Knowledgebase
Your Trusted Hosting Solutions Partner > Knowledgebase > Abuse and Security
Articles
![](images/article.gif)
Using shared hosting account as a backup/storage device is not permitted. This includes but not...
![](images/article.gif)
Black Hat search engine optimization is customarily defined as techniques that are used to get...
![](images/article.gif)
Refers to DoS (Denial of Service) - an acronym for the disruption that results from an attack...
![](images/article.gif)
When you see the warning "Google Attack Site" warning, you should immediately submit a ticket to...
![](images/article.gif)
If your antivirus alerts you for abnormal connection or you receive virus alert notification...
![](images/article.gif)
Using shared hosting account as a image hosting is not permitted on our servers. An image...
![](images/article.gif)
We allow unlimited number of MySQL databases in certain hosting packages, but in the interest of...
![](images/article.gif)
If your account was suspended andyou are unable to access your website, it is most likely due to...
![](images/article.gif)
Infringement to intellectual property rights such as hosting Pirated Software/Warez is...
![](images/article.gif)
BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data....
![](images/article.gif)
A real time chat or Shoubox which also known as saybox, tagboard or chatterbox is a chat-like...
![](images/article.gif)
S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that...
![](images/article.gif)
What is a scraper site? A scraper site is a website which pulls content from other sources and...
![](images/article.gif)
Search engine optimization (SEO) is the process of improving the volume or quality of traffic to...
![](images/article.gif)
If you encounter prompt up windows about security information everytime you browse your...
![](images/article.gif)
For some reason, you might receive the email as below....
![](images/article.gif)
Spamdexing (also known as search spam, search engine spam or web spam) involves a number of...
![](images/article.gif)
A spoofing attack, in computer security terms, refers to a situation in which one person...
![](images/article.gif)
Telnet (teletype network) is a network protocol used on the Internet or local area networks to...
![](images/article.gif)
Using hosting account host a Topsites is not permitted on our servers. Topsite is refer to...
![](images/article.gif)
Every machine needed an IP in order to connect to Internet and current Internet Service...