Have you ever tried to do something on your computer or phone, only to be met with a message saying you don’t have permission or the right privileges?
Not all users have the ability to do whatever they want with a device’s operating system. Having different privileges for different users is essential for data security and preventing scenarios where unaware users end up accidentally deleting important system files. But what if you want to be able to fully customise your device to better fit your needs?
To learn more about root access, its advantages and disadvantages, and how you can get it for various operating systems (including Linux, Windows and Android), keep on reading.
Root access meaning
Having root access means that you’re authorised to access any resource and execute any command on a device (such as a computer, server or mobile phone). In other words, you have the highest level of access possible and everything is available to you.
Sometimes, a root account (an account that has full access to everything on the device) is called an administrator account. These terms are often used interchangeably, but in some cases, an administrator account has slightly lower privileges.
If you see the terms ‘root user’, ‘administrator’ or ‘superuser’, this indicates that this user has full privileges and can make changes to how the device is configured.
With root access, you can accomplish the following tasks on your server:
- Split and merge multiple cPanel accounts using SSH
- Upgrade PHP using EasyApache
- Configure firewall settings
- Mount and unmount file systems
- Disable ModSecurity for a domain
- Use the Linux top command in batch mode
- Install third-party software
- Host multiple websites
- Develop and test your own applications
- Manage servers
Any other users will have fewer privileges, which could mean they have the ability to see system files but can’t edit them.
What is the kernel in an operating system?
Your device’s operating system will have different layers of access, with the deepest layer being the kernel.
This is a computer program at the core of the operating system. It controls everything in the operating system and facilitates communication between your device’s hardware and software.
Other layers in your operating system will include device drivers, the file system, application programming interfaces (APIs) and the user interface (UI), which is the point of human-computer interaction.
Varying levels of privilege are needed to access different layers of the operating system, with only root users (or superusers) being able to access the kernel.
Operating system privileges
Operating systems have different levels of privileges that determine what users can and cannot do.
For example, if you only have ‘read’ privileges for certain files, you can view them but not edit them. To make changes, you would need ‘write’ privileges. Some users may have even lower access, preventing them from viewing certain files at all – this is particularly useful for public computers to enhance data privacy.
A key security guideline is the ‘principle of least privilege’, which means users should only have the minimum permissions necessary to perform their tasks. This helps prevent mistakes like accidentally deleting important system files and ensures sensitive information remains protected.
Most users operate with limited privileges, while the root user has the highest level of access, unrestricted by read or write permissions. Because of this, the root user must be highly knowledgeable and authorised to access all data on the system.
Root access in VPS hosting, cloud hosting and dedicated server hosting
Full root access is often listed as a benefit in VPS hosting, dedicated hosting and cloud hosting packages.
As explained above, this means you can see and edit all files – even system-critical documents. This means you can fully customise your server, which is very beneficial for those who have specific tasks in mind for their server (e.g. developing and testing their own apps).
For cheaper shared hosting packages, full root access isn’t possible. This is because you’re sharing the same physical server with other customers, so you can’t personalise it to your exact preferences. Plus, if one person started editing system files, this could compromise the performance and security of the server for all other customers.
However, since VPS, cloud and dedicated hosting all give you access to your own isolated server environment (either virtual or physical), you get complete control over its setup and configuration.
Full access isn’t a necessary feature for all customers, and in some cases, it can do more harm than good. For inexperienced users who only want to perform basic server functions (such as hosting a website or storing data), a managed server may be a better choice.
Although they may be a little more expensive, this option is a much more user-friendly option for people who don’t have a lot of technical expertise. The provider will handle the server configuration and general server management, so you’ll still be able to continue your daily tasks with less risk that important system files could be accidentally altered or deleted.
How to get root access on different operating systems
How does root access work for the most common operating systems? Find out as we discuss some of the key operating systems:
Root access: Linux
Linux is one of the most popular server operating systems. By default, a root account is created when you install it. This account can modify the operating system as needed, but it’s not meant to be used as a regular user account.
If a user wants to temporarily get root access to make higher-level changes to the device, they can use the ‘sudo’ (superuser do) command. To do this, you’ll need to:
- Open the Terminal menu item, which opens a text-based terminal interface.
- Type in the ‘sudo’ command followed by a command for what you want to do.
- Provide your username and password.
Only users with administrator privileges (i.e. those added to the ‘/etc/sudoers’ file) can use this sudo command. If you don’t have these privileges, you’ll need to use the ‘su -’ command and provide the root password. The command is then preserved until the end of the session.
