Acceptable Use Policy


In this document, the following words have these meanings:

  • “You”, “Your”, “Customer”, “Member(s)”, or “User(s)” means a “Subscriber” to the Service, or any person who accesses the Service using the subscriber’s access details;
  • “Service(s)” means any product(s) or services(s) the Customer has ordered for use.
  • “WEBHOSTER.PK”, “WebHosterPK”, “WebHoster” “We”, “Us”, “Our” means WebHoster (NTN 1234567).
  • “ToS” means Terms of Service.
  • “AUP” means Acceptable Use Policy.
  • “SLA” means Service Level Agreement.
  • “Agreement(s)” means “ToS”, “AUP”, “SLA” and “Privacy Policy”.
  • “Members Area” or “Client Area” means our online portal to manage all Products and Services and not limited to the members domain name(s), web hosting, dedicated servers, and security certificates, direct access to the WEBHOSTER.PK Members Area:
  • “Website” means www.WEBHOSTER.PK.


As a provider of web-hosting and other internet-related services, WEBHOSTER.PK offers its Subscriber’s the means to acquire and disseminate a wealth of public, private, commercial and non-commercial information. WEBHOSTER.PK respects that the internet provides a forum for free and open discussion and dissemination of information. However, when there are competing interests at issue, WEBHOSTER.PK reserves the right to take certain preventive or corrective actions. In order to protect these competing interests, WEBHOSTER.PK has developed an Acceptable Use Policy (“AUP”) , which supplements and explains certain terms of each customer’s respective service agreement, and is intended as a guide to the customer’s rights and obligations when using WEBHOSTER.PK’s services. This AUP will be revised from time to time.

When Subscribers disseminate information from the internet, they must keep in mind that WEBHOSTER.PK does not review, edit, censor or take responsibility for any information its Subscribers may create. When users place information on the internet, they have the same liability as other authors for copyright infringement, defamation and other harmful speech. Also, because the information created is carried over WEBHOSTER.PK’s network and may reach a large number of people, including both Subscribers and non-Subscribers of WEBHOSTER.PK, Subscribers postings to the internet may affect other Subscribers and may affect WEBHOSTER.PK’s goodwill, business, reputation or operations. For these reasons, Subscribers violate WEBHOSTER.PK’s set Agreements when they, their customers, affiliates or subsidiaries engage in the activities described within this Acceptable Use Policy.


To sign up for the Services, You must register for an account on the Website (an “Account”). You must provide accurate and complete information and keep Your Account information updated. You shall not:

  • (i) select or use as a username a name of another person with the intent to impersonate that person;
  • (ii) use as a username a name subject to any rights of a person other than You without appropriate authorisation; or
  • (iii) use, as a username, a name that is otherwise offensive, vulgar or obscene. You are solely responsible for the activity that occurs on Your Account, regardless of whether the activities are undertaken by You, Your employees or a third party (including Your contractors or agents), and for keeping Your Account password secure.
    You may never use or interfere with another person’s user account or registration information for the Services without permission. You must notify us immediately of any change in Your eligibility to use the Services, breach of security or unauthorised use of Your Account. You should never publish, distribute or post login information for Your Account. You shall have the ability to delete Your Account, either directly or through a request made to one of our employees or affiliates. You must notify us immediately of any unauthorised use of Your account, the Services we supply to You or any other breach of security.

WEBHOSTER.PK will be entitled to suspend or terminate Your Account if You breach these Terms of Service. Additionally, WEBHOSTER.PK may disclose Your Account details to any law enforcement bodies who investigates Your use of our Service. WEBHOSTER.PK will not be liable for any loss or damage as a result of Your failure to provide us with accurate information or to keep Your Account secure or with any investigation by law enforcement bodies.

4. UCE (Unsolicited Commerce Email) SPAMMING

Spamming is the sending of unsolicited e-mail, to persons the sender does not know or have prior consent to send the message to. We have a very strict spam protection policy. This also includes sending unsolicited advertisements to newsgroups, email addresses and/or generating a high volume of outgoing email. There are many ways that someone can hide their identity on the Internet, and we are aware of these ways, so be assured that your account would not be terminated until we are not fully sure that they have indeed abused our services.

Sending mails through script should always be less than 500 in an hour, consistant violation of this limit will result in account suspension. Also you should script your emails to be sent in intervals of at-least 7 to 10 seconds apart so there is not undue load on the server. Any account found in violation of this will be cancelled immediately.

