FAQ

1Why do I need hosting?
Any Internet resource (website, portal, online store, database, etc.) must be physically hosted on a server with constant Internet access. Providing such a server is called hosting. Also, good hosting involves constant control over the equipment, data protection from external threats, provision of software and assistance in managing the Internet resource. We provide all of this, and even more.
2What kind of servers are there, what is their difference?
We offer you two types of servers – virtual (VPS/VDS) and dedicated. A dedicated server is a separate physical machine that is completely at the disposal of the client. A virtual server is an emulation of a separate server, while several such servers can be located on the same physical machine. A virtual server saves money, while a dedicated one provides more power and absolute control. As a rule, dedicated servers are needed for large projects, and renting a VPS is quite enough for a small site.
3What is the difference between VPS and VDS?
Nothing. Virtual Privat Server (VPS) and Virtual Dedicated Server (VDS) are two different names for the same technology – a virtual server.
4KVM virtualization, what is it?
A virtual server is an emulation of a server, while several such servers can be located on the same physical machine and work simultaneously (independently, isolated from each other). And in order to ensure the separation of one piece of hardware into several virtual machines, virtualization technology is needed. KVM is one such technology embedded in the Linux operating system kernel. In terms of its technical parameters, KVM is not inferior to other virtualization technologies, but at the same time it is much more convenient to work with, which is why we use KVM on all our virtual servers.
5Where is my information stored?
All your information will be stored on our servers. And the servers are located in the racks of data centers in 47 countries. A data center is a specialized data storage room where the ideal temperature and humidity for equipment operation are maintained, several levels of uninterruptible power supply and ultra-high–speed Internet connection are provided. All this is under the round-the-clock supervision of technical specialists and armed guards.
6Who has access to my information?
Only the one to whom you grant access. Apart from this list, no one else will be able to access your information – this is guaranteed by the protection of data centers, our IT security department and, of course, legislation.
7Is it possible to change the tariff?
Yes, of course! You can do this at any time.
8DDoS attack, what is it? If you have protection against it?
A DDoS attack is a hacker attack aimed at temporarily disabling an Internet resource with all the consequences. Such attacks are often carried out on online stores or websites of competing firms, on the websites of financial, military or political institutions, and sometimes with the aim of simply "taking revenge" or even "having nothing to do." A DDoS attack usually happens like this. A virus program is installed from the hacker's computer to many "unprotected" computers throughout the network, which causes "zombie computers" to access the target address. Often, unable to withstand the simultaneous overly large influx of "visitors", the target resource becomes unavailable, simply put, "lies down". DDoS protection is software that detects such abnormal activity and filters it out. We provide reliable protection against DDoS attacks on all our servers.