Full Root-level Access
What precisely is "Full Rool-level Access"? Does it truly give you complete & full control of a server?
If you have root-level access to a server, it means that you'll have full control of it. That is to say, you'll be able install any server-side app whatever the changes that it'll make to the software setting on your server, and you will be able to both access and customize any file, which includes system files, and modify various settings. You can do this by connecting to the server as a root user who has full privileges to do the aforementioned things and also to generate other users, which includes users that also have full privileges. This particular can be established using a web-based graphical interface or a Secure Shell console. For safety reasons, it is recommended that you create a different user for your daily work and use the root user only when you need to modify the server or to install software that may be needed by a script-driven application that you'd like to run.
-
Full Root-level Access in Dedicated Servers
Each and every
dedicated server that we provide comes with full root-level access, if the server is ordered without a Control Panel, or with cPanel or DirectAdmin. If you'd like to install and run heavy, resource-demanding applications and they have special requirements about the server software environment that cannot be fulfilled by a regular shared website hosting plan, our servers are the optimal solution. With no Control Panel at hand, you can access the server and update its settings and the content which you upload using a console, whereas with cPanel and DirectAdmin, you'll have a graphical interface to control everything related to your web content, and the majority of server-side settings. Of course, if you get a dedicated server devoid of Control Panel, you can set up a third-party software instrument manually, as long as it is compatible with the OS that you've selected at signup. If you pick the Hepsia Control Panel from your order page, you will have limited root access, yet you can still perform quite a lot of things through a Secure Shell console.