilled by an ordinary shared website hosting package, our servers are the right solution. Without any Control Panel at hand, you'll be able to access the server and change its settings as well as the content that you upload with a console, whereas with cPanel and DirectAdmin, you will have a graphical interface to manage everything related to your web content, as well as the majority of server-side settings. As expected, if you get a dedicated server without a Control Panel, you can set up a third-party software tool manually, as long as it supports the Operating System that you have chosen at signup. If you pick the Hepsia Control Panel from the order page, you'll have limited root access, however you'll still be able to perform many different things using a Secure Shell console.