Please report any instances of spamming to [email protected], with as much details as possible, by clearly identifying the source of the spam email account.


WEBHOSTER.PK forbids hosting services for Adult Content web sites. Subscribers agree not to store, transmit, link to, advertise or make available any images, audio clips or text containing sexually explicit material. Any and all web sites found in violation of this Agreement will be removed immediately, without prior notification to the Subscriber. WEBHOSTER.PK will make the final decision in any dispute over unacceptable content. By hosting with WEBHOSTER.PK, all Subscribers agree to accept WEBHOSTER.PK’s decision as to what is and is not adult-oriented content.


Using WEBHOSTER.PK’s network as a means to transmit or post negative, defamatory, harassing, abusive or threatening language.


Accessing, illegally or without authorization, computers, accounts or networks belonging to another party, or attempting to penetrate security measures of another individual’s system (often known as “hacking”). Also, any activity that may be used as a precursor to an attempted system penetration (i.e., port scan, stealth scan or other information-gathering activity).


Distributing information regarding the creation of and sending internet viruses, worms, Trojan horses, pinging, flooding, mail bombing or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service or equipment.


Use of WEBHOSTER.PK’s service to transmit any material (by e-mail, uploading, posting, hot linking, directly linking or otherwise) that infringes any copyright, trademark, patent, trade secret or other proprietary rights of any third party, including, but not limited to, the unauthorized copying of copyrighted material, the digitization and distribution of photographs from magazines, books, or other copyrighted sources, and the unauthorized transmittal of copyrighted software.


Use of WEBHOSTER.PK’s service to collect, or attempt to collect, personal information about third parties without their knowledge or consent is violation of this Acceptable Use Policy.


WEBHOSTER.PK Subscribers will be held responsible and accountable for any activity by third parties, using their account, which violates guidelines created within the Acceptable Use Policy.


WEBHOSTER.PK reserves the right to revise, amend, or modify the Agreements published on our Website at any time and in any manner. Notice of any revision, amendment, or modification will be posted in accordance with our Terms of Service.


Engaging in activities, whether lawful or unlawful, that WEBHOSTER.PK determines to be harmful to its Subscribers, operations, reputation, goodwill or customer relations.

As we have pointed out, the responsibility for avoiding harmful activities just described rests primarily with the Subscribers. WEBHOSTER.PK will not, as an ordinary practice, monitor the communications of its Subscribers to ensure that they comply with WEBHOSTER.PK’s policy or applicable law. However, when WEBHOSTER.PK becomes aware of harmful activities, it may take any action to stop the harmful activity, including, but not limited to, removal of information, shutting down a web site, implementing screening software designed to block offending transmissions, denying access to the internet, or any other action deemed appropriate by WEBHOSTER.PK.

WEBHOSTER.PK is also aware that many of its Subscribers are themselves providers of internet services, and that information reaching WEBHOSTER.PK’s facilities from those Subscribers may have originated from a customer of the Subscribers or from another third party. WEBHOSTER.PK does not require its Subscribers who offer internet services to monitor or censor transmissions or web sites created by customers of its Subscribers. WEBHOSTER.PK reserves the right to directly take action against a customer of its Subscribers. Also, WEBHOSTER.PK may take action against the WEBHOSTER.PK’s Subscribers because of activities of a customer of the Subscribers, even though the action may affect other customers of the Subscribers. Similarly, WEBHOSTER.PK anticipates that Subscribers who offer internet services will cooperate with WEBHOSTER.PK in any corrective or preventive action that WEBHOSTER.PK deems necessary. Failure to cooperate with such corrective or preventive measures is a violation of WEBHOSTER.PK policy.

WEBHOSTER.PK will not intentionally monitor private electronic mail messages sent or receive by its Subscribers, unless required to do so by law, governmental authority or when public safety is at stake. WEBHOSTER.PK may, however, monitor its service electronically to determine that its facilities are operating satisfactorily. Also, WEBHOSTER.PK may disclose information, including, but not limited to, information concerning a Subscriber, a transmission made using our network, or a web site, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation or governmental request. WEBHOSTER.PK assumes no obligation to inform the Subscribers that Subscribers information has been provided and, in some cases, may be prohibited by law from giving such notice. Finally, WEBHOSTER.PK may disclose Subscribers information or information transmitted over its network where necessary to protect WEBHOSTER.PK and others from harm, or where such disclosure is necessary to the proper operation of the system. However, WEBHOSTER.PK will never sell information to other services or outside companies.

