Acceptable Use Policy

Network Security

Customers may not use our Network with an attempt to circumvent user authentication or security of any host, network, or account. This includes, but is not limited to, accessing data not intended for the customer, logging into a server or account the customer is not expressly authorized to access, password cracking, probing the security of other networks in search of weakness, or violation of any other organization’s security policy.

Server Resources

Any account that uses a high amount or unfair amount of server resources (such as, but not limited to CPU time, memory usage, and network resources) will be given an option of either upgrading their service level or reducing the resource used to an acceptable or fair level. Fair/unfair will be based on the plan price compared to the percentage of the server the account is consuming.

Background Running Programs

Background daemons in general are prohibited. we will consider requests on a per-application basis. If allowed, extra charges will be assessed based on resource requirements for system maintenance.


Content/Activities Not Allowed

  • Child P0rn0graphy
  • Botnet Administration
  • Carding
  • Port Scanning
  • SPAM
  • Phishing Sites
  • Fraudulent Activities
  • Scam Sites
  • Hacking
  • Malware/Virus
  • Terrorist Websites
  • DDoS /DoS From our Servers

Was this answer helpful?

 Print this Article

Also Read

Privacy Policy

Collection of Your Personal Information :In order to access our web hosting...

Terms of Service

Prohibited Things, Activities & Contents on Shared Hosting / VPS Child P0rn0graphyBotnet...

Refund Policy

We take great pride in delighting our customers. Please kindly review our web hosting refund...

Powered by WHMCompleteSolution