Full Root-level Access
Learn what exactly ‘full root-level access’ indicates, what privileges it will give you and how to use them to enhance your server.
Having full root-level access signifies that you will be able to access and customize every file on a selected server, including all the system files, and to change system settings or set up server-side software which may be required by specific scripts and even offline applications to function appropriately. A server is accessed at the root level through a root user, who has full privileges to perform all the aforementioned tasks. The root user can also generate various other users. For safety reasons, you're advised to have one more account for day-to-day tasks and to use the root account only if you actually need to do a task on the hosting server. The root-level access function will give you full control over your server from almost any location, given that you know the user credentials.
Full Root-level Access in Dedicated Hosting
Each and every dedicated server
that we supply gives you full root-level access, when the server is ordered with no Control Panel, or with cPanel or DirectAdmin. If you want to install and run heavy, resource-demanding apps and they have specific requirements about the server software environment that can't be fulfilled by a conventional shared web hosting plan, our servers are the perfect solution. With no Control Panel at hand, you will be able to access the server and modify its settings as well as the content which you upload using a console, whereas with cPanel and DirectAdmin, you will use a graphical interface to manage everything related to your online content, and most server-side settings. As expected, if you get a dedicated server without a Control Panel, you can install some third-party instrument manually, as long as it is compatible with the Operating System that you've chosen at signup. When you pick our Hepsia Control Panel on your order page, you'll have restricted root access, however you can still perform many different things using a Secure Shell console.