The provision of the Services by the Contractor is based on the terms and conditions set forth below:
1. SUBSCRIBER ACCOUNT
1.1. When registering on the Contractor’s website, the Subscriber shall provide reliable and detailed information on themselves, including their contact information. The Subscriber is responsible for performance of e-mail addresses and mobile phone specified at registration. The Subscriber is required to register with the email address that is in a domain that is not in the Contractor’s service. To contact the Subscriber concerning provision of the Services, the Contractor shall send notifications by e-mail and through Short Message Service (SMS, Viber, Telegram etc.) to the Subscriber’s telephone number.
2. LIST OF UNACCEPTABLE MATERIALS WHEN PROVIDING SERVICES
2.1. All Services provided by the Contractor should only be used for legitimate purposes and does not contradict the international legislation.
2.2. The Subscriber is prohibited from taking measures to place electronic (digital) information with copyright infringements and (or) violations of any related rights of third parties. This includes but is not limited to the illegal distribution of music, books, pictures, magazines or any other works protected by copyright. Trying to sell counterfeit goods will lead to the immediate blocking of your account. Any account with histories of copyright infringement will be fully or partially blocked. Any account with histories of repeated violation of copyright will be blocked and/or deleted from our host.
2.3. Using shared hosting account for backups or data warehouse is prohibited.
2.4. The list of unacceptable materials:
2.1.4. Warez, crack resources;
2.4.2. sites for selling accounts (social media, online games, skype, paypal, email accounts, etc.);
2.4.3. sites that are devoted to counter-strike, half-life, line age, world of warcraft and all other games (all games, regardless of name, type, genre and the like);
2.4.4. pirated files of movies, music, books, television, and computer programs (even if the video files and music are on other servers);
2.4.5. financial pyramid sites, sites dedicated to the organization of MMM, “mutual assistance” sites, sites advertising any financial pyramids;
2.4.6. sites of hyip projects (fraudulent project, similar to the investment fund with a high yield), the sites advertising hyip projects, sites with ratings of hyip projects;
2.4.7. sites and forums focused on hackers;
2.4.8. torrent trackers;
2.4.9. applications used in social networks;
2.4.10. websites which distribute smoking blends, narcotics and marijuana seeds, or sites promoting such activities;
2.4.11. Internet pharmacy’s sites, sites distributing drugs, or sites promoting such activities;
2.4.12. casinos, betting sites;
2.4.13. sites promoting illegal activities;
2.4.14. fishing sites (clones of existing sites);
2.4.15. websites of political parties and political movements, and any other websites related to politics or containing political information;
2.4.16. pornographic sites, webcam sites, sites of escort services;
2.4.17. cardsharing services;
2.4.18. services with automatic payment of funds;
2.4.19. proxy and anonymizers;
2.4.20. network scanners;
2.4.21. programs to guess passwords, keyloggers;
2.4.22. scripts for sending spam;
2.4.23. file sharing services, file sharing sites for images and the like;
2.4.24. sale of any drugs, for which a license is required without the appropriate license;
2.4.25. lottery sites with gambling;
2.4.26. crawl and indexer scripts which are engaged in downloading information from unauthorized sites;
2.4.27. sites for currency and cryptocurrency exchange;
2.4.28. state information resources.
2.5. The Contractor reserves the right at any time (in whole or in part) to refuse to provide the Services, the Contractor also has the right, without agreement with the Subscriber, to block domain names, if the Subscriber’s website contains any materials that, in the opinion of the Contractor, are obscene, threatening or defaming honor, dignity and business reputation of a person, contain libel, as well as materials highlighting hostility, violence, aggression, racism, separatism, and/or materials that violate the requirements to provision of the Services.
2.6. Subscribers shall bear full responsibility for all actions made through their Services Control Panels. In particular, if a login and password to the Services Control Panel become known to third parties, or if a website is subject to unauthorized entry because of vulnerability of the code. The Subscriber shall update their website to the latest versions of the software and use complex passwords that will be difficult to match for an attacker, and use all available security systems to prevent use of your login and password, namely: limiting access to FTP from certain IP addresses, using two-factor protection with one-time passwords. In case of unauthorized access to the account, the Contractor has the right to restrict access to it until the Subscriber takes appropriate measures.
3.1. Any Subscriber who carries out a mass mailing of unsolicited emails (SPAM) will be immediately blocked with a notification or without it. Sites that are advertised using SPAM should not be placed on our servers. Any account whose actions led to the appearance of an IP address located in the space of our company’s IP addresses on the blacklist will be blocked immediately.
4.1. If the Contractor’s employees identify any viruses in the Subscriber’s account, the employees shall send a message to the Subscriber about the detected viruses, shell scripts, other malicious software and ask them to react as soon as possible and to clear their account of viruses.
4.2. The Subscriber is fully responsible for all actions made through their accounts, including cases of infection with viruses, shell scripts and other harmful and dangerous software. In particular, if the login and password to the account came to be known to third parties.
5. USING RESOURCES
5.1. The Subscriber should not:
Use more than 25% of system resources for more than 90 seconds.
Use more than 100 processor minutes per day.
Run the processes that perform server role.
Run any type of search indexer on shared hosting servers. The exception is the search engines that index only subscriber sites.
Run the software that interacts with the torrent trackers.
Run game servers such as counter-strike, half-life, line age etc.
Participate in file-sharing networks.
Run cron tasks with an interval of less than 15 minutes.
Execute SQL queries that run longer than 15 seconds. In MySQL tables correct codes should be used.
Create the MySQL data with volume of more than 2GB or containing more than 1,000 tables. The total volume of all user databases should not exceed 3GB.
The opportunity to connect to MySQL server not from shared hosting server is provided only for the database service.
When using include function in PHP not to use the URL to connect local files. Instead of using the include (‘http://domain.com/include.php’) use include (‘include.php’);
To improve performance, do not disconnect handling static files using nginx in the control panel.
6. SERVICE USE LIMITATIONS
6.1. Resources that are not subject to restrictions or are described in the tariff plan as “businesses” are created so that the Subscriber does not worry about sudden downtime of the Service due to exceeding the limit, for example, a database or a mailbox due to running out of the tariff plan.
However, the resources of servers and Internet channels are not unlimited, therefore, the Contractor requires that Subscribers use the resources of the Contractor, taking into account that other Subscribers need to use them as well on equal terms.
In order to prevent excess consumption of resources by the Subscriber, the Contractor reserves the right to impose limitations on the Subscriber.
6.2. The limit that will trigger limitation of the resources when reached is calculated on the basis of consumption statistics. This statistics varies monthly, but one rule remains constant: 99.95 subscribers fall within the scope of “normal” use. The remaining 0.05% of subscribers will receive a notification to their contact e-mail with a request to reduce resource consumption within 48 hours.
6.3. If the Subscriber fails to reduce resource consumption within 48 hours after receiving the Contractor’s notification with a request to reduce the consumption of server or Internet channel resources, or in case of systematic exceeding of the resource consumption limit, the Contractor reserves the right to suspend the provision of the Services or to terminate the Agreement unilaterally.
7. RESTRICTIONS ON THE FILE SYSTEM USE
7.1. If virtual hosting account contains more than 200,000 inode (inode is a file system object which contains information about the files, directories etc. Each file that is a page of a website, picture, email message in your account uses one inode), then the Subscriber will be sent a request to reduce the number of inode. If actions to reduce the number of inode are not taken we will block the account.
7.2. Backup of virtual hosting accounts, dedicated servers with administration services, and VPS servers containing more than 200,000 inodes or having a capacity of more than 10 GB is not performed, except for the databases for which backups will be created.