Articles
Archieve or backup storage
Using shared hosting account as a backup/storage device is not permitted. This includes but not...
Black Hat SEO
Black Hat search engine optimization is customarily defined as techniques that are used to get...
Compromised Email Account Recovery
The steps to recover your email account.
Change the email account's password.
At least 8...
Compromised Websites Recovery
The steps to recover your websites.
ÂÂ
Take your site down or put it into maintenance mode...
Distributed Denial of Service (DDoS)
Refers to DoS (Denial of Service) - an acronym for the disruption that results from an attack on...
Google search engine show "This site may be hacked"
Why I am seeing messages at google search engine "This site may be hacked" for my websites?
Â...
How to handle Google Attack Site Report?
When you see the warning "Google Attack Site" warning, you should immediately submit a ticket to...
Image hosting
Using shared hosting account as a image hosting is not permitted on our servers. An image hosting...
Maximum Mysql Database size
We allow unlimited number of MySQL databases, but in the interest of server stability, you have...
My Account is Suspended!!!
If your account was suspended andyou are unable to access your website, it is most likely due to...
Pirated Software/Warez
Infringement to intellectual property rights such as hosting Pirated Software/Warez is prohibited...
Providing 'tracker' services to 'BitTorrent' clients
BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data....
Realtime chat/Shoutbox
A real time chat or Shoubox which also known as saybox, tagboard or chatterbox is a chat-like...
S-HTTP (Secure HTTP)
S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the...
Scraper Site
What is a scraper site?
ÂÂ
A scraper site is a website which pulls content from other sources...
Search Engine Optimization (SEO)
Search engine optimization (SEO) is the process of improving the volume or quality of traffic to...
Security Information error in Internet Explorer when using https URL
If you encounter prompt up windows about security information everytime you browse your website...
Spam Emailing: China_The Confirmation Of Intellectual
For some reason, you might receive the email as below
Â...
Spamdexing
Spamdexing (also known as search spam, search engine spam or web spam) involves a number of...
Spoofing Attack
A spoofing attack, in computer security terms, refers to a situation in which one person or...
Telnet Scripts
Telnet (teletype network) is a network protocol used on the Internet or local area networks to...
Topsites
Using hosting account host a Topsites is not permitted on our servers. Topsite is refer to...
Web Proxy
A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and...
Why is my IP address blocked from making delivery to specific recipient
Every machine needed an IP in order to connect to Internet and current Internet Service Provider...
iFrame
If your antivirus alerts you for abnormal connection or you receive virus alert notification...