Terms of Service

The provision of services by HOSTMAGNAT is based on the following terms and conditions.

1. User account

By registering on our site you are responsible for providing complete and truthful information, as well as for the operability of the email address and mobile phone specified during registration. You are required at registration to specify the email address that is in the domain that is not on our service. For communication with you we will use e-mail in some, exceptional cases - a mobile phone. We will also send SMS notifications to the mobile phone number. You must maintain all contact information up-to-date. Providing inaccurate contact information may result in the suspension of your account. To provide dedicated servers, you will need to provide a scan-copy of documents that can verify your identity. In case you can not confirm your identity, the order will be considered fictitious and all services will be blocked.

2. Content hosting accounts

All services provided by HOSTMAGNAT must be used only for legal purposes and do not conflict with the current Ukrainian legislation and international legislative acts.
Use of services for copyright infringement is prohibited. This includes, but is not limited to, the illegal distribution of music, books, photographs, magazines or any other work protected by copyright. An attempt to sell counterfeit products will result in immediate blocking of your account. Any account found to be in violation of copyright will be fully or partially blocked. Any account noticed in a repeated copyright infringement will be blocked and / or removed from our hosting.
Using virtual hosting accounts to store backups or as data storage is forbidden.

List of inappropriate materials on the hosting:

  • Warez, crack resources;
  • sites for the sale of accounts (social network, online games, skype, paypal, mail accounts, etc.);
  • sites devoted to the games cs, wow, la2, and all other games (all games, regardless of name, type, genre, etc.);
  • pirated archives of films, music, books, television and computer programs (even if files with video and music are on other servers);
  • sites of financial pyramids, sites dedicated to the organization of MMM, "mutual assistance" sites;
  • Sites of hyip projects (fraudulent project, similar to an investment fund with high profitability), sites advertising hyip projects, sites providing ratings for hyip projects;
  • hacker-targeted websites and forums
  • torrent trackers
  • Applications that are used on social networks
  • sites distributing smoking mixtures, narcotic substances and marijuana seeds, or sites advertising such activities
  • online pharmacies, sites that distribute medicines, or sites advertising such activities
  • casinos, betting sites
  • sites advertising illegal activities
  • phishing sites (clones of existing sites)
  • sites of political parties and political movements, any other sites related to politics, or containing political data
  • pornographic sites, webcam sites, escort services sites
  • carding services
  • IRC scripts and bots;
  • proxies and anonymizers
  • network scanners;
  • password recovery programs, keyloggers
  • scripts for sending spam, sites advertising services for sending spam;
  • file sharing, file sharing for pictures, etc .;
  • sites advertising financial pyramids
  • selling any products for which a license is required without a license;
  • lotteries, gambling sites
  • crawl and indexer scripts that download information from extraneous sites
  • currency exchange site
We reserve the right to refuse to provide services at any time. Any material that in our opinion is obscene, threatening or defamatory, containing libel or violating our rules will be removed from the servers or blocked with or without notice.
Lack of response to a letter sent by e-mail within 24 hours will lead to the blocking of the site. For all complaints, the subscriber must give an answer through the ticketing system or e-mail for 24 hours.
In case you doubt whether your site meets our requirements, write a request to technical support and we will be happy to advise you.
Subscribers are fully responsible for all actions that were performed on their accounts. Including if the username and password to the account became known to third parties. You must use complex passwords that will be difficult to pick up an attacker, as well as use all available security systems that allow you to prevent the use of your login and password, namely: Limiting access to FTP from certain IP addresses, using two-factor protection with one-time passwords. If we detect unauthorized access to your account, we will restrict access to the account until appropriate measures are taken by the user.

3. Distribution SPAM

Any user who carries out a mass mailing of unsolicited letters (SPAM) will be immediately blocked with or without notification. Websites that are advertised using SPAM should not be hosted on our servers. Any account whose actions led to the appearance of an IP address located in the IP address space of our company will be immediately blocked in the blacklist.

4. Viruses

In case of detection by Hosting employees of viruses in the user's account, employees send a notification to the user about the viruses found, went scripts, and other malicious software. And we ask the client to react as soon as possible to the letter and clear his account of viruses.
Failure to respond to a letter sent by e-mail within 24 hours will result in the account being blocked. For all notifications, the subscriber must respond via a ticketing system or e-mail for 24 hours.
Subscribers bear full responsibility for all actions that were performed on their accounts, including cases of infection with viruses, shell scripts and other malicious and dangerous software. Including, if the login and password to the account became known to third parties. You must use complex passwords that will be difficult to pick up an attacker, as well as use all available security systems that allow you to prevent the use of your login and password, namely: Limiting access to FTP from certain IP addresses, using two-factor protection with one-time passwords. If malicious code is detected in your account, we will restrict access to it until appropriate steps are taken by the user.

5. Resource usage

The user should not:
  • Use more than 25% of system resources for more than 90 seconds.
  • Use more than 100 processor minutes per day (more than 10% of resources).
  • Run processes that act as a server.
  • Run any types of search indexers on virtual hosting servers. The exception is the search engines, which index only the subscriber's sites.
  • Run software that interacts with torrent trackers.
  • Run game servers such as counter-strike, half-life, line age...
  • Participate in file sharing networks.
  • Perform cron tasks at intervals of less than 15 minutes.
  • Perform SQL queries that run more than 15 seconds. The correct indexes must be used in MySQL tables.
  • Create MySQL databases larger than 2GB or contain more than 1000 tables. The total volume of all user databases should not exceed 3GB.
  • The ability to connect to a MySQL server not from the virtual hosting servers is provided only for database maintenance.
  • When using the include function in PHP to connect local files, do not use the URL address. Instead of using include ('http://domain.com/include.php'), use include ('include.php');
  • To improve performance, do not disable handling of static files in the control panel with nginx.

6. Restrictions on the use of the file system

In case the virtual hosting account contains more than 200 000 inode (inode is a file system object containing information about a file, directories... Each file - site page, picture, email ... in your account uses 1 inode), then we will send a request to the subscriber to reduce the number of inodes. In the event that actions to reduce the number of inodes will not be undertaken, we will block out the account. Backup of accounts that contain more than 200,000 inodes or have a capacity of more than 10 GB is not done, except for the databases for which backups will be created.
Sites that slightly exceed the limit in the number of inodes are most likely not to be blocked. Accounts that constantly create and delete thousands of files or significantly reduce the performance of the file system can be blocked.