Full Root-level Access in VPS Hosting
The Linux VPS hosting packages that we supply are appropriate for different purposes, based on what you would like to install and run on them and what experience you have. When your hosting server is provided with the cPanel or the DirectAdmin website hosting Control Panel, you'll have full root access and will be able to manage your online content through a graphical interface, while you can still install server-side applications that may be needed by your websites and even by offline applications, for example VoIP software, media encoding software, various frameworks, etc. Without any Control Panel, you'll also have full root-level access, but you'll need to do everything using a console. If you choose to use our custom-built Hepsia hosting Control Panel, there will be certain root access restrictions, but this configuration is the most convenient to manage. This way, you'll be able to select the virtual server package that you need.
Full Root-level Access in Dedicated Web Hosting
Each and every dedicated server that we provide provides you with full root-level access, if the server is ordered without a Control Panel, or with cPanel or DirectAdmin. If you wish to install and run heavy, resource-demanding apps and they have special requirements about the server software setting which cannot be fulfilled by a regular shared website hosting package, our servers will be the best solution. With no Control Panel at hand, you are able to access the server and customize its settings as well as the content that you upload with a console, whereas with cPanel and DirectAdmin, you'll have a graphical interface to control everything related to your web content, and most server-side settings. Needless to say, if you get a dedicated server without a Control Panel, you can set up a third-party software tool manually, as long as it is compatible with the Operating System that you've selected at registration. When you pick the Hepsia Control Panel on your order page, you will have limited root access, yet you can still perform a number of things using a Secure Shell console.