Full Root-level Access in VPS Servers
Our VPS plans include different degrees of access, to give you the option to select the one you need, depending on your level of experience and on what you want the server for. If you buy a VPS devoid of Control Panel, you will have full root-level access and you can control everything through a console, unless you install some third-party software tool. The servers that are ordered with the DirectAdmin or the cPanel hosting Control Panel also feature full root access, however most of the things which are linked to your web content can be performed through a graphical interface and not a console. You can install various different frameworks or media streaming software, for instance, without a problem. When you obtain the virtual hosting server with the Hepsia Control Panel, you can still use a Secure Shell console to connect, however, the root access will be limited. Yet, the Hepsia-equipped servers are the easiest to control.
Full Root-level Access in Dedicated Servers
Each dedicated server that we provide comes with full root-level access, when the server is ordered with no Control Panel, or with cPanel or DirectAdmin. If you want to install and run heavy, resource-demanding applications and they have special requirements with regard to the server software environment which can't be fulfilled by a conventional shared web hosting package, our servers are the optimal solution. Without any Control Panel at hand, you're able to access the server and update its settings as well as the content that you upload with a console, while with cPanel and DirectAdmin, you'll have a graphical interface to manage everything related to your online content, and the majority of server-side settings. Needless to say, when you get a dedicated server with no Control Panel, you can always set up a third-party software tool manually, as long as it is compatible with the OS that you have chosen at registration. When you select our Hepsia Control Panel on your order page, you will have restricted root access, but you can still perform many different things using a Secure Shell console.