Full Root-level Access in VPS
The Linux VPS which we offer are appropriate for different purposes, based on what you intend to install and run on them and the experience that you have. If your server is provided with the cPanel or the DirectAdmin hosting Control Panel, you will have full root access and will be able to control your web content through a graphical interface, while you can still install server-side applications that may be required by your sites and even by offline apps, for instance VoIP software, media encoding software, various frameworks, etc. Devoid of Control Panel, you'll also have full root-level access, but you'll have to do everything using a console. When you choose to use our in-house made Hepsia hosting Control Panel, there will be certain root access limitations, but this configuration is the simplest to manage. That way, you will be able to pick the virtual server plan that you need.
Full Root-level Access in Dedicated Hosting
Each and every dedicated server that we supply features full root-level access, when the server is ordered with no Control Panel, or with cPanel or DirectAdmin. If you would like to install and run heavy, resource-demanding apps and they have special requirements regarding the server software setting which can't be fulfilled by a standard shared web hosting plan, our servers are the best solution. Without Control Panel at hand, you will be able to access the server and update its settings and the content that you upload with a console, whereas with cPanel and DirectAdmin, you will have a graphical interface to manage everything related to your online content, as well as the majority of server-side settings. Of course, when you get a dedicated server without a Control Panel, you can install a third-party instrument manually, as long as it is compatible with the Operating System that you have chosen at registration. When you choose our Hepsia Control Panel from your order page, you will have restricted root access, yet you will still be able to do lots of things using a Secure Shell console.