Categories

Articles

 Archieve or backup storage

Using shared hosting account as a backup/storage device is not permitted. This includes but not...

 Black Hat SEO

Black Hat search engine optimization is customarily defined as techniques that are used to get...

 Compromised Email Account Recovery

The steps to recover your email account. Change the email account's password. At least 8...

 Compromised Websites Recovery

The steps to recover your websites.   Take your site down or put it into maintenance mode...

 Distributed Denial of Service (DDoS)

Refers to DoS (Denial of Service) - an acronym for the disruption that results from an attack on...

 Google search engine show "This site may be hacked"

Why I am seeing messages at google search engine "This site may be hacked" for my websites? Â...

 How to handle Google Attack Site Report?

When you see the warning "Google Attack Site" warning, you should immediately submit a ticket to...

 Image hosting

Using shared hosting account as a image hosting is not permitted on our servers. An image hosting...

 Maximum Mysql Database size

We allow unlimited number of MySQL databases, but in the interest of server stability, you have...

 My Account is Suspended!!!

If your account was suspended andyou are unable to access your website, it is most likely due to...

 Pirated Software/Warez

Infringement to intellectual property rights such as hosting Pirated Software/Warez is prohibited...

 Providing 'tracker' services to 'BitTorrent' clients

BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data....

 Realtime chat/Shoutbox

A real time chat or Shoubox which also known as saybox, tagboard or chatterbox is a chat-like...

 S-HTTP (Secure HTTP)

S-HTTP (Secure HTTP) is an extension to the Hypertext Transfer Protocol (HTTP) that allows the...

 Scraper Site

What is a scraper site?   A scraper site is a website which pulls content from other sources...

 Search Engine Optimization (SEO)

Search engine optimization (SEO) is the process of improving the volume or quality of traffic to...

 Security Information error in Internet Explorer when using https URL

If you encounter prompt up windows about security information everytime you browse your website...

 Spam Emailing: China_The Confirmation Of Intellectual

For some reason, you might receive the email as below Â...

 Spamdexing

Spamdexing (also known as search spam, search engine spam or web spam) involves a number of...

 Spoofing Attack

A spoofing attack, in computer security terms, refers to a situation in which one person or...

 Telnet Scripts

Telnet (teletype network) is a network protocol used on the Internet or local area networks to...

 Topsites

Using hosting account host a Topsites is not permitted on our servers. Topsite is refer to...

 Web Proxy

A common proxy application is a caching Web proxy. This provides a nearby cache of Web pages and...

 Why is my IP address blocked from making delivery to specific recipient

Every machine needed an IP in order to connect to Internet and current Internet Service Provider...

 iFrame

If your antivirus alerts you for abnormal connection or you receive virus alert notification...