RESOURCE USAGE. Webdukes’s Customers may not initiate the following practices. Webdukes reserves the right to suspend or terminate accounts found in violation of these items with or without prior notice given and without liability. Webdukes reserves the right to determine what constitutes resource abuse and take the appropriate action. In specific, you may not: Use twenty-five percent (30%) or more of our system resources for longer than ninety (90) seconds in any consecutive 3 hour period. Activities that could cause this excessive use, include but are not limited to: CGI scripts, FTP, PHP, HTTP, etc. Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD. Run any type of web spider or indexer (including Google Cash / AdSpy) on shared hosting servers. Run any software that interfaces with an IRC (Internet Relay Chat) network. Run any bit torrent application, tracker, or client. You may link to legal torrents off-site, but may not host a web page or store them on our shared servers. Participate in any file-sharing/peer-to-peer activities Run any gaming servers such as counter-strike, half-life, battlefield1942, etc. Run cron entries with intervals of less than fifteen (15) minutes. Run any MySQL queries longer than fifteen (15) seconds. MySQL tables should be indexed appropriately. Include the URL when using PHP include functions for including a local file. Instead of including ‘▇▇▇▇://▇▇▇▇▇▇▇▇▇▇.▇▇▇/include.php’, use ‘include.php’ or ‘/home/username/public_html/include.php’. Force html to handle server-side code (like php and shtml) to help reduce usage. Use https protocol unless it is necessary; encrypting and decrypting communications is noticeably more CPU-intensive than unencrypted communications. Network Abuse: Webdukes does not allow, condone or authorize any forms of Network Abuse including but not limited to Denial of Service attacks, Phishing attempts, port scans, SYN Floods etc. Webdukes reserves full right to determine what constitutes Network Abuse and take the appropriate action against the Customer with or without prior notification and without liability. You may not engage in illegal, abusive, or irresponsible behaviour, including but not limited to: Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures (including those belonging to Webdukes and its customers) without express authorization of the owner of the system or network; Monitoring data or traffic on any network or system without the authorization of the owner of the system or network; Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; Use of an Internet account or computer without the owner’s authorization, including, but not limited to Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, and port scanning; Forging of any TCP-IP packet header or any part of the header information in an e-mail or a newsgroup posting; Any conduct that is likely to result in retaliation against the Webdukes network. Use of Webdukes’s network in a way that unreasonably interferes with Webdukes’s other customers use of the network. IP Addresses Prohibited Uses: The Services shall not be used to host, post, transmit or retransmit any content or material that harasses others or threatens the health or safety of others. In addition, Webdukes reserves the right to decline to provide Services if the content of then Customer is determined by Webdukes to be obscene, indecent, hateful, malicious, racist, defamatory, fraudulent, libelous, treasonous, excessively violent or promoting the use of violence or otherwise harmful to others.
Appears in 1 contract
Sources: Acceptable Use Policy (Aup)
RESOURCE USAGE. WebdukesDiadem’s Customers may not initiate the following practices. Webdukes Diadem reserves the right to suspend or terminate accounts found in violation of these items with or without prior notice given and without liability. Webdukes Diadem reserves the right to determine what constitutes resource abuse and take the appropriate action. In specific, you may not: ● Use twenty-five percent (3025%) or more of our system resources for longer than ninety (90) seconds in any consecutive 3 6 hour period. Activities that could cause this excessive use, include but are not limited to: CGI scripts, FTP, PHP, HTTP, etc. ● Run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD. ● Run any type of web spider or indexer (including Google Cash / AdSpy) on shared hosting servers. ● Run any software that interfaces with an IRC (Internet Relay Chat) network. ● Run any bit torrent application, tracker, or client. You may link to legal torrents off-off- site, but may not host a web page or store them on our shared servers. ● Participate in any file-sharing/peer-to-peer activities ● Run any gaming servers such as counter-strike, half-life, battlefield1942, etc. ● Run cron entries with intervals of less than fifteen (15) minutes. ● Run any MySQL queries longer than fifteen (15) seconds. MySQL tables should be indexed appropriately. ● Include the URL when using PHP include functions for including a local file. Instead of including ‘'▇▇▇▇://▇▇▇▇▇▇▇▇▇▇.▇▇▇/include.php’', use ‘'include.php’ ' or ‘'/home/username/public_html/include.php’'. ● Force html to handle server-side code (like php and shtml) to help reduce usage. ● Use https protocol unless it is necessary; encrypting and decrypting communications is noticeably more CPU-intensive than unencrypted communications. Network Abuse: Webdukes Diadem does not allow, condone or authorize any forms of Network Abuse including but not limited to Denial of Service attacks, Phishing attempts, port scans, SYN Floods etc. Webdukes Diadem reserves full right to determine what constitutes Network Abuse and take the appropriate action against the Customer with or without prior notification and without liability. You may not engage in illegal, abusive, or irresponsible behaviour, including but not limited to: ● Unauthorized access to or use of data, systems or networks, including any attempt to probe, scan or test the vulnerability of a system or network or to breach security or authentication measures (including those belonging to Webdukes Diadem and its customers) without express authorization of the owner of the system or network; ● Monitoring data or traffic on any network or system without the authorization of the owner of the system or network; ● Interference with service to any user, host or network including, without limitation, mail bombing, flooding, deliberate attempts to overload a system and broadcast attacks; ● Use of an Internet account or computer without the owner’s 's authorization, including, but not limited to Internet scanning (tricking other people into releasing their passwords), password robbery, security hole scanning, and port scanning; ● Forging of any TCP-IP packet header or any part of the header information in an e-e- mail or a newsgroup posting; ● Any conduct that is likely to result in retaliation against the Webdukes Diadem network. ● Use of Webdukes’s Diadem's network in a way that unreasonably interferes with Webdukes’s Diadem's other customers use of the network. ● IP Addresses Prohibited UsesDiadem assigns IP addresses to clients based upon the guidelines of ARIN: The Services shall not ▇▇▇▇▇://▇▇▇.▇▇▇▇.▇▇▇/policy/nrpm.html. All IP Address allocations must be used to host, post, transmit or retransmit any content or material that harasses others or threatens the health or safety of othersjustified based upon this policy. In addition, Webdukes Diadem reserves the right to decline to provide Services if the content of then Customer is determined by Webdukes to request verification at any time for assigned IP addresses at which time under Diadem's discretion IP assignments may be obscene, indecent, hateful, malicious, racist, defamatory, fraudulent, libelous, treasonous, excessively violent or promoting the use of violence or otherwise harmful to othersrevoked.
Appears in 1 contract
Sources: Acceptable Use Policy