We hope this AUP is helpful in clarifying the obligations of internet users, including WEBHOSTER.PK and its Subscribers, as responsible Subscribers of the internet. Any complaints about a Subscribers violation of this AUP should be sent to [email protected] or [email protected]

23. Cancellations Policy reserves the rights to cancel any account any time. Customers also may cancel their account any time.

24. Refund / Moneyback Policy offers unconditional 30 days moneyback on all new shared web hosting orders. Read below our refund / moneyback policy for our different products and services

        1. Hosting Refund Policy

Customers can always get their guaranteed moneyback within 30 days. Any moneyback / refund request made after 30 days will not be accepted. Customer will have to make a written request to our support team at [email protected] which should state clearly reason for your refund request.

       2. Domain Refund Policy

As is using third party domain registrar for domain registrations, so domain’s registration cost will not be included in the refund payment, however customer will remain the ownership rights of domain and will be eligible to transfer domain to any other registrar

      3. Refund Eligibility

Only first time shared hosting accounts are eligible for a refund / moneyback. We do not offer moneyback or refund if you have had account with us before, canceled and sign up again or opened a second account.

     4. Non-refundable products and services do not offer any refund / moneyback on domain names, VPS, dedicated servers, administrative or installation fee. Any terminated account due to our Terms & Conditions will not be eligible for any refund / moneyback

