Full Root-level Access in VPS Hosting
When you buy a virtual private servers from our company, you'll have full root-level access in 3 cases - if the server has no hosting Control Panel at all, or if you select cPanel or DirectAdmin throughout the order process. In the first case, you will be able to change each part of the system via a Secure Shell console, while in the second, you can still use SSH to connect and to make adjustments, still you will also have a graphical interface at your disposal to control your web content and almost all the system settings. The root access makes our virtual server plans a great choice in case you would like to run any software which you can't install in a regular shared hosting account. With the last Control Panel option - Hepsia, you will be able to connect by way of SSH and to manage the content on your hosting server, yet the root access privileges will be more limited.
Full Root-level Access in Dedicated Web Hosting
Each and every dedicated server that we offer includes full root-level access, if the server is ordered with no Control Panel, or with cPanel or DirectAdmin. If you wish to set up and run heavy, resource-demanding apps and they have special requirements with regard to the server software setting which can't be fulfilled by an ordinary shared website hosting package, our servers are the right solution. Without Control Panel at hand, you're able to access the server and change its settings as well as the content which you upload through a console, while with cPanel and DirectAdmin, you will have a graphical interface to take care of everything related to your online content, as well as the majority of server-side settings. Needless to say, when you get a dedicated server without a Control Panel, you can install some third-party software tool manually, as long as it supports the Operating System that you've chosen at signup. If you select the Hepsia Control Panel on your order page, you will have restricted root access, however you can still do a number of things through a Secure Shell console.