Full Root-level Access
Learn about what precisely ‘full root-level access’ indicates, what benefits it will give you and the ways to utilize them to modify your server.
Having root-level access to your server signifies that you can view and change any file on it, which includes important system files. You may also install software that can update certain settings on the server during the process, so that the installation can be performed only if you're signed in as the root user. The aforementioned has full privileges, i.e. you will have full control over the machine whenever you want and you'll be able to do anything you need. You may also create additional users either with similar rights or with fewer rights, based on what you require them for - day-to-day tasks, other server admins, etc. To be on the safe side, it is generally recommended to use the root account only when you actually need it and not for tasks you can do using other accounts. You can use a web-based graphical interface or a Secure Shell console to be able to connect to the server and to manage it at the root level.
Full Root-level Access in Dedicated Web Hosting
When you get one of the Linux dedicated web hosting which we supply, you will have full root-level access and you can do anything that you can't do using a shared hosting account - to modify the server-side PHP settings, to install frameworks or media streaming software, and the like. You'll be able to order the server without any website hosting Control Panel and do everything using a console, unless you install some third-party tool, or you can order it with cPanel or DirectAdmin and use a web-based graphical interface to take care of your websites and many system settings. In all three cases, you'll have complete control over your server. The tremendous amount of system resources which you will get makes our dedicated plans a fantastic choice for any kind of content that you want to have. The servers that are ordered with the Hepsia Control Panel are easier to manage, still the root access to such a machine is limited.