- Log in to your billing account
- Go to the "Products/Services" section and select "DNS hosting".
- Select the service and click "Go". After that you will be automatically logged into DNSmanager
- In the DNSmanager panel, go to the "Main" -> "Domain Names" section.
- Click "Create"
- Select "Type" -> "master", in "Domain name" enter the domain to be delegated, in "IP address" specify the IP address to which the domain will be referenced.
- Then in the panel at the registrar to delegate the domain to the NS server provider. Delegation takes place within a couple of hours, but not longer than 72 hours.
NS servers that you need to specify at the registrar:
ns1.the.hosting
ns2.the.hosting
We honor the law of each country where we host, so we are very careful about complaints even from individuals.
We handle every complaint manually, if you have violated the rules and we receive a complaint against you, we will stop your server immediately and without refund.
Any online resource (website, portal, online store, database, etc.) must be physically placed on a server with permanent access to the Internet. Providing such a server is called hosting. Also good hosting implies constant control over the equipment, data protection from external threats, provision of software and assistance in managing the Internet resource. We provide all this - and even more.
We offer you two types of servers - virtual (VPS/VDS) and dedicated. A dedicated server is a separate physical machine, which is fully at the disposal of the client. A virtual server is an emulation of a separate server, and several such servers can be located on one physical machine. A virtual server saves money, while a dedicated server provides more power and absolute control. As a rule, dedicated servers are needed for large projects, and for a small site it is enough to rent a VPS.
None. Virtual Privat Server (VPS) and Virtual Dedicated Server (VDS) are two different names for the same technology - virtual server.
SSD in English stands for solid-state drive. It is an alternative to the more common HDD (hard magnetic disk drive). SSD is a more modern and "advanced" data storage technology. First, it allows you to significantly increase the speed of writing and reading data, so SSD disks are noticeably faster. Secondly, they are much more durable and reliable, at the same time lighter and more compact, as well as completely silent. Of course, such disks are more expensive than "regular" HDDs, but we use exclusively NVMe on our servers to provide our clients with perfect speed.
We provide a virtual server service. A virtual server is an emulation of a server, and several such servers can be located on one physical machine and work simultaneously (independently, isolated from each other). And to provide the division of one "hardware" into several virtual "machines", you need virtualization technology. KVM is one of such technologies built into the kernel of the Linux operating system. By its technical parameters KVM is not inferior to other virtualization technologies, but at the same time it is much more convenient to work with, so we use KVM on all our virtual servers.
Only to a list of people that you determine. Apart from this list, no one else will be able to access your information - this is guaranteed by data center security, our IT security department and, of course, by law.
Our business is legal and officially documented down to the last chip. We operate in full compliance with EU legislation.
Simple. Contact our manager, he will ask you a number of leading questions - and will choose the most optimal solution for you. We have specially created a wide range of tariffs to meet the maximum range of customer needs.
Of course. You can do it at any time.
We will do it ourselves. And absolutely free of charge. Contact our manager and he will ask you for all the necessary information about your site. And then - it's up to us.
DDoS-attack is a hacker attack, the purpose of which is to temporarily disable an Internet resource with all the consequences. Such attacks are often launched against online stores or competitors' websites, against financial, military or political institutions, or sometimes just to "get revenge" or even "for nothing". A DDoS attack usually works like this. From the hacker's computer, a virus program is installed on many "unprotected" computers throughout the network, forcing the "zombie computers" to access the target address. Often, not withstanding the simultaneous overly large influx of "visitors", the target resource becomes inaccessible, simply put - "lies down". Protection from DDoS attacks is software that detects such abnormal activity and filters it out. We provide reliable protection against DDoS attacks on all our servers.
We refund the funds if the service is not provided in full, but only upon filling out an application, which requires verification of the user in the form of providing a copy of passport and a completed application.