Full Root-level Access
What exactly is "Full Rool-level Access"? Does it really supply you with complete & full control of a web server?
When you have root-level access to a server, it means that you will have full control of it. In other words, you can set up any server-side application no matter what the changes that it will make to the software environment on your server, and you're able to both access and customize any kind of file, which includes system files, and modify any settings. You can do this by connecting to the server as a root user that has full privileges to perform all these things and to make other users, which includes users that also have full privileges. This connection can be established using a web-based graphical interface or a Secure Shell console. For safety reasons, it's recommended that you make a separate user for your everyday work and use the root user only when you need to modify the server or to set up software that may be needed by some script-driven app that you wish to run.
-
Full Root-level Access in Dedicated Servers
Each and every
dedicated server that we supply includes full root-level access, if the server is ordered without a Control Panel, or with cPanel. If you'd like to set up and run heavy, resource-demanding apps and they have special requirements regarding the server software setting which cannot be fulfilled by a conventional shared website hosting package, our servers are the best solution. Without any Control Panel at hand, you're able to access the server and customize its settings as well as the content that you upload using a console, while with cPanel you will use a graphical interface to take care of everything related to your online content, and most server-side settings. Of course, if you get a dedicated server devoid of Control Panel, you can set up a third-party instrument manually, as long as it is compatible with the Operating System that you have selected at signup. When you choose the Hepsia Control Panel from the order page, you'll have limited root access, however you'll still be able to perform quite a lot of things through a Secure Shell console.