Acceptable Use Policy
Acceptable Use Policy(AUP)1. GeneralEach customer who operates a server from IndoSeedBox.com is solely responsible for all stored and transmitted data of the server and all actions which emanate from the server.The customer must take adequate measures which comply with the current state of technology to ensure that any misuse of the server is effectively prevented.IndoseedBox.com reserves the right to block any server at any time which causes a loss of network integrity or affects the network operation of other servers without prior warning including those actions which are not specifically referred to below.IndoSeedBox.com further reserves the right to remove a server from the network if it is deemed to be causing excessive load or traffic over an unacceptably long period.If a customer does not respond and/or take the appropriate action to an abuse notification with in adequate time frame, IndoSeedBox.com may terminate the server without further notice.A refund is not possible.2. Prohibited Uses of IndoSeedBox.com System and Services- IP SpoofingIP spoofing refers to the falsification of the IP sender address for outgoing IP packages.- MAC Spoofing and MAC FloodingMAC spoofing refers to the falsification of a sender address of an Ethernet framework.MAC flooding refers to the sending of Ethernet frameworks with a number of different sender addresses for the purpose of flooding MAC databanks of switches thus causing a malfunctioning of these switches.- ARP Spoofing and ARP FloodingARP spoofing refers to the falsification of an ARP entry on a router by unsolicited ARP replies.ARP flooding refers to the mass transmission of ARP replies for the purpose of flooding the ARP databank of a router and thus causing a malfunctioning of this switch.- Transmission of Switch Protocol FrameworksThe transmission of switch protocol frameworks, in particular spanning tree protocol frameworks (BPDUs)- Transmission of Spam and MalwareSpam refers to the mass transmission of unsolicited or unrequested email advertisements.Malware refers to any type of injurious software e.g. viruses, worms, trojans, backdoors, spyware or illegal dialers.- PhishingPhishing refers to illegal attempts to release access data for security areas to a wide distribution of users. Well known websites are often imitated so as to appear deceptively genuine for this purpose. The websites are reached under domain names which are similar to the original domain names. Users are invited by misleading emails to enter their access data on such hoax websites.- Denial of Service AttacksDenial of Service attacks (DoS) refers to an attack on a server with the purpose of disabling one or more of its services.- Scanning of External ComputersThe Scanning of computers refers to the systematic searching for services on this computer with the purpose of detecting weaknesses in the services in order to utilize them for hacking at a later time.- Non Authorized Access or Attempts of Hacking- Offering of Unlawful InformationThe offering of unlawful or abusive, child pornographic, racist, politically radical, defamatory or offensive information as well as information which contravenes the rights of third parties in whatever form.
Was this answer helpful?
Term Of Service
Terms of Service (ToS) All provisions of this contract are subject to the Terms of Service...
Powered by WHMCompleteSolution