Prime Vs Premium Vs Pro

Full features explained in detail

Full Features
PKR 3420 /yr
PKR 4392 /yr
PKR 5784 /yr
Host Website The number of websites that you can host in your web hosting account.135
Free Domain Buy Swift/ Turbo plan and get 1 free .COM domain for FREE. To avail this offer you will need to buy these plans for 1/3 years. The domain name will be free for the first year and renewal charges would be applicable from the second year.
SSD Disk SpaceOur storage is based on the modern Solid State Drives. Your website will perform 200% better as compared to the regular drives.2 GBUnlimitedUnlimited
Bandwidth It is the amount of data transferred between the Internet users and your website. We provide unlimited data transfer for you to host all types of websites and grow independently for gaining more visitors.UnlimitedUnlimitedUnlimited
Control Panel The top rated control panel that helps you to manage your domain, website, email, database, etc. from a single dashboard.
1-Click Installer 1-click Installer: Easily install popular apps like WordPress, Laravel, PrestaShop and over 400+ such applications with just a single click.
Free Drag and Drop Sitebuilder Create a responsive and beautiful website with our drag-and-drop site builder tool. You don’t need to have any technical skills for building the website.
Sub-Domains A sub-domain helps you to create a separate website under your main domain and host a complete new website on it. For example, blog is the sub-domain of domain.UnlimitedUnlimitedUnlimited
Parked Domains Parked domains are domains linked to your account but point to the primary domain name. This helps in increasing the website’s visibility on the Internet. For example, registeringUnlimitedUnlimitedUnlimited
Addon Domains It allows you to add a new domain and launch a new website on it. You can allocate all the features to the add-on domain such as database, ftp, email, forwarders, etc.135
SSL Certificate We ensure all the websites are secure by offering free and automated installation of SSL certificates on our shared plans. They are easily configured without any validation email. Get automatically renewed and supported by all popular browsers.UnlimitedUnlimitedUnlimited
FTP Users You can create unlimited FTP user accounts with. It allows you to add and remove FTP accounts. It is also possible to change their passwords.UnlimitedUnlimitedUnlimited
Backup If you accidentally delete your website data you can restore it with the help of a backup stored at our server. Your database backup will be taken daily in which we will have the backup of your data for the last 7 days. While your website content backup will be taken once in every 7 days.
Control Panel Features
FTP Account Management Keep a track of visitors that are logged into your site via FTP. It also allows you to terminate FTP connections for restricting the file access to unauthorized users.
Virus Scanner The ClamAV Virus Scanner helps in detecting viruses, Trojans, malware and other malicious threats by scanning your entire home directory, mail, public web space and public FTP space.
Image Manager eryResize the complete image directory to the desired size and store the images in a folder of thumbnails, resize ev single image and change the type of one image into another.
Apache Handlers Manager Makes management of your apache handlers easy. Apache is pre-configured to control CGI-scripts and server-parsed files. It can be manually configured by adding the extension and handler in order to manage a new file type with an existing handler.
Hotlink Protection It doesn’t allow other websites to link to the files on your website directly (e.g. restricts your website’s images from getting displayed on other websites). But if you don’t specify the file type, other websites will be able to link to that file type.
IP Deny Manager You can decline access to your site from a particular IP address or a range of IP addresses.
Index Manager Customize the listing of directories on the website by selecting between no indexes, a default system setting, or two types of indexing.
Leech Protect It allows you to set the number of logins that can take place within a 2-hour period to detect the unusual level of activities in the password-authorized directories.
Mailman List Manager It allows you to create mailing lists and send mail to multiple email addresses with a single address.
MIME Types Manager This is used to specify the way web browsers manage certain file extensions. Browsers can manage new technologies as they are available with MIME types.
Network Tools Find out the IP address of any domain along with its DNS information. You can also trace route from the computer via which you access control panel to the server on which your site is located.
PGP/GPG The GnuPG key encrypts your outgoing emails. Messages are encoded with a public key. The intended recipient that has the private key can only decrypt the message.
Random HTML Generator It selects a HTML code’s string from a list and includes it on the web pages that have SSI enabled on them.
Redirect Manager It enables you to send a domain’s or a page’s visitors to a different URL.
Simple CGI Wrapper It helps to create a folder called /scgi-bin within the /public_html directory so that the scripts placed in it are handled as CGI scripts.
Server Status Viewer With this set of features, you can access several lists to see your server’s information. It will help you while troubleshooting hardware as well as software issues.
Change Language It allows you to change the language of control panel interface easily.
Web Disk It allows you to upload, download, navigate and manage the files of your website pretending they were on your local drive.
Password Protection It enables to secure particular directories in the files of your control panel account. When users try to view a directory via the website, they are requested to log in.
Multiple PHP Support Apart from the default PHP version, our web hosting plans also support other PHP versions.
Customizable php.ini All PHP settings can be managed with your local php.ini file. For example, check if global variables are turned on or the default directory for uploading files to while writing upload scripts..
