Full Root-level Access in VPS Servers
The Linux VPS hosting plans which we provide are suitable for many different purposes, based on what you'd like to install and run on them and what experience you have. If your hosting server features the cPanel or the DirectAdmin hosting Control Panel, you will have full root access and will be able to control your web content through a graphical interface, whereas you may still set up server-side applications which may be needed for your sites and even by offline applications, such as VoIP programs, media encoding software, various frameworks, etc. Devoid of Control Panel, you'll also have full root-level access, but you'll have to do everything using a console. If you choose to use our custom Hepsia hosting Control Panel, there'll be certain root access limitations, but this configuration is the most convenient to manage. Thus, you will be able to choose the virtual server package that you need.
Full Root-level Access in Dedicated Servers
Each dedicated server that we supply gives you full root-level access, when the server is ordered without a Control Panel, or with cPanel or DirectAdmin. If you would like to set up and run heavy, resource-demanding apps and they have specific requirements with regard to the server software environment which can't be fulfilled by a conventional shared hosting package, our servers will be the best solution. Without any Control Panel at hand, you'll be able to access the server and update its settings as well as the content which you upload with a console, whereas with cPanel and DirectAdmin, you will use a graphical interface to control everything related to your web content, and most server-side settings. As expected, if you get a dedicated server devoid of Control Panel, you can always set up some third-party tool manually, as long as it is compatible with the OS that you've chosen at registration. If you choose the Hepsia Control Panel from your order page, you'll have limited root access, yet you'll still be able to do a lot of things through a Secure Shell console.