The following activities are NOT permitted on our network, virtual machines, physical machines or on your collocated equipment:
- Sending junk email, header forging, UCE and non-opt-in mailing lists
- Use, reception or transmission of software or IP not in compliance with applicable license.
- Use or transmission of malware, virus, trojans, worms, bots or spyware.
- Hosting of command and control for harmful activities.
- Participation in or initiation of denial of service attacks.
- Enabling money laundering, or other illegal activities.
- Hosting or retransmitting content that is defamatory, obscene, abusive, invasive of privacy, or otherwise objectionable.
- Activities that may be harmful to others, including customers, our operations or reputation, including offering or disseminating fraudulent goods, services, schemes, or deceptive promotions.
- Accessing networks or systems without permission, including attempting to probe, scan, or test the vulnerability of a system or to breach any security or authentication measures- unless contracted to do so by the target
- Monitoring of data or traffic not destined for your network.
- Forging of IP headers.
- Intentionally interfering with the proper functioning of any system, including any deliberate attempt to overload a system by mail bombing, broadcast attacks, ddos, or flooding.
- Cryptographic currency mining, or password cracking
- Operating network services like open proxies, open mail relays, open ntp, or open recursive domain name servers, which are harmful.
- Attempting to avoid any use limitations placed on a system, such as access, network, and storage restrictions.
- Long running storage benchmarks which produce unreasonable levels of wear on our SSD storage.