Acceptable Usage Policy

All services provided by ROCKET HOSTING OÜ may be used for lawful purposes only. The laws of Estonia/Netherlands (depending on the server location) and EU apply. Transmission, storage, or presentation of any information, data or material in violation of any EU Country, State, or City law is prohibited. This includes, but is not limited to: copyrighted material, material we judge to be threatening or obscene, or material protected by trade secret and other statute. The subscriber agrees to indemnify and hold harmless ROCKET HOSTING OÜ and its employees from any claims resulting from the use of the service which damages the subscriber or any other party. Our acceptable use policy is actively and strictly enforced. Offending content or users are suspended from our network, usually as soon as they are discovered, although we will always inform you when and why any action has been taken.

The subscriber acknowledges that the service provided is of such a nature that the service can be interrupted for many reasons other than the negligence of the company and that damages resulting from any interruption of service are difficult to ascertain. Therefore, the subscriber agrees that the company shall not be liable for any damages arising from such causes beyond the direct and exclusive control of the company.

The subscriber further acknowledges that the company's liability for its own negligence may not in any event exceed an amount equivalent to charges payable by the subscriber for services during the period damages occurred. In no event shall the company be liable for any special or consequential damages, loss, or injury.

Illegality in any form, including but not limited to the unauthorized distribution or copying of copyrighted software or other data, harassment, fraud, trafficking in obscene material, is prohibited. Undesirable content such as hacking, cracking, Warez, and IRC is not allowed. Software, audio, and video downloads may only be hosted if you are the writer and copyright owner of the resources, or you have a right to distribute the materials. Accounts suspended due to content or ToS/AUP violation are not refunded under any circumstances.


The following acts will be considered violations of the AUP:

1.1 Illegal Use, which includes but is not limited to:

  • Using the service in any way which violates Estonia or EU - State, Local, or International law.
  • Transmitting copyrighted material without authorization from the copyright holder.
  • Violating export control regulations.
  • Transmitting copyrighted media without the authority to distribute or display.
  • File storage/image hosting/file repository/streaming/backup.
  • Child pornography or kidnapping material.

1.2 Malicious Activity, which includes but is not limited to:

  • Willfully interfering with the regular operation of the service.
  • Attempting to access any unauthorized system or services.
  • Hosting any deceptive material for the purposes of phishing.
  • Running any password cracking software.
  • Virus, spyware, malware, or other infectious material.
  • Running root exploit kits against other servers.
  • Distributing viruses, worms, or Trojan horses.
  • Forging or misrepresenting message headers in whole or in part.
  • Scanning networks.
  • Threatening or encouraging bodily harm or destruction of property.
  • Violating the rights of privacy or publicity of an individual.

1.3 Promotion of Illicit Activity, which includes but is not limited to:

  • Any activities prohibited by Estonia/EU - State, Local, or International law.
  • Any activities which result in the spread of computer viruses or other damaging programs or data files.
  • Any activity or material protected by trade secret or other statute.
  • Fraudulent activity, phishing, pyramid schemes, chain letters, forgery, or impersonation.
  • Terrorist propaganda, racist material, or bomb/weapon instructions.
  • Hacking, cracking programs, or key generators.
  • Gambling.
  • Circumvention of copyright or patent protection.
  • Exposure of any trade secret.

1.4 Unsolicited Bulk Electronic Mailing includes, but is not limited to:

  • Transmitting any unsolicited commercial email.
  • Transmitting any unsolicited bulk email.
  • The Subscriber agrees to send bulk electronic mail only to those who have specifically requested to receive such mail and comply with all Estonia/Netherlands/EU laws governing the transmission of electronic mail.

1.5 Spamvertising and Related Activities includes, but is not limited to:

  • Posting commercial, political, or advertising posts to public forums.
  • Issuing unsolicited trackbacks for the purpose of promotion.
  • Providing DNS resolution in support of unsolicited bulk electronic mailing.
  • Hosting a destination site linked from unsolicited bulk electronic mailing.

1.6 Abuse includes, but is not limited to:

  • Consistent overuse of shared resources to the detriment of other subscribers.
  • Operating an open proxy server or using the service as part of a proxy network.
  • IRC and associated programs.
  • Scripts commonly used for abuse, attacks, or flooding.
  • Threatening, harassing, or obscene content.
  • Any proxies that do not require authentication (including open or unprotected anonymous web surfing/mail proxies, etc.).

1.7 Insufficiently-Secure Administration includes, but is not limited to:

  • Use of a null password, dictionary word as password, or any other form of authentication lacking reasonable secrecy from a third party as part of a root or user-level authentication scheme.
  • Allowing an unauthorized third party to establish root access to the service provided by Rocket Hosting.
  • Allowing an unauthorized third party to establish user-level access to the service provided by Rocket Hosting.
  • Operating an open mail relay.

