F.A.Q.
What is TShell?
TShell is a powerful automation platform designed to simplify and streamline everyday system administration tasks.
It provides system administrators with an intuitive interface to manage critical server operations without the need to manually execute commands. By reducing complexity and minimizing human error, TShell improves efficiency, consistency, and overall system reliability across single or multi-server environments.
Key Features
TShell offers a wide range of capabilities, including:
Firewall Management
Create, edit, delete, and reorder firewall rules
Apply rules dynamically without manual command execution
Create reusable firewall profiles
Deploy firewall configurations across multiple servers consistently
Server Profile Management
Create and manage configuration profiles
Apply predefined security and system settings to multiple servers
Ensure uniform configurations across infrastructures
Application Installation
Install commonly used system and server applications
Simplify software deployment with guided workflows
Reduce setup time for new servers
Task Automation
Create and manage automated system tasks
Schedule recurring operations
Centralize automation management in a single interface
Centralized Administration
Manage multiple servers from one platform
Standardize administrative operations
Reduce operational overhead
User-Friendly Interface
No command-line interaction required
Clean, intuitive, and accessible design
Suitable for both experienced administrators and less technical users
TShell is designed to make system administration faster, safer, and more scalable, enabling administrators to focus on higher-level tasks rather than repetitive manual operations.
How the licenses works?
TShell licenses are directly linked to multiple verification layers designed to ensure system integrity and prevent license duplication, as well as other unauthorized techniques intended to reuse a license.
Each license can only be used on a single server associated with a unique IPv4 address (the server itself may have multiple IPv4 addresses assigned).
Only servers hosted on Tect.host are eligible to request an IPv4 change or a reset of the security and integrity verification systems in order to register a new device under a different IPv4 address.
This multi-layered verification system has been extensively tested against tunnels, proxies, and other methods commonly used to attempt license duplication, ensuring strong protection against misuse. All attempts to duplicate licenses are permanently logged and may result in license revocation.
Last updated