Root access: Windows
With a Windows server, you’ll also get access to a root or administrator account to make your preferred changes.
To log into your Windows server with this root account, you’ll need to establish a Remote Desktop Connection.
Launch the Remote Desktop Connection application, type in the ‘Administrator’ username and administrator password (which should have been provided by your hosting company), and type in your server’s IP address. This will connect you to your server with your administrator or root account, giving you full root access.
On a Windows computer, the primary user account used to also be the administrator account. However, this has changed with modern versions of Windows to provide more security.
Now, the built-in administrator account is not enabled by default and should be used sparingly. If you try to perform an action that requires root privileges, you’ll trigger a Windows User Account Control (UAC) prompt. You will then have to provide the administrator password to continue.
Alternatively, you can launch the Command Prompt or Windows Terminal from the administrator account to avoid having to repeatedly provide a password.
Root access: Android
Although Android is an open-source operating system, you won’t have root access when you buy an Android device such as a smartphone. This is to prevent people from making mistakes when attempting system changes.
So how can you make these changes to your Android device if you don’t have a root account like with Linux and Windows? To get around this, you can use a rooting app to gain access to certain phones, or you may need to use a computer and the Android Debug Bridge (ADB) programming tool to get this done with other phone models. Make sure you read or watch a rooting tutorial for your specific device before getting started.
Once you’ve got access to your Android phone, you can alter or replace system settings and applications, remove provider bloatware (unwanted pre-installed software) and download any software or apps you want.
All of these changes can open up your device to potential system failures or malware, so root your Android device at your own risk.
Root access: Apple
For Apple products, you either need root access to macOS or iOS depending on which device you’re using.
If you have an Apple Mac computer, the method for gaining root access to macOS is similar to getting itto the Linux operating system. You can gain it temporarily when trying to perform specific actions by clicking on the lock icon. You’ll need to enter the root user password to unlock system settings, and you can lock them again when you’re done.
The process of rooting iOS devices (e.g. iPhones and iPads) is called jailbreaking. Again, like with rooting an Android device, you’ll need to look at specific instructions for your particular Apple device if you’re interested in jailbreaking, but the general idea is that you’ll use jailbreaking software and tools to break the iOS security measures. Once this is complete, you can download apps from third-party stores, remove bloatware and completely personalise your device.
Advantages of rooting and root access
If used correctly, root access can help you unlock the full potential of your device. Here are the key benefits:
- Full customisation and control
Root access lets you personalise your device, from icons and wallpapers to security settings and software. On a server, it enables advanced configurations like hosting multiple websites or testing custom applications.
- Improved performance
By removing unnecessary pre-installed software, you can free up storage and enhance your device’s speed.
- Ability to download any app or software
Root access removes restrictions on third-party apps, allowing you to install software that would otherwise be blocked, such as apps outside the Apple App Store.
- Access to the latest updates
With root access, you can manually install updates, which is especially useful for older devices no longer supported by manufacturers or for unmanaged servers requiring manual updates.
Disadvantages of rooting and root access
Root access offers great control but also comes with risks, especially if misused:
- Bricking your device
Deleting or modifying critical system files can render your device unusable.
- Voiding your warranty
Many manufacturers void warranties if a device is damaged due to rooting, leaving you responsible for repair costs.
- Increased security risks
Rooting bypasses built-in security, making your device more vulnerable to malware and cyber threats, especially when downloading apps from unverified sources.
- Data security concerns
Malware or mismanaged root permissions can lead to data breaches. In a privilege escalation attack, unauthorised users could gain access to sensitive information.
Unrooting a device
To unroot a device, you can use a root management app to uninstall root access or manually delete root files from the system.
Another option is to reinstall the stock firmware, which restores the device to its original state. Some dedicated unrooting apps can automate the process for you.
If all else fails, performing a factory reset may help, though it might not fully remove root access in some cases.
Note: If you’re wanting to sell any of your technology, e.g. your phone or laptop, always ensure you return it to its original state before passing it on.
To keep your data safe on your computer or server, you should always follow the principle of least privilege. Only allow trusted people (or just yourself) to have root access to the device’s operating system.
If you’re running a business, you should always follow the principle of least privilege. Only allow trusted people (or just yourself) to have root access to the device’s operating system – this will ensure sensitive data remains in safe hands.
For more online safety and data security tips, such as how to back up your website or keep your server secure, visit the Fasthosts blog.
To learn more about root access on your devices or servers, get in touch with our friendly support team today for further advice.