Cron Jobs These are scheduled tasks that occur at on the server specific times or intervals. Usually, it is a series of simple tasks run from a script file.
Simple DNS Zone Editor Create and delete CNAME and A records for your subdomain names.
Advanced DNS Zone Editor Create and edit all types of DNS records including CNAME, A, TXT and SRV for your domains as well as subdomains.
Install PHP PEAR Packages Collection of functions that help you to execute tasks in PHP is known as PEAR packages.
Install Perl Modules Collection of functions that help you to execute tasks in Perl is called as Perl modules.
Install Ruby Gems Collection of functions that help you to execute tasks in Ruby is called as Ruby Gems.
Backup Manager It helps in downloading a zipped copy of your complete site or parts of it onto your computer or restoring parts of your hosting account by uploading your partial backup zip file(s).
Git Version Control Host Git repositories on your control panel account easily. You can create, view, clone, and deploy repositories without accessing your account via SSH.
Resource Usage Monitoring Check the statistics for the amount of resources that are used such as memory, CPU and entry processes.
User Manager It helps to manage the users in your control panel with a single interface. You can add, edit, delete or change passwords of the user accounts.
Style and Preferences Management Allows customizing your control panel interface’s appearance by selecting a style
Custom Error Pages You can customize the pages displayed when there is an error on your website. These enhance your website's appearance and save you from losing your website visitors.
Server Features
Apache Mod_Lsapi An Apache module uses the LiteSpeed technology for seamless and optimized serving of PHP pages. It is a drop-in replacement for FCGID, SuPHP, RUID2 and ITK and offers superior performance, better compatibility and low memory footprint as compared to PHP-FPM. Also, it knows directives from .htaccess files.
HTTP/2 It is the latest version of the HTTP protocol that allows browsers to load websites faster. Our servers support HTTP/2 and it means that people who browse your website using a HTTP/2 ready browser will get website loaded in just few seconds.
PHP 4.4, 5.1, 5.2, 5.3, 5.4, 5.5, 5.6, 7.0, 7.1, 7.2, 7.3, 7.4 These are the scripting language versions installed on our servers. You can select the PHP version from your control panel.
MySQL 5.x.x This is the MySQL database version installed on our servers.
CGI Common Gateway Interface (CGI) creates a way so that the web server can interact with external content-generating programs. CGI scripts are usually written in Python scripts, Perl, or similar such languages and the program run by it can be any type of executable file.
Javascript It is a client-side scripting language that is run in a web browser and allows using .js files.
SSI A server-side scripting language, SSI is used to create dynamic web pages by including the content of one file into another.
ImageMagick 6.9.x It is a set of tools and libraries for reading, writing and manipulating an image in different image formats. We offer this version of ImageMagick on our servers.
Zend Optimiser It is a free application that enables PHP to run Zend Guard encoded files to offer enhanced performance of PHP applications.
GD It is an open source PHP library that enables programs to modify graphics.
Perl 5.10 This is the version of Perl installed on our servers. Perl is an open-source, general-use and cross platform programming language used for web development, system administration, Graphical User Interface development, web programming, etc.
Ruby on Rails It is the most popular open-source web application framework that is built on top of Ruby. Basically, it is a set of code libraries that offer a ready-made solution for recurring tasks such as developing forms, tables or menus on the website.
Free SSH We enable secure account-restricted access with our free in-house developed SSH. This establishes a secure connection to your account that makes it easy to manage large files as well as databases. Administrators and web developers can securely enable direct access to their hosting account.
SFTP Access SFTP (SSH File Transfer Protocol) is a secure file transfer SSH protocol. It ensures complete security of SSH by protecting against password sniffing and other attacks. It authenticates the server and user by using encryptions and cryptographic hash functions.
WAF Protection WAF helps to secure web applications by filtering, monitoring, and blocking any HTTP traffic between the web application and the web. It restricts the unauthorized data from leaving the app.
OPCache It is a PHP script compiled into OpCode that boosts the performance of PHP by acting as an extension. This code is stored by OpCache into memory during the execution life-cycle of PHP and the results of the compilation phase are cached for using it afterwards.
Mod_Expires It is an Apache module that leverages browser caching to offer enhanced website performance. Browser caching stores static files locally in the user's browser and decreases page load times when the page is refreshed or the user switches to a different page of your site.
Cloudflare CDN with Railgun Railgun helps to connect each Cloudflare data center with a web server speedily. Due to this, the requests that can’t be served from the Cloudflare cache get served faster.
Laravel It is an open-source and free web application framework that helps in development of web applications. This eases the common tasks such as routing, authentication, caching and sessions.
CodeIgnitor A PHP-driven framework that offers out of the box libraries to connect to the database and perform different operations such as uploading files, managing sessions, sending emails, and more.
PHP artisanIt is a default command line interface in Laravel that comprises of various commands to develop a Laravel application easily.
CloudflareCloudflare caches your website content and distributes it over multiple data centers by enabling your website to load faster in any location of the world. When a visitor accesses your website from any location of the world, Cloudflare delivers the content rapidly from the datacenter near to him. It also identifies and blocks malicious traffic to your website to secure it.
