Security

 508 Resource Limit Reached

The “508 Resource Limit Is Reached” error message appears when an account exceeds the...

 Am I allowed to host .mp3 files?

It is allowed to host .mp3 files, but not .mp3 files without authorship.Please note that if your...

 Blocked IP address in the server Firewall

This blockage occurs when you try to sign in to cPanel, Webmail, FTP account and create a...

 CPU Usage

Shared ServersAdriaHost allows a maximum of 25% CPU usage limit. You may exceed this limit for no...

 Changing the main email address on the client's account

Email address that is listed as the main email address in the client account is the main channel...

 Directory Privacy - password protected directory

If you activate and configure this option in your cPanel, you can restrict access to a directory...

 Hacked site, site cleaning and scanning

If you suspect that the site has been hacked and you want to check it, you can do it easily in...

 How Can I Prevent Hacking?

The most important thing to do is keep your passwords a secret. If you must give a password to...

 How can I make a stronger password?

How can I make a stronger password?Password SelectionA good password is easy to remember, but...

 How does protection against viruses and harmful files work on hosting?

The only way a virus, malware, or harmful script can infiltrate a website is through a security...

 How many accounts per server?

We cannot offer an estimate.We have multiple accounts on the shared servers, it also depends what...

 How much traffic can I have?

We do not have a limit to the number of visitors. However, there is a physical limit our network...

 How to Handle the Google Attack Page

When you see the dreaded Google Attack Site warning, you should immediately submit a ticket to...

 ImunifyAV and Imunify360 - scanning, protection, cleaning

ImunifyAV software is available on all shared hosting plans. This software scans your hosting and...

 Inode number restrictions

There is a limit of 250,000 files and folders, per user account. This includes everything on your...

 Is it possible to install eAccelerator?

It's not possible to use eAccelerator on AdriaHost shared servers, because handlers on all our...

 Mail Policy and Limits

Shared Plan Mail Limitations500 Hourly Maximum Outgoing Email LimitThis policy is applicable on a...

 Mail Policy and Limits

Shared Plan Mail Limitations500 Hourly Maximum Outgoing Email LimitThis policy is applicable on a...

 Music, video and picture sharing

If you need a website on which your visitors can upload and share movies, audio files or images,...

 MySQL Connection Limits

AdriaHost allows a maximum of 80 simultaneous MySQL connections per cPanel on shared servers....

 Open New Ports

We can only open outbound ports on these types of accounts.Please submit a ticket to our Support...

 Opt in mailing lists and Safelists

Email addresses on a single opt-in list are not confirmed. Anybody can submit anybody's address...

 Prepare to leave your old host

What to do before leaving your other host and coming to AdriaHost.Here is a simple check list to...

 Processes Limit

Shared plans are limited to 20 simultaneous processes per user account. Dedicated Servers and VPS...

 Reference to viruses and website hacking

You are responsible for your website's security, and we are responsible for server security. Be...

 SQL injection, insertion

SQL injection is an attack where malicious code is passed to an SQL Server for execution. The...

 Stealing the access details for cPanel, FTP account or e-mail account

The most common scenario for detection and stealing of user access data is based on the virus...

 The site displays a Dangerous site warning

If you’re a developer and your site is showing a “Dangerous site” warning, here are steps to help...

 Traceroute, Whois, Ping and Dig

The Tracroute, Whois, Ping and Dig tools are very informative. There are many ways to run these...

 User accounts backup

Shared HostingYou can manually create backup of your files and database, but you can't create...

 What happens to someone abusing system resources?

The offending site will be suspended and the owner will be given an opportunity to fix the...

 What is Server Load?

Load expresses how many processes are waiting in the queue to access the computer processor. This...