Howdy, Stranger!

It looks like you're new here. If you want to get involved, click one of these buttons!

Subscribe to our newsletter

Advertise on LowEndTalk.com

Latest LowEndBox Offers

    Double Storage | USA KVM | £6/Q 512MB | £2.45/M 1GB (IPv4 IPv6)
    New on LowEndTalk? Please read our 'Community Rules' by clicking on it in the right menu!

    Double Storage | USA KVM | £6/Q 512MB | £2.45/M 1GB (IPv4 IPv6)

    Mic-haelMic-hael Member, Provider
    edited May 2018 in Offers

    Ho-ost is a brand of Ho-ost Internet Solutions Limited. Est January 2016. Company Number 09970768 Registered in England & Wales.

    Grab double storage on any of the below packages, simply open a ticket to request.

    Chicago, Illinois Looking Glass |
    Charlotte, North Carolina Looking Glass


    Our Features:

    • Virtualizor Control Panel
    • 1Gbps Shared Network Port
    • IPv6 Available On Request
    • 1 x Dedicated IPv4 Address
    • Additional IPv4 £1.50/Month
    • 99.95% Uptime Guarantee
    • CentOS, Ubuntu, Debian
    • Windows Available (BYOL)
    • PayPal Or Perfect Money
    • KVM Virtualisation ONLY!
    • Quick & Reliable Support


      512MB
    • 512MB DDR3 RAM
    • 10GB HDD Space
    • 1 CPU @ 2Ghz (Shared)
    • 0.5TB Bandwidth @ 1Gbps
    • 1 Dedicated IPv4 Address
    • £6.00/Quarterly

      Virtual-1:
    • 1GB DDR3 RAM
    • 25GB HDD Space
    • 1 CPU @ 2Ghz (Shared)
    • 1TB Bandwidth @ 1Gbps
    • 1 Dedicated IPv4 Address
    • £2.45/Month Code: LET1GB

      Virtual-2:
    • 2GB DDR3 RAM
    • 50GB HDD Space
    • 2 CPU @ 2Ghz (Shared)
    • 2TB Bandwidth @ 1Gbps
    • 1 Dedicated IPv4 Address
    • £3.50/Month Code: LET2GB


    SSD plans are coming very soon!

    Comments

    • joepie91joepie91 Member, Provider

      From your AUP:

      You may not use Ho-ost services for illegal activities, including but not limited to softwares related to or for the purpose of; hacking, cracking, DoS, DDoS attacks, TOR or anything otherwise illegal in the location of said service.

      Tor is not 'illegal'. Why does your AUP claim that it is?

      Ho-ost Virtual Private Servers are subject to a 75% CPU usage limitation and will be automatically shutdown if breached.

      How's that measured? Average over a certain time period? Immediate threshold? If a VPS is automatically shut down the moment it hits 75% CPU usage it won't actually be good for anything as this is completely normal for short periods of time, and you should be throttling the CPU instead.

    • fxffxf Member

      @joepie91 said:
      From your AUP:

      You may not use Ho-ost services for illegal activities, including but not limited to softwares related to or for the purpose of; hacking, cracking, DoS, DDoS attacks, TOR or anything otherwise illegal in the location of said service.

      Tor is not 'illegal'. Why does your AUP claim that it is?

      Well... given the use of a semicolon before "hacking, cracking...", I think Ho-ost can weasel out of their position and say you're putting words in their mouth. Besides, what even is TOR? Do they mean Tor?

    • Mic-haelMic-hael Member, Provider
      edited May 2018

      @joepie91 said:
      From your AUP:

      You may not use Ho-ost services for illegal activities, including but not limited to softwares related to or for the purpose of; hacking, cracking, DoS, DDoS attacks, TOR or anything otherwise illegal in the location of said service.

      Tor is not 'illegal'. Why does your AUP claim that it is?

      Ho-ost Virtual Private Servers are subject to a 75% CPU usage limitation and will be automatically shutdown if breached.

      How's that measured? Average over a certain time period? Immediate threshold? If a VPS is automatically shut down the moment it hits 75% CPU usage it won't actually be good for anything as this is completely normal for short periods of time, and you should be throttling the CPU instead.

      Perhaps a seperate sentence for the Tor (Without capitals, thanks @fxf ) related policy would clarify. Regardless, we don't allow it. Our CPU usage is subject to fair use. We don't shut down VPS instantly for hitting the CPU limit. Again, I'm sure some clarification may help, so please keep updated with our policies while we work these specifics in. Thank you.

