Having root-level access to your server signifies that you'll be able to view and modify any file on it, which includes crucial system files. You may also set up software which can update specific settings on your server throughout the, so that the installation can be done only if you are logged in as the root user. The latter has full privileges, which means that you will have full control over the machine whenever you want and you'll be able to do anything you would like. You may also create various other users either with the same rights or with fewer rights, according to what you require them for - daily tasks, other server administrators, etc. To be on the safe side, it is usually recommended to employ the root account only when you actually need it and not for tasks that you can do using other accounts. You can use a web-based graphical interface or a Secure Shell console to connect with the server and to manage it at the root level.

Full Root-level Access in Dedicated Hosting

Each and every dedicated server that we supply includes full root-level access, if the server is ordered with no Control Panel, or with cPanel. If you'd like to set up and run heavy, resource-demanding applications and they have special requirements regarding the server software environment which cannot be fulfilled by a conventional shared website hosting plan, our servers are the most suitable solution. Without Control Panel at hand, you'll be able to access the server and modify its settings as well as the content which you upload with a console, whereas with cPanel you'll use a graphical interface to control everything related to your online content, and also most server-side settings. Needless to say, when you get a dedicated server without a Control Panel, you may always install a third-party software tool manually, as long as it supports the Operating System that you have selected at signup. If you choose the Hepsia Control Panel from the order page, you'll have limited root access, yet you'll still be able to do a number of things using a Secure Shell console.