Articles
CPU Usage, Crypto Mining and Node Hosting Policy Crypto mining and hosting of crypto nodes are...
DDoS Protection on Your VPS/ServiceDDoS Protection and Security Features Some of our services include DDoS protection, as specified...
Enable SSH Password LoginSome of the Newer Images have only SSH Key activated by default, and to enable SSH Password...
Firewall Ports Closed with HOST-CThe following ports are currently closed across our infrastructure for enhanced security and to...
Improving VPS Performance: QEMU Guest Agent RequirementIf you experience slow speeds on your VPS, please verify that the QEMU Guest Agent is installed...
Mount ISO in VPS, change Boot order, add SSH-KEYSIf you wish to mount an ISO image, change Boot order or add SSH-KEYS, you have to login to your...
VPS Storage add-on secondary driveIf you have opted for a storage add-on, and the drive has been added as a secondary drive, appart...
VPS gives Error at apt/yum update/upgradeInitial Setup: Please Allow 5–10 Minutes When you first start your VPS, please allow 5–10...
What is CPU Steal and how to measure itWhat is CPU Steal Time? In Linux, CPU steal time refers to the amount of time a virtual...
Windows Defrag Service DisableIf you are using Windows for the VPS you have, please follow these instructions to disable the...
Windows IP SetupAfter you install a Windows OS you will have to do a few steps so you can have IPV4 and IPV6...