Full Root-level Access
Learn just what exactly ‘full root-level access’ indicates, what privileges you will have and the ways to utilize them to enhance your server.
Having full root-level access means that you will be able to access and update any file on a particular server, which includes all of the system files, and to change system settings or set up server-side software that may be necessary for certain scripts and even offline apps to work effectively. A server is accessed at the root level with a root user, who has full privileges to do all the aforementioned things. Your root user can also create other users. For security reasons, you are advised to have a separate account for routine tasks and to use the root account only if you actually need to do a particular task on your website hosting server. The root-level access attribute provides you with full control of your server from almost any location, given that you know the user credentials.
Full Root-level Access in Dedicated Servers Hosting
Each dedicated server
that we provide features full root-level access, when the server is ordered without a Control Panel, or with cPanel or DirectAdmin. If you'd like to install and run heavy, resource-demanding apps and they have specific requirements with regard to the server software environment which can't be fulfilled by a regular shared web hosting plan, our servers will be the best solution. Without any Control Panel at hand, you are able to access the server and modify its settings as well as the content that you upload with a console, while with cPanel and DirectAdmin, you'll have a graphical interface to control everything related to your online content, and also the majority of server-side settings. Of course, if you get a dedicated server devoid of Control Panel, you can install some third-party software tool manually, as long as it is compatible with the OS that you've chosen at registration. If you choose our Hepsia Control Panel from the order page, you'll have restricted root access, however you'll still be able to do many different things using a Secure Shell console.