RailgunA WAN optimization technology developed by Cloudflare that helps to rapidly connect Cloudflare datacenter to the web server.
Cron Optimization It is the optimization of scheduled tasks occurring at predefined intervals or times on the server. Basically, a series of simple tasks that are run from a script file is called a cron job.
CSS & JavaScript Merging Their merging helps in reducing the number of requests to your server and boosts your page load time.
Leverage Browser Caching It enables you to specify the interval for which your web browsers should keep CSS, JS and images stored locally.
Gzip Compression A method of compressing files that reduces the size of resources and delivers smaller file sizes that load speedily for your website users.
Expires Headers These inform the browsers if they should request a particular file from the server or fetch it from the cache of the browser. When these are set for a resource such as all JPEG images, the browser stores them in its cache.
Disabling Logging It allows you to restrict the amount of data that is stored.
KeepAlive It is a communication between the server and the browser that enables you to transfer multiple files in a single connection.
Mod_rewrite for SEO URLs You can use custom Search Engine Friendly URLs on your website. The path of files on the server is masked by it with a custom good looking name that one can remember easily.
WP-CLI It is a set of command-line tools to manage the WordPress installation. It can be used for configuring multisite installs, updating plugins and more without the help of web browser.
Database Features
MySQL Databases An open-source relational database management system for storing and retrieving all your blog information and is used by CMS-software. We offer unlimited databases with our Swift and Turbo plans.135
PHP MyAdmin A free and open-source tool in control panel that is used to manage MySQL databases.
Remote MySQL It enables the user to connect to the database with the help of third party software that doesn’t run on the server.
Email Features
Email Accounts The total number of email accounts you can create for all the domains and subdomains in your hosting account.51520
Email Forwarders It enables you to forward any email’s copy that was sent to one of your email accounts, to some other email address. We allow you to forward unlimited email copies.UnlimitedUnlimitedUnlimited
Email Autoresponders Any type of automated email/s that can be written once, scheduled and sent automatically. We allow you to set unlimited email autoresponders.UnlimitedUnlimitedUnlimited
Attachment Limit The attachment limit that can be sent with an email.20 MB20 MB20 MB
Webmail (Horde & RoundCube) It is a type of email account that helps you to access emails from any location with a web browser and Internet connection. We offer Horde and RoundCube clients with our webmail.
SMTP, POP3, IMAP These are the standard protocols for sending and receiving emails.
SpamAssassin It is an email-spam filtering tool installed on our servers that can be easily enabled and configured via your Control Panel.
Mailing Lists It enables you to create a list of email addresses and send them an email via a single address. We allow you to create a list of unlimited email addresses.UnlimitedUnlimitedUnlimited
Catch-all Emails It enables you to receive all emails sent to an incorrect address to the email address specified in your control panel.
Email AliasesIt is an email address related to another destination email address. For example, for an email address you create an alias and someone emails you on it, you will be able to view the same email by logging in to
SPF and DKIM Support SPF enables the email sender to specify the IP addresses that are permitted to send email for a specific domain. An encryption key and digital signature is offered by DKIM for verifying that an email message wasn’t altered or forged.
Domain Keys An email authentication mechanism that enables checking of incoming mail against the server from which it was sent to confirm that email hasn’t been modified.
BoxTrapper It forces all the email senders that are not on your Whitelist to reply to a verification email prior to receiving the email from them to keep your inbox secured from spam.
Individual Mailbox Storage Given storage is the maximum space that can be allotted to each mail account.500 MB500 MB500 MB
Overall Mailbox Storage Given storage is the maximum mailbox size per domain. You can utilize it as a total space for your overall mailbox.2 GB8 GB15 GB
Email Sends Per Hour Maximum number of emails that can be sent per domain.200200200
CSV Import (Email & Forwarders) It enables you to use .csv files for creating multiple email addresses or email forwarders for your account at the same time.
Mobile Compatibility It allows you to set up emails on all types of mobile devices such as Android, iPhone, Blackberry, Linux, Windows, etc.
Email Calendar You can schedule meetings with anyone who can’t view your email calendar and email a copy of your calendar so that others know when you can be available to them.
Webmail in GmailYou can configure webmail in Gmail. Watch the video to know more
Outlook / Thunderbird / Mac Mail These are the email applications we offer to send and receive emails.
Install Popular Software with 1-Click
WordPress WordPress is a popular, free, and open source content management system that helps you to create your own website or blog in an easy way.
Joomla Joomla is an open-source and free content management system that helps in building your website in a mobile-friendly and user-friendly way.
CubeCart A free, powerful, open-source and responsive ecommerce solution that helps merchants to sell digital or physical products online globally.
phpBB An open-source and free bulletin board software for PHP that allows you to connect with a group of people or run your complete website.
SMF SMF stands for Simple Machines Forum and is an open-source, free and easy to use software that enables you to create an online forum or community instantly.
