I have to go with the comments above, it can be done, but why would you want too.
Besides a good server, I tend to use HP Proliant Blade Servers, currently G9's, can run right around $7,000.00 per server. To run a system efficiently you will need at least 2 for redundancy and most configuration that I setup I recommend 4. That's a lot of cash for a high availability hardware solution for a personal website. By the way that does not include the rack, the power supplies, and the special cooling that is needed to support good servers. You would also need a good disk array system, that can add a few thousand dollars to the cost.
There is much more to a good high reliability server than a motherboard and a disk drive.
One of the real areas of concern that has not been mentioned above is the security concerns. I have setup many hosted servers for customers that have large sites and want to manage their own servers and it can be very cost prohibitive. Once you get the server actually setup and configured to manage the site, which takes some serious knowledge of server configurations and web software, then you have to deal with the security that you will install on the server to make certain that unscrupulous people do not access your server. Believe me they are there and they will do all they can to access your system.
Let me give you an example. One of my customers setup a small business system to increase the business for a local brick and mortar business and increase their local visibility and sales. We spent about 45 days getting the site setup and the hardware configured to support the website. We used some pretty high tech security cloud software to restrict access to the server. I do not want to mention the vendor as I think this could have happened with any vendor.
After about 45 days we had noticed that the server was running slow and appeared to be sluggish when responding to web requests. The customer called us in and we had found that the server had been hijacked and was being used to send 100's of thousands of spam emails from a phantom source. It looked as through it had been reconfigured soon after we completed the installation and it just had not been noticed because the customer was not really monitoring the resources of the system. What concerned us most was we had been locked out of the configuration files and were not able to get back in without a complete format of the system and a re installation of all the software. Luckily when I have a team setup a business server we create a complete set of hard drives, that are not in the system, that can be hot swapped we brought the server down and reset all the EEPROM, reconfigured the hardware and replaced the drives.
We were back up in about an hour. We never could recover those drives, they had been encrypted with an algorithm that we had not seen before and the way the MBR had been setup we could not get into them without the key. Had we not had those drives this could have been a very expensive recovery for the customer. Soon after that, we moved to a hardware key for that customer and all our high visibility customers to see that could not happen again. The keys can be pricey, they run about 100 bucks per CPU, and take some serious time to configure and install but no changes can be made to the system with out the hardware key. The key changes it's 16 digit Alpha-Numeric code every 30 seconds, the code must be entered to access the system.
Unless you have the time, knowledge and the money I would not host my own sites. It requires a lot of work, and takes away time that you could be using to increase your web presence.
There are a lot of jerks out there that nothing better to do then try to disrupt your systems.