Having root-level access to your server signifies that you can view and modify any file on it, which includes essential system files. You can also install software which can modify particular settings on the server throughout the, so that the installation can be done only if you're signed in as the root user. The aforementioned has full privileges, i.e. you will have full control over the machine whenever you want and you'll be able to perform anything you want. You may also create various other users either with similar rights or with fewer rights, based on what you need them for - daily tasks, other server administrators, etcetera. To be on the safe side, it is generally recommended to use the root account only when you really need it and not for tasks that you can do using other accounts. You may use a web-based graphical interface or a Secure Shell console in order to connect to the server and to control it at the root level.

Full Root-level Access in Dedicated Hosting

Each and every dedicated server that we provide provides you with full root-level access, when the server is ordered without a Control Panel, or with cPanel or DirectAdmin. If you wish to install and run heavy, resource-demanding applications and they have special requirements regarding the server software environment that cannot be fulfilled by a standard shared hosting plan, our servers will be the perfect solution. With no Control Panel at hand, you'll be able to access the server and customize its settings and the content that you upload with a console, whereas with cPanel and DirectAdmin, you will have a graphical interface to take care of everything related to your online content, and also the majority of server-side settings. Needless to say, if you get a dedicated server devoid of Control Panel, you can set up some third-party instrument manually, as long as it supports the OS that you've selected at signup. If you pick our Hepsia Control Panel from the order page, you will have limited root access, yet you'll still be able to do many different things using a Secure Shell console.