Full Name - we show it in the review in different places on our website and inside our widgets on 3rd party websites if they use it. Email Address - we never show the author's email to other users and use it only for the following purposes: notifications about any updates related to this review give the full control over review content to the user reviews posted with email can be easily changed at any time by author if the user has Gravatar profile, the email can be used to show his avatar This information is optional and you can skip it if you don't want to share this. Link to social page - we use the link to the social profile to get user avatar from it and makes author's name a link so users can be sure that this review is posted by the real person. It will be shown in the review in different places on our website and inside our widgets on 3rd party websites if they use it. This information is optional and you can skip it if you don't want to share this. IP address - we use this information to show the flag of reviewer's country in the review also to detect the scam reviews. We collect this information automatically when the review is posted by the author.
Free managed services
Paid Managed Services
Databases 5 pcs. Disk space 10 Gb. Databases 15 pcs. Disk space 30 Gb. Databases 50 pcs. Disk space 50 Gb. Shared web-hosting comes with anything you may need to run a web-site.
Get your name on the Internet!
You can install new 1C-Bitrix products or transfer your projects to this virtual server. Installation of a control panel cPanel or ISPmanager. Consulting on basic actions at control panel cPanel or ISPmanager. Managed services package includes the following services:. We waive off the first year registration fee for an. We use only real CPU cores so you know what you are buying. To make your virtual sever work better and faster, we have set a swapping technology for it. It can be disabled at any time.
The Patchman software is installed on our shared hosting. This system finds vulnerabilities in plugins and CMS and patches them automatically without updating CMS and reloading the website. It also removes malicious codes and malware from useful files. You may think that hackers won't waste their time to hack your blog website as they will find no credit card information. But don't forget about the botnet. Botnet is a number of Internet-connected computers and websites that are infected with malware. These botnets scan other websites and devices automatically to find their vulnerabilities — this way, the malicious code is injected to websites. The purpose is often to connect the website to the botnet system, not to get some confidential data. So hackers can use your website to send spam, distribute spyware, or carry out DDoS attacks.