1.8 Miscellaneous

  • Operating an Internet Relay Chat (IRC) server
  • Denial of Service Attacks (DOS/DDOS)
  • Any Spamming/Phishing or Hacking/Port Scanning/DDoS and CAMFROG related services
  • Unnecessary Port Scans
  • Mail Bombing
  • Excessive CPU Load
  • Abusing Server Resources

The client should make sure:

  • NOT to use 25% or more of system resources for longer than 90 seconds. There are numerous activities that could cause such problems; these include CGI scripts, FTP, PHP, HTTP, etc.
  • NOT to run stand-alone, unattended server-side processes at any point in time on the server. This includes any and all daemons, such as IRCD.
  • NOT to run any type of web spider or indexer (including Google Cash / AdSpy) on shared servers.
  • NOT to run any software that interfaces with an IRC (Internet Relay Chat) network.
  • NOT to run any BitTorrent application, tracker, or client. You may link to legal torrents off-site, but you may not host or store them on our shared servers.
  • NOT to participate in any file-sharing/peer-to-peer activities.
  • NOT to run any gaming servers such as Counter-Strike, Half-Life, Battlefield1942, etc.
  • NOT to run cron entries with intervals of less than 15 minutes.
  • NOT to run any MySQL queries longer than 15 seconds. MySQL tables should be indexed appropriately.
  • When using PHP include functions for including a local file, include the local file rather than the URL. Instead of include("http://yourdomain.com/include.php"), use include("include.php").
  • To help reduce usage, do not force HTML to handle server-side code (like PHP and SHTML).
  • Only use the HTTPS protocol when necessary. Encrypting and decrypting communications is noticeably more CPU-intensive than unencrypted communications.

Using a shared account as a backup/storage device is not permitted, with the exception of one cPanel backup of the same account. Please do not take backups of your backups.

It is your responsibility to ensure that scripts/programs installed under your account are secure, and the permissions of directories are set properly, regardless of the installation method. When possible, set permissions on most directories to 755 or as restrictive as possible. Users are ultimately responsible for all actions taken under their account. This includes the compromise of credentials such as usernames and passwords. It is required that you use a secure password. If a weak password is used, your account may be suspended until you agree to use a more secure password. Audits may be done to prevent weak passwords from being used. If an audit is performed, and your password is found to be weak, we will notify you and allow time for you to change/update your password.

1.9 Banned Scripts and Programs

The following scripts and programs are prohibited from use on our servers and may not be uploaded or run. These are banned due to their adverse effects on server load, potential for inviting hackers/spammers/criminal activity, and other reasons:

  • IRC egg drops/scripts/bots
  • Proxy servers/scripts/anonymizers
  • Mail bombers and anonymous mailers
  • IP and port spoofers/scanners
  • Hivemail/mailer pro
  • Telnet or SSH access scripts
  • nph-proxy and other scripts that operate like proxies
  • UBB (Ultimate Bulletin Board) in all versions
  • lstmrge.cgi
  • PHP/CGI shells or hacking tools
  • FormMail.cgi and FormMail.pl from Matt's Script Archive
  • Pirated software/warez
  • Image hosting scripts (e.g., similar to Photobucket or Tinypic)
  • AutoSurf/PTC/PTS/PPC sites
  • Bruteforce programs/scripts/applications
  • Mail bombers/spam scripts
  • Banner-ad services (commercial banner ad rotation)
  • File dump/mirror scripts (similar to RapidShare)
  • Commercial audio streaming (more than one or two streams)
  • Escrow/bank debentures
  • High-yield interest programs (HYIP) or related sites
  • Investment sites (FOREX, E-Gold Exchange, Second Life/Linden Exchange, Ponzi, MLM/Pyramid Scheme)
  • Sale of any controlled substance without prior proof of appropriate permit(s)
  • Prime banks programs
  • Lottery/gambling sites
  • MUDs/RPGs/PBBGs
  • Hacker-focused sites/archives/programs
  • Sites promoting illegal activities
  • Fraudulent/phishing sites (including but not limited to sites listed at aa419.org and escrow-fraud.com)
  • Broadcast or streaming of live sporting or copyrighted events (UFC, NASCAR, FIFA, NFL, MLB, NBA, WWE, WWF, etc.)
  • Child pornography
  • Anything that sends unsolicited/junk/spam emails

1.10 Torrent Activities:

Both public and private trackers are allowed for torrent activities, including leeching, downloading, or seeding. However, the content of torrents or torrent activities will be subject to this Acceptable Usage Policy (AUP).

1.11 DDoS or Attack Prevention:

Our services come with basic-level DDoS protection. You should harden your VPS/server security with a firewall, antivirus, and other applicable software to get better protection against DDoS attacks. Please note the following policies in case of an incoming/outgoing attack via your VPS/server:

INCOMING ATTACK on your VPS/Server:

1st Incident: Your IP will be null-routed for 24 hours or more and it can be reactivated if we think the attack has stopped.

2nd Incident: If the attack comes again, we may null-route your IP for 72 hours or more and it can be reactivated if we think the attack has stopped.

3rd and final incident: If the attack still continues, we will close your VPS/server and provide you a way to back up your data. We may also decide to stop providing any new services to you or close your account permanently in case of frequent attacks on your services.

OUTGOING ATTACK from your VPS/Server:

We strictly DO NOT allow such activities on our network, including but NOT limited to DDoS/other attacks, port scanning, and hacking/cracking activities, among others. If we find that your services are involved in such activities, they will be suspended immediately, and they may be closed permanently, depending on the severity of the attack/issue.


Date: 1st April 2023 / Rocket-Servers.com

Powered by WHMCompleteSolution