Full Root-level Access in VPS
Our VPS services feature different levels of access, in order to give you the option to pick the one you need, according to your level of experience and on what you'll need the server for. If you purchase a VPS without Control Panel, you will have full root-level access and you'll control everything from a console, unless you install a third-party software instrument. The servers that are ordered with the DirectAdmin or the cPanel web hosting Control Panel also feature full root access, yet most of the things that are related to your online content can be performed using a graphical interface and not a console. You're able to install many different frameworks or media streaming software, for instance, without a problem. If you order the virtual hosting server with the Hepsia Control Panel, you can still use a Secure Shell console to connect, however, the root access will be reduced. Yet, the Hepsia-equipped servers are the simplest to take care of.
Full Root-level Access in Dedicated Hosting
Each dedicated server that we offer includes full root-level access, when the server is ordered with no Control Panel, or with cPanel or DirectAdmin. If you want to set up and run heavy, resource-demanding applications and they have special requirements with regard to the server software environment that cannot be fulfilled by an ordinary shared website hosting plan, our servers will be the most suitable solution. With no Control Panel at hand, you are able to access the server and customize its settings and the content that you upload with a console, whereas with cPanel and DirectAdmin, you'll use a graphical interface to manage everything related to your web content, as well as the majority of server-side settings. Of course, if you get a dedicated server with no Control Panel, you can install a third-party instrument manually, as long as it supports the Operating System that you have selected at registration. When you select our Hepsia Control Panel on the order page, you'll have limited root access, yet you will still be able to perform a number of things using a Secure Shell console.