Knowledgebase
Your Trusted Hosting Solutions Partner > Knowledgebase > Abuse and Security
Articles
Archieve or backup storageUsing shared hosting account as a backup/storage device is not permitted. This includes but not...
Black Hat SEOBlack Hat search engine optimization is customarily defined as techniques that are used to get...
Distributed Denial of Service (DDoS)Refers to DoS (Denial of Service) - an acronym for the disruption that results from an attack...
How to handle Google Attack Site Report?When you see the warning "Google Attack Site" warning, you should immediately submit a ticket to...
iFrameIf your antivirus alerts you for abnormal connection or you receive virus alert notification...
Image hostingUsing shared hosting account as a image hosting is not permitted on our servers. An image...
Maximum Mysql Database sizeWe allow unlimited number of MySQL databases in certain hosting packages, but in the interest of...
My Account is Suspended!!!If your account was suspended andyou are unable to access your website, it is most likely due to...
Pirated Software/WarezInfringement to intellectual property rights such as hosting Pirated Software/Warez is...
Providing 'tracker' services to 'BitTorrent' clients.BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data....
Realtime chat/ShoutboxA real time chat or Shoubox which also known as saybox, tagboard or chatterbox is a chat-like...
S-HTTP (Secure HTTP)S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that...
Scraper SiteWhat is a scraper site? A scraper site is a website which pulls content from other sources and...
Search Engine Optimization (SEO)Search engine optimization (SEO) is the process of improving the volume or quality of traffic to...
Security Information error in Internet Explorer when using https URLIf you encounter prompt up windows about security information everytime you browse your...
Spam Emailing: China_The Confirmation Of IntellectualFor some reason, you might receive the email as below....
SpamdexingSpamdexing (also known as search spam, search engine spam or web spam) involves a number of...
Spoofing AttackA spoofing attack, in computer security terms, refers to a situation in which one person...
Telnet ScriptsTelnet (teletype network) is a network protocol used on the Internet or local area networks to...
TopsitesUsing hosting account host a Topsites is not permitted on our servers. Topsite is refer to...
Why is my IP address blocked from making delivery to specific recipientEvery machine needed an IP in order to connect to Internet and current Internet Service...















