You can gain root privs while logged to ssh. Log in as normal user and then use su to gain root.
Logging in as root <directly> is a serious security risk. Its the only sure login in the system and if it was not blocked it could be used to bruteforce the root's password...
I'm quite aware of the risk. Considering that there is nothing of any real importance to be gained by hacking, I'm not too worried about it. Add onto that the fact that it's within a LAN and I can control where external requests for port 22 will go, then it's even less of a worry. If someone were to manage to gain access, then they'd basically have accomplished nothing. It's not the primary O.S., I don't have any sensitive data on it nor available to it, the password for root is different than the password for other things and (don't kill me anyone) I primarily use pclos to have some sort of Linux OS available to me for fiddling, testing and toying purposes.
Put simply, it's like if someone were to steal a cardboard box out of the backyard. Yes, the thief broke the law, but they gained practically nothing in return.
Oh and yes... I am serious...
That video is a joke. As soon as he used his own password list, I was thinking, "Well of course it's going to work now, because he's included a list that will certainly have the password in it." Even others have commented on that fact.
Now if you want to find me a video that shows a program that can crack the password for a backup file generated by Paragon Partition Manager 10.0 Server, that would indeed be useful. I thought I remembered the password for my backup files but it keeps rejecting the passwords I try to use.