When you have root-level access to a hosting server, this means that you will have full control over it. In other words, you'll be able install any server-side app irrespective of the changes that it'll make to the software environment on the server, and you'll be able to both access and update any kind of file, which includes system files, and change various settings. This can be done by connecting to the server as a root user that has full privileges to do the aforementioned things and to create other users, including users who also have full privileges. The connection can be established using a web-based graphical interface or a Secure Shell console. For security reasons, it is recommended that you make a different user for your daily work and use the root user only when you need to modify the server or to install software which may be needed by some script-driven application that you would like to run.
Full Root-level Access in Dedicated Web Hosting
Each dedicated server
that we provide provides you with full root-level access, when the server is ordered without a Control Panel, or with cPanel or DirectAdmin. If you would like to install and run heavy, resource-demanding apps and they have special requirements with regard to the server software environment that cannot be fulfilled by an ordinary shared hosting package, our servers will be the optimal solution. Without any Control Panel at hand, you will be able to access the server and update its settings as well as the content that you upload using a console, whereas with cPanel and DirectAdmin, you will have a graphical interface to control everything related to your web content, and also most server-side settings. Needless to say, when you get a dedicated server without a Control Panel, you can always set up a third-party software instrument manually, as long as it supports the Operating System that you've chosen at registration. When you choose the Hepsia Control Panel from your order page, you'll have restricted root access, but you can still do a number of things through a Secure Shell console.