When you have root-level access to a hosting server, it indicates that you will have full control over it. That is to say, you can set up any server-side app whatever the changes that it will make to the software environment on your server, and you'll be able to both access and change any kind of file, which includes system files, and change various settings. You can do this by connecting to the server as a root user which has full privileges to do all these things and to create other users, which includes users who also have full privileges. The connection can be established using a web-based graphical interface or a Secure Shell console. For safety reasons, it is recommended that you create one more user for your daily work and employ the root user only when you need to modify the server or to set up software which may be required by some script-driven application that you would like to run.

Full Root-level Access in Dedicated Web Hosting

Each and every dedicated server that we provide includes full root-level access, if the server is ordered with no Control Panel, or with cPanel or DirectAdmin. If you want to install and run heavy, resource-demanding applications and they have special requirements regarding the server software environment which cannot be fulfilled by a conventional shared website hosting plan, our servers are the best solution. Without any Control Panel at hand, you are able to access the server and update its settings as well as the content which you upload using a console, while with cPanel and DirectAdmin, you'll have a graphical interface to control everything related to your online content, and also most server-side settings. Of course, when you get a dedicated server with no Control Panel, you may always set up a third-party software tool manually, as long as it is compatible with the Operating System that you've selected at registration. If you pick our Hepsia Control Panel on the order page, you'll have restricted root access, but you will still be able to perform a number of things through a Secure Shell console.