When you have root-level access to a hosting server, it means that you will have full control of it. That is to say, you'll be able set up any server-side app whatever the changes that it'll make to the software environment on the server, and you'll be able to both access and modify any kind of file, which includes system files, and modify any settings. You can do this by connecting to the server as a root user that has full privileges to perform the aforementioned things and also to make other users, including users who also have full privileges. The connection can be established using a web-based graphical interface or a Secure Shell console. For safety reasons, it is recommended that you make one more user for your everyday work and employ the root user only when you have to modify the server or to install software that may be required by some script-driven application that you would like to run.

Full Root-level Access in Dedicated Servers

When you select the cPanel or the DirectAdmin website hosting Control Panel, you will have full root access to your new dedicated server, no matter which of our plans you'll choose during the registration process. The exact same is valid when you choose not to use a Control Panel at all. Our servers provide you with the opportunity to run both really resource-demanding applications that are too heavy for a standard shared hosting account and applications which have specific requirements as to what the program environment on your hosting server needs to be. The latter is something which cannot be achieved on a shared machine, as no server-side software can be installed on it. The difference between the aforementioned solutions is that without having a Control Panel, server management can be done only through a console, while if you acquire cPanel or DirectAdmin, most system settings along with your site content can be managed through a graphical interface. If you choose Hepsia, which is the last Control Panel option on the registration page, you will receive a server with limited root access.