      Thanked by 1joepie91
    • fxffxf Member
      edited May 2018

      @Hoost said:

      >

      Perhaps a seperate sentence for the Tor (Without capitals, thanks @fxf ) related policy would clarify. Regardless, we don't allow it.

      I've also heavily used TOR before discovering the Tor folk make a point of not using it for whatever reason. To be honest I prefer TOR for the hardcore aesthetics.

      For full points, can you further clarify what you don't allow regarding Tor? Would running "$ torsocks curl ho-ost.com" be a violation of AUP? Do you not allow customers to operate any type of Tor nodes, or just some? Time for a brief lesson :)

      The three types are: bridge, relay, exit. Bridges only act as entry points to the network, for people who don't want their network manager to easily see that they're connecting to the Tor network (think: China, Russia, etc). Relays only talk to other relays or people entering the Tor network. Exits are the only ones which send requests on behalf of users to computers outside the Tor network, and that generate abuse complaints, except they can be run without many problems if one is using a "reduced exit policy". Additionally, the IPs of relays and exits are publicly listed, while bridges are not.

      Thanked by 1Mic-hael
    • Mic-haelMic-hael Member, Provider
      edited May 2018

      @fxf said:

      @Hoost said:

      >

      Perhaps a seperate sentence for the Tor (Without capitals, thanks @fxf ) related policy would clarify. Regardless, we don't allow it.

      I've also heavily used TOR before discovering the Tor folk make a point of not using it for whatever reason. To be honest I prefer TOR for the hardcore aesthetics.

      For full points, can you further clarify what you don't allow regarding Tor? Would running "$ torsocks curl ho-ost.com" be a violation of AUP? Do you not allow customers to operate any type of Tor nodes, or just some? Time for a brief lesson :)

      The three types are: bridge, relay, exit. Bridges only act as entry points to the network, for people who don't want their network manager to easily see that they're connecting to the Tor network (think: China, Russia, etc). Relays only talk to other relays or people entering the Tor network. Exits are the only ones which send requests on behalf of users to computers outside the Tor network, and that generate abuse complaints, except they can be run without many problems if one is using a "reduced exit policy". Additionally, the IPs of relays and exits are publicly listed, while bridges are not.

      I used "TOR" because where I'm currently staying's main attraction is called Tor too, but often in capitals. :P We don't allow bridges, relays, exits or any application in relation to Tor. Our policy now clarifies that Tor is seperate to our "illegal softwares" clause and specifies the time limit for our 75% CPU usage. I've also made sure to add our abuse complaints email for reports.

      Thanks both.

      Thanked by 1joepie91
    • joepie91joepie91 Member, Provider

      @Hoost said:

      @fxf said:

      @Hoost said:

      >

      Perhaps a seperate sentence for the Tor (Without capitals, thanks @fxf ) related policy would clarify. Regardless, we don't allow it.

      I've also heavily used TOR before discovering the Tor folk make a point of not using it for whatever reason. To be honest I prefer TOR for the hardcore aesthetics.

      For full points, can you further clarify what you don't allow regarding Tor? Would running "$ torsocks curl ho-ost.com" be a violation of AUP? Do you not allow customers to operate any type of Tor nodes, or just some? Time for a brief lesson :)

      The three types are: bridge, relay, exit. Bridges only act as entry points to the network, for people who don't want their network manager to easily see that they're connecting to the Tor network (think: China, Russia, etc). Relays only talk to other relays or people entering the Tor network. Exits are the only ones which send requests on behalf of users to computers outside the Tor network, and that generate abuse complaints, except they can be run without many problems if one is using a "reduced exit policy". Additionally, the IPs of relays and exits are publicly listed, while bridges are not.

      I used "TOR" because where I'm currently staying's main attraction is called Tor too, but often in capitals. :P We don't allow bridges, relays, exits or any application in relation to Tor. Our policy now clarifies that Tor is seperate to our "illegal softwares" clause and specifies the time limit for our 75% CPU usage. I've also made sure to add our abuse complaints email for reports.

      Thanks both.

      I appreciate the quick fix :)

      I've just signed up for a service, and it seems that GMail isn't happy about the e-mail verification link:

      Thanked by 1Mic-hael
    • Mic-haelMic-hael Member, Provider

      @joepie91 said:

      I appreciate the quick fix :)

      I've just signed up for a service, and it seems that GMail isn't happy about the e-mail verification link:

      Apologies for the inconvenience. Our emails now send under the ho-ost domain rather than our SMTP provider so our links should now work.

    Sign In or Register to comment.