Acceptable use policy

Here you can find our Acceptable Use Policy

Resource Abuse

The following are prohibited from use on our server and may not be uploaded or run. Reasons for banning them include adverse effects on server load, invitations to hackers/spammers/criminal activity, etc. Violation will result in immediate suspension without prior notice of the service.

- Nulled Scripts
- Illegal Torrents
- Public Proxy servers/VPN
- SPAM
- TOR
- Slowloris Scripts
- Source or Target of intentional DoS/DDoS attacks
- CPU Wasting Scripts Such as Bitcoin mining and/or Runescape bots
- CPU usage exceeds 90% continuously (Dedicated services excluded)

Security Violations

You may not use the Services to violate the security or integrity of any network, computer or communications system, software application, or network or computing device (each, a “System”). Prohibited activities include:

1- Accessing or using any System without permission, including attempting to probe, scan, or test the vulnerability of a System or to breach any security or authentication measures used by a System.

2- Monitoring of data or traffic on a System without permission.

3- Forging TCP-IP packet headers, e-mail headers, or any part of a message describing its origin or route. The legitimate use of aliases and anonymous remailers is not prohibited by this provision.

Network Abuse

You may not make network connections to any users, hosts, or networks unless you have permission to communicate with them. Prohibited activities include:

1- Monitoring or crawling of a System that impairs or disrupts the System being monitored or crawled.

2-Inundating a target with communications requests so the target either cannot respond to legitimate traffic or responds so slowly that it becomes ineffective.

3- Interfering with the proper functioning of any System, including any deliberate attempt to overload a system by mail bombing, news bombing, broadcast attacks, or flooding techniques.

4- Operating network services like open proxies, open mail relays, or open recursive domain name servers.

5- Using manual or electronic means to avoid any use limitations placed on a System, such as access and storage restrictions.