Knowledgebase

  • Unmatched Support
  • Unmatched Uptime
  • cPanel Included

Your Trusted Hosting Solutions Partner > Knowledgebase > Abuse and Security


Archieve or backup storage
Using shared hosting account as a backup/storage device is not permitted. This includes but not...
Black Hat SEO
Black Hat search engine optimization is customarily defined as techniques that are used to get...
Distributed Denial of Service (DDoS)
Refers to DoS (Denial of Service) - an acronym for the disruption that results from an attack...
How to handle Google Attack Site Report?
When you see the warning "Google Attack Site" warning, you should immediately submit a ticket to...
iFrame
If your antivirus alerts you for abnormal connection or you receive virus alert notification...
Image hosting
Using shared hosting account as a image hosting is not permitted on our servers. An image...
Maximum Mysql Database size
We allow unlimited number of MySQL databases in certain hosting packages, but in the interest of...
My Account is Suspended!!!
If your account was suspended andyou are unable to access your website, it is most likely due to...
Pirated Software/Warez
Infringement to intellectual property rights such as hosting Pirated Software/Warez is...
Providing 'tracker' services to 'BitTorrent' clients.
BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data....
Realtime chat/Shoutbox
A real time chat or Shoubox which also known as saybox, tagboard or chatterbox is a chat-like...
S-HTTP (Secure HTTP)
S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that...
Scraper Site
What is a scraper site? A scraper site is a website which pulls content from other sources and...
Search Engine Optimization (SEO)
Search engine optimization (SEO) is the process of improving the volume or quality of traffic to...
Security Information error in Internet Explorer when using https URL
If you encounter prompt up windows about security information everytime you browse your...
Spam Emailing: China_The Confirmation Of Intellectual
For some reason, you might receive the email as below....
Spamdexing
Spamdexing (also known as search spam, search engine spam or web spam) involves a number of...
Spoofing Attack
A spoofing attack, in computer security terms, refers to a situation in which one person...
Telnet Scripts
Telnet (teletype network) is a network protocol used on the Internet or local area networks to...
Topsites
Using hosting account host a Topsites is not permitted on our servers. Topsite is refer to...
Web Proxy
A common proxy application is a caching Web proxy. This provides a nearby cache of Web...
Why is my IP address blocked from making delivery to specific recipient
Every machine needed an IP in order to connect to Internet and current Internet Service...