Drupal Drupal is an open-source and free web content management system for building websites and applications used daily.
Blogs A list of software that help you to create a blog just in a few minutes.
Portals A list of CMSs or portals that you can install on your website in few minutes.
Content Management System A software application that enables you to create, manage as well as modify the content on a website.
Customer SupportA list of customer support applications that offer different types of contact options for your clients to connect with you.
Discussion Boards A list of online discussion sites where people can have discussions on a topics by posting messages..
E-Commerce Software that enables buying and selling of products or services on the Internet.
FAQ Free and database-driven web-based application that allows you to create and maintain Frequently Asked Questions (FAQs) on your site.
Hosting Billing Complete billing and invoicing applications designed for web hosting resellers that help them to manage orders, clients, invoices, notes and help desk.
Image Galleries List of software that enable uploading images to the website. Images are stored on a server and individual different codes get displayed for others to view images.
Polls and Surveys List of software that allows you to create questionnaire and checklist forms.
Project Management List of software that enable you to manage your contacts, privileges, time card, calendar, chat, projects, forum, mail client, request tracker, notes, files, bookmarks, reminder, to-do list, voting and language support.
Site Builders The software that helps in building, maintaining and managing your personal or business website.
Wiki List of software that enable you to create and edit unlimited interlinked web pages via a web browser with the help of a simple markup language or a WYSIWYG text editor.
Statistic / Web Stats
Awstats It displays the information about who is accessing your website in the form of graphs and tables distributed into hourly, daily and monthly averages.
Raw Logs Statistics Text files that include your visitors’ information as well as the content they have access on your website are called as raw access logs.
Error Logs It displays the last 300 errors occurred on your website and this data can be used for searching and fixing the broken links and web applications that are incorrectly configured.
Bandwidth Stats Shows the information of bandwidth usage and enables you to check the high traffic intervals for your website. You can also make a decision for your bandwidth requirement with these stats.
Disk Usage Viewer Displays the information about your disk space usage.
Latest Visitors Exhibits the information related to the last 300 visitors on your website.
Google Analytics Compatible It is compatible with Google Analytics.
Google Webmaster Compatible It is fully compatible with Google Webmaster Tools.
Security Solutions
Network Firewall Prohibits or mitigates unauthorized users from accessing a private network that is linked to the Internet.
Web Application Firewall Secures your website from malicious attacks such as Cross-site Scripting (XSS), SQL injection, Local File Include, XML-RPC DDoS Attack, Remote File Include, etc.
Brute-force Protection Protects your website from the brute-force attack in which repeated attempts are made to identify your username and password to gain unauthorized access to your website.
Exploits and Malware Protect Secures your website from exploits and malware by blocking malware’s attempts to exploit the vulnerabilities.
Malware Scan and Reports Our malware scan tool scans your website for the malware and provides a report for the same.
Two-Factor Authentication (2FA) It is a two-step verification process in which two different authentication factors are offered for verifying the user’s identity.
BitNinja Server Security It secures your website from XSS, malware, enumeration, script injection, brute force and other automated attacks on all major protocols.
Account Isolation All web hosting accounts are isolated from the other hosting accounts on the server. This helps to improve your data security and provides an additional security layer to the hosting environment.
CageFS Security A virtualized file system, comprising of a set of tools that encapsulate each user in its own “cage”. You will get a fully functional package without any restriction.
CloudLinux Servers CloudLinux OS helps in enhancing the server stability and security by fully isolating user accounts and allocating resources. With this, you get the feel of a virtual server on a shared server.
Power / Network / Hardware Redundancy Our datacenters offer high quality electricity redundancy along with multiple failover options that comprise of enterprise-class UPS technology, multiple power feeds and own power generators. There is also a provision of on-site replacement parts for each server hardware model in operation to promote instant reaction when there is a hardware issue.
Account Resources
CPU A CPU’s processor is called a CPU. It is the number of CPU offered with our web hosting plans.100%300%300%
RAM The amount of memory offered with each hosting plan.1 GB2 GB2 GB
Concurrent connections (EP) These are the number of connections that happen simultaneously as another connection.203030
IO Limit Represents the disk input and output limit.1 MBPS2 MBPS2 MBPS
File (Inode) Limit The amount of inodes (files, folders, and emails) that you can store in your hosting account.10,00050,000100,000
Our Guarantees
30 Day Money Back GuaranteeIf you aren’t satisfied with our services, you can ask for the refund within 30 days of the service purchase.
99.95% Uptime GuaranteeThe maximum uptime that helps to keep your website up and running.
Upgrade on Pro Rata BasisUpgrade plans at any time and immediately start using the new features. You are charged for the upgrades based on the time interval for which the service was active.
24/7/365 Expert Support We are available 24/7/365 to resolve your issues instantly as well as professionally.
Free Website Migration We don’t charge you for website migration to our servers. You can migrate your website at any time.
Instant Setup We setup your hosting account immediately after your payment is verified.