When you have root-level access to a hosting server, it indicates that you'll have full control over it. In other words, you'll be able install any server-side application regardless of the changes that it will make to the software environment on your server, and you'll be able to both access and update any file, including system files, and change various settings. This can be done by connecting to the server as a root user who has full privileges to perform all these things and to generate other users, including users who also have full privileges. The connection can be established with a web-based graphical interface or a Secure Shell console. For safety reasons, it's recommended that you make another user for your everyday work and employ the root user only when you need to customize the server or to set up software that may be needed by a script-driven application that you want to run.
Full Root-level Access in Dedicated Servers
Each and every dedicated server that we offer features full root-level access, when the server is ordered without a Control Panel, or with cPanel or DirectAdmin. If you'd like to set up and run heavy, resource-demanding applications and they have special requirements with regard to the server software environment that can't be fulfilled by an ordinary shared website hosting plan, our servers are the most suitable solution. Without Control Panel at hand, you can access the server and update its settings as well as the content which you upload using a console, while with cPanel and DirectAdmin, you will have a graphical interface to control everything related to your web content, and also the majority of server-side settings. Needless to say, when you get a dedicated server devoid of Control Panel, you may always set up a third-party instrument manually, as long as it is compatible with the OS that you've selected at registration. If you select the Hepsia Control Panel from your order page, you will have restricted root access, however you'll still be able to do a lot of things using a Secure Shell console.