Having root-level access to your server signifies that you will be able to view and update any file on it, which includes essential system files. You may also install software which can change particular settings on the server during the process, so the installation can be done only if you're signed in as the root user. The aforementioned has full privileges, i.e. you'll have full control over the machine whenever you want and you will be able to do anything you'd like. You may also create other users either with identical rights or with fewer rights, based on what you need them for - day-to-day tasks, other server administrators, etc. To be on the safe side, it is generally recommended to use the root account only when you actually need it and not for tasks which can be done through other accounts. You can use a web-based graphical interface or a Secure Shell console to be able to connect with the server and to control it at the root level.

Full Root-level Access in Dedicated Servers

Each dedicated server that we offer provides you with full root-level access, if the server is ordered without a Control Panel, or with cPanel or DirectAdmin. If you'd like to set up and run heavy, resource-demanding applications and they have specific requirements about the server software environment which can't be fulfilled by a conventional shared hosting package, our servers are the most suitable solution. Without Control Panel at hand, you can access the server and update its settings and the content that you upload with a console, while with cPanel and DirectAdmin, you will use a graphical interface to manage everything related to your web content, as well as most server-side settings. Needless to say, if you get a dedicated server with no Control Panel, you can always set up some third-party software tool manually, as long as it is compatible with the OS that you've chosen at signup. If you select our Hepsia Control Panel from the order page, you'll have restricted root access, however you can still do quite a lot of things through a Secure Shell console.