The 'shared server' hosting environment is the hosting solution for our reseller hosting plans. On the reseller shared hosting solution, your account exists on a server with a number of other resellers and their customer accounts. To ensure that the service we provide is extremely stable, we use a number of technologies that ensure that individual accounts cannot adversely impact on the experience of other users.
This policy exists to clearly define the resource usage limits of our plans, and to also outline content that we don't permit on our servers. We strive to provide excellent performance for all of our client accounts, and so the the aim of this policy is to eliminate bad practices which might lead to clients negatively impacting the performance of others. The vast majority of accounts will never hit the limits we impose, and those that do will almost certainly be adversely affecting the service other users on the server are receiving. This policy is in addition to our terms of service.
Resellers may create individual cPanel accounts on our server. Each account will have a resource allocation. The 'Default Limit' will be applied to all cPanel accounts that are created by the reseller. Individual accounts may be 'boosted' to allow a higher resource allocation, as outlined in the table below:
|CPU Cores||RAM||I/O||PHP Processes||Concurrent MySQL Connections*||Total Processes||Files||Max DB Size||Applies To|
|1||0.5 GB||4 MB/s||20||30||60||250,000||0.5 GB||Standard cPanel Accounts|
|2||1 GB||8 MB/s||40||40||120||350,000||1 GB||Level 1 Boosted cPanel Accounts|
|3||2 GB||12 MB/s||60||60||180||400,000||2 GB||Level 2 Boosted cPanel Accounts|
|4||4 GB||16 MB/s||80||80||240||450,000||3 GB||Level 3 Boosted cPanel Accounts|
|5||8 GB||20 MB/s||100||100||300||500,000||4 GB||Level 4 Boosted cPanel Accounts|
Any processes attributed to or initiated by your user account, must not:
Unsolicited email / SPAM carries not only a financial burden, but can also severly damage our reputation as a spam-free network. This damage can prevent legitimate email from being delivered via our network or servers. We therefore maintain a zero-tolerance anti-spamming policy. We prohibit the sending of SPAM or any unsolicited commercial email, being sent either over our network OR over any network if the email advertises or mentions in any way a site hosted on our network.
We do not permit email to be sent from 'bought' lists, you may only send email to lists that you yourself have collected. We are made aware of bought lists as they almost always contain spam trap email accounts, which are monitored by spam prevention groups.
In addition to the sending of bulk email, we prohibit account holders from cross-posting messages on a large number of newsgroups, websites or forums, and/or posting obscene or threatening messages whilst using or referring to an email address or website URL hosted on our network.
If you violate this policy then your account will be subject to a thorough investigation, and may be terminated without notice. Any damages will be prosecuted to the full extent of the law.
We do not permit pornography, including adult oriented pictures, videos, links to adult sites or sites containing content of a sexually explicit nature.
Backups, Storage Archives & FTP Storage Space
Hosting accounts are to be used for the purposes of hosting web sites - they are not to be used to back up content from remote computers, as a general purpose file storage system or as an FTP upload repository. We permit the storage of a single backup of your account to be stored within your space, however these must not be stored for more than 45 days. We do not permit the storing of audio music, videos, photos, or other downloadable media unless these files are being used specifically on your publicly accessible web site.
We do not permit real time chat software to be hosted from within your hosting account. Third party chat solutions that integrate with your website but are remotely hosted are permitted.
All third party web applications that you install must be kept up-to-date. Failure to keep third party applications up-to-date leaves them open to vulnerabilities, which can lead to the server being exploited. It is your responsibility to regularly check for updates to applications - we would suggest doing this once per month. Any applications which are being actively exploited will be automatically quarrantined and we will contact you to advise you of the situation. If you decide to take no action, quarantined files will be automatically deleted after 14 days.
The following are strictly prohibited: