Page 2 of 4 FirstFirst 1234 LastLast
Results 41 to 80 of 121
  1. #41

    Web Hosting Buzz Down Again

    Thanks for your reply, yes Olgas version of events I had pasted in, for you information I have pasted in your other excuse below
    As mentioned previously I got 3 different excuses from you guys in total, maybe it is just a case of "you get what you pat for" You can go ahead and delete my accounts as "Elvis has now left the building" What a waste of time and money

    By the way the server is down yet again today.

    rs11 server technical problems
    Posted By: Matt R On: 26 Mar 2008 09:47 AM
    Details Outage related to disk/raid controller failure

    Unfortunately the hard drive and raid controller has failed in rs11. This has caused an extended outage which we apologize for. These are now being replaced.

  2. #42
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,852
    As we announced, the DDoS attack started up again and we're working on filtering it.

    RS11 and RS12 are different servers. RS11's raid issue is unrelated to this and was weeks ago.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.namecheap.com - hosting from a registrar DONE RIGHT!

  3. #43
    Join Date
    Aug 2002
    Posts
    1,612

    *

    DDOS or DOS attacks are something we cannot control and I am pretty sure no other web host here would be able to negate this fact too.

    We as a highly professional and responsible company have taken and would continue to take measures to prevent and sustain such acts of criminal deliberation.

    Such anti humanization acts by criminals of the modern world serve no good.

  4. #44
    Join Date
    Aug 2002
    Posts
    1,612

    *

    Just for the information of the folks who may or may not have an idea about what a DOS or a DDOS attack is ------ below is an article copied from the world famous encyclopedia

    A distributed denial of service attack (DDoS) occurs when multiple compromised systems flood the bandwidth or resources of a targeted system, usually one or more web servers. These systems are compromised by attackers using a variety of methods.

    Malware can carry DDoS attack mechanisms; one of the more well known examples of this was MyDoom. Its DoS mechanism was triggered on a specific date and time. This type of DDoS involved hardcoding the target IP address prior to release of the malware and no further interaction was necessary to launch the attack.

    A system may also be compromised with a trojan, allowing the attacker to download a zombie agent (or the trojan may contain one). Attackers can also break into systems using automated tools that exploit flaws in programs that listen for connections from remote hosts. This scenario primarily concerns systems acting as servers on the web.

    Stacheldraht is a classic example of a DDoS tool. It utilizes a layered structure where the attacker uses a client program to connect to handlers, which are compromised systems that issue commands to the zombie agents, which in turn facilitate the DDoS attack. Agents are compromised via the handlers by the attacker, using automated routines to exploit vulnerabilities in programs that accept remote connections running on the targeted remote hosts. Each handler can control up to a thousand agents.[5]

    These collections of compromised systems are known as botnets. DDoS tools like stacheldraht still use classic DoS attack methods centered around IP spoofing and amplification like smurf attacks and fraggle attacks (these are also known as bandwidth consumption attacks). SYN floods (also known as resource starvation attacks) may also be used. Newer tools can use DNS servers for DoS purposes. (see next section)

    Unlike MyDoom's DDoS mechanism, botnets can be turned against any IP address. Script kiddies use them to deny the availability of well known websites to legitimate users.[6] More sophisticated attackers use DDoS tools for the purposes of extortion — even against their business rivals.[7]

    It is important to note the difference between a DDoS and DoS attack. If an attacker mounts a smurf attack from a single host it would be classified as a DoS attack. In fact, any attack against availability would be classed as a Denial of Service attack. On the other hand, if an attacker uses a thousand zombie systems to simultaneously launch smurf attacks against a remote host, this would be classified as a DDoS attack.

    The major advantages to an attacker of using a distributed denial-of-service attack are that multiple machines can generate more attack traffic than one machine, multiple attack machines are harder to turn off than one attack machine, and that the behavior of each attack machine can be stealthier, making it harder to track down and shut down. These attacker advantages cause challenges for defense mechanisms. For example, merely purchasing more incoming bandwidth than the current volume of the attack might not help, because the attacker might be able to simply add more attack machines.

    Although most DDoS attacks are malicious in nature, the same technique can be used to aid the Internet community. Internet fraud schemes, such as Nigerian 419 scams or phishing, commonly involve fraudulent websites that either impersonate a real website for purposes of stealing the victim's identity, or lend credibility to a scammer's fictional business venture to lure the victim into a false sense of confidence. Scam baiters, who combat these scams by posing as victims for the purpose of wasting the scammer's time and money and obtaining information that can be used by authorities, will forward sites they encounter during the course of their conversations to groups that specialize in site-killing.[citation needed] The group will first try to have a site taken down by informing the host of said site that the site is being used fraudulently. In the case where that approach fails, the group will organize a "takedown" of the site by encouraging its members to visit the site en masse and continually refresh its content (an intentional form of the Slashdot effect sometimes referred to as flash mobbing, although that term is technically reserved for real-world gatherings). Alternately, some groups have special web pages that link to images hosted by these fake sites and show the images to visitors (usually members or supporters of the site-killing group) while constantly reloading them, which is known as intentional bandwidth hogging.[citation needed] The purpose, similar to malicious DoS attacks, is to (a.) rapidly consume all of the website's allocated monthly bandwidth, after which requests for the site's content are refused, (b.) draw the attention of the site's host, who when faced with the constant onslaught on the entire hosting network's resources, will usually remove the site, and/or (c.) take up all available connections and maximum throughput of the host so that would-be victims cannot access the site.

    [edit] Reflected attack

    A distributed reflected denial of service attack (DRDoS) involves sending forged requests of some type to a very large number of computers that will reply to the requests. Using Internet protocol spoofing, the source address is set to that of the targeted victim, which means all the replies will go to (and flood) the target.

    ICMP Echo Request attacks (described above) can be considered one form of reflected attack, as the flooding host(s) send Echo Requests to the broadcast addresses of mis-configured networks, thereby enticing many hosts to send Echo Reply packets to the victim. Some early DDoS programs implemented a distributed form of this attack.

    Many services can be exploited to act as reflectors, some harder to block than others.[8] DNS amplification attacks involve a new mechanism that increased the amplification effect, using a much larger list of DNS servers than seen earlier.[9]

    [edit] Unintentional attack

    This describes a situation where a website ends up denied, not due to a deliberate attack by a single individual or group of individuals, but simply due to a sudden enormous spike in popularity. This can happen when an extremely popular website posts a prominent link to a second, less well-prepared site, for example, as part of a news story. The result is that a significant proportion of the primary site's regular users — potentially hundreds of thousands of people — click that link in the space of a few hours, having the same effect on the target website as a DDoS attack.

    News sites and link sites — sites whose primary function is to provide links to interesting content elsewhere on the Internet — are most likely to cause this phenomenon. The canonical example is the Slashdot effect. Sites such as Digg, Fark, Something Awful, and the webcomic Penny Arcade have their own corresponding "effects", known as "the Digg effect", "farking", "goonrushing" and "wanging"; respectively.

    Routers have also been known to create unintentional DoS attacks, as both D-Link and Netgear routers have created NTP vandalism by flooding NTP servers without respecting the restrictions of client types or geographical limitations.

    Similar unintentional attacks can also occur via other media, e.g. when a URL is mentioned on television. If a server is being indexed by Google or another search engine during peak periods of activity, or does not have a lot of available bandwidth while being indexed, it can also experience the effects of a DoS attack.

    [edit] Incidents

    The first major attack involving DNS servers as reflectors occurred in January 2001. The target was Register.com.[10] This attack, which forged requests for the MX records of AOL.com (to amplify the attack) lasted about a week before it could be traced back to all attacking hosts and shut off. It used a list of tens of thousands of DNS records that were a year old at the time of the attack.

    In July 2002, the Honeynet Project Reverse Challenge was issued.[11] The binary that was analyzed turned out to be yet another DDoS agent, which implemented several DNS related attacks, including an optimized form of a reflection attack.

    On two occasions to date, attackers have performed DNS Backbone DDoS Attacks on the DNS root servers. Since these machines are intended to provide service to all Internet users, these two denial of service attacks might be classified as attempts to take down the entire Internet, though it is unclear what the attackers' true motivations were. The first occurred in October 2002 and disrupted service at 9 of the 13 root servers. The second occurred in February 2007 and caused disruptions at two of the root servers.[citation needed]

    In February 2007, more than 10,000 online game servers like Return to Castle Wolfenstein, Halo, Counter-Strike and many others were attacked by "RUS" hacker group. The DDoS attack was made from more than a thousand computer units located in the republics of the former Soviet Union, mostly from Russia, Uzbekistan and Belarus. Minor attacks are still continuing to be made today.[citation needed]

    In late January 2008, a group calling themselves Anonymous began a DDoS attack on Scientology web sites as a part of an Anti-Scientology campaign called Project Chanology.[12]

    [edit] Prevention and response

    [edit] Surviving attacks

    The investigative process should begin immediately after the DoS attack begins. There will be multiple phone calls, callbacks, emails, pages and faxes between the victim organization, one's provider, and others involved. This can be a very time consuming process. It has taken some very large networks with plenty of resources several hours to halt a DoS attack.

    The easiest way to survive an attack is to have planned for the attack. Having a separate emergency block of IP addresses for critical servers with a separate route can be invaluable. A separate route (perhaps a DSL) is not that extravagant, and it can be used for load balancing or sharing under normal circumstances and switched to emergency mode in the event of an attack.

    Filtering is often ineffective, as the route to the filter will normally be swamped so only a trickle of traffic will survive. However, by using an extremely resilient stateful packet filter that will inexpensively[13] drop any unwanted packets, surviving a DoS attack becomes much easier. When such a high performance packet filtering server is attached to an ultra-high bandwidth connection (preferably an internet backbone), communication with the outside world will be unimpaired so long as not all of the available bandwidth is saturated, and performance behind the packet filter will remain normal as long as the packet filter drops all DoS packets.[14] It should be noted however, that in this case the victim of the DoS attack still would need to pay for the excessive bandwidth. The price of service unavailability thus needs to be weighed against the price of truly exorbitant bandwidth/traffic.

    [edit] Firewalls

    Firewalls have simple rules such as to allow or deny protocols, ports or IP addresses. Some DoS attacks are too complex for today's firewalls, e.g. if there is an attack on port 80 (web service), firewalls cannot prevent that attack because they cannot distinguish good traffic from DoS attack traffic. Additionally, firewalls are too deep in the network hierarchy. Your router may be affected even before the firewall gets the traffic. Nonetheless, firewalls can effectively prevent users from launching simple flooding type attacks from machines behind the firewall.

    Modern stateful firewalls like Check Point FW1 NGX & Cisco PIX have a built-in capability to differentiate good traffic from DoS attack traffic. This capability is known as a "Defender", as it confirms TCP connections are valid before proxying TCP packets to service networks (including border routers). A similar ability is present in OpenBSD's pF, which is available for other BSDs as well. In that context, it is called "synproxy".

    Comodo Firewall Pro has a built-in Emergency Mode which is activated when the number of incoming packets per seconds exceed a set value for more than the specified time, for example, more than 20 packets/sec for more than 20 seconds. If this happens, the firewall classifies it as a DoS attack and switches to Emergency Mode. In this mode, all inbound traffic is blocked except previously established and active connections, but outbound traffic is allowed. The packet number threshold and the time needed for verifying an attack can be adjusted by the user separately for TCP, UDP and ICMP. The firewall also has some other attack prevention mechanisms, like protocol analysis, checksum verification (so that the packets aren't altered since transmission) and NDIS protocol monitoring for attempts at making a DoS attack by using own protocols, thus outmaneuvering older firewalls.

    [edit] Switches

    Most switches have some rate-limiting and ACL capability. Some switches provide automatic and or system-wide rate limiting, traffic shaping, delayed binding (TCP splicing), deep packet inspection and Bogon filtering (bogus IP filtering) to detect and remediate denial of service attacks through automatic rate filtering and WAN Link failover and balancing.

    These schemes will work as long as the DoS attacks are something that can be prevented by using them. For example SYN flood can be prevented using delayed binding or TCP splicing. Similarly content based DoS can be prevented using deep packet inspection. Attacks originating from dark addresses or going to dark addresses can be prevented using Bogon filtering. Automatic rate filtering can work as long as you have set rate-thresholds correctly and granularly. Wan-link failover will work as long as both links have DoS/DDoS prevention mechanism.

    [edit] Routers

    Similar to switches, routers have some rate-limiting and ACL capability. They, too, are manually set. Most routers can be easily overwhelmed under DoS attack. If you add rules to take flow statistics out of the router during the DoS attacks, they further slow down and complicate the matter. Cisco IOS has features that prevents flooding, i.e. example settings.[15]

    [edit] Application front end hardware

    Application front end hardware is intelligent hardware placed on the network before traffic reaches the servers. It can be used on networks in conjunction with routers and switches. Application front end hardware analyzes data packets as they enter the system, and then identifies them as priority, regular, or dangerous. There are more than 25 bandwidth management vendors. Hardware acceleration is key to bandwidth management. Look for granularity of bandwidth management, hardware acceleration, and automation while selecting an appliance.

    [edit] IPS based prevention

    Intrusion-prevention systems (IPS) are effective if the attacks have signatures associated with them. However, the trend among the attacks is to have legitimate content but bad intent. IPSs which work on content recognition cannot block behavior based DoS attacks.

    An ASIC based IPS can detect and block denial of service attacks because they have the processing power and the granularity to analyze the attacks and act like a circuit breaker in an automated way.

    A rate-based IPS (RBIPS) must analyze traffic granularly and continuously monitor the traffic pattern and determine if there is traffic anomaly. It must let the legitimate traffic flow while blocking the DoS attack traffic.

    [edit] Side effects of DOS attacks

    [edit] Backscatter

    In computer network security, backscatter is a side-effect of a spoofed denial of service (DoS) attack. In this kind of attack, the attacker spoofs (or forges) the source address in IP packets sent to the victim. In general, the victim machine can not distinguish between the spoofed packets and legitimate packets, so the victim responds to the spoofed packets as it normally would. These response packets are known as backscatter.

    If the attacker is spoofing source addresses randomly, the backscatter response packets from the victim will be sent back to random destinations. This effect can be used by network telescopes as an indirect evidence of such attacks.

    The term "backscatter analysis" refers to observing backscatter packets arriving at a statistically significant portion of the IP address space to determine characteristics of DoS attacks and victims.

    An educational animation describing such backscatter can be found on the animations page maintained by CAIDA, the Cooperative Association for Internet Data Analysis.

    [edit] See also

    * Barrett Lyon
    * Black fax
    * Dosnet
    * Intrusion-detection system
    * Network intrusion detection system
    * Zombie computer

    [edit] Notes and references

    1. ^ Intrusion Detection FAQ: Distributed Denial of Service Attack Tools (trinoo and wintrinoo)
    2. ^ Understanding Denial-of-Service Attacks (US CERT)
    3. ^ "Advisory CA-1997-28 IP Denial-of-Service Attacks" (CERT)
    4. ^ Sop, Paul (2007). P2P Distributed Denial of Service Attack Alert.
    5. ^ The "stacheldraht" distributed denial of service attack tool
    6. ^ Intrusion Detection FAQ: Distributed Denial of Service Attack Tools: trinoo and wintrinoo
    7. ^ US credit card firm fights DDoS attack
    8. ^ Paxson, Vern (2001), An Analysis of Using Reflectors for Distributed Denial-of-Service Attacks
    9. ^ Vaughn, Randal and Evron, Gadi (2006), DNS Amplification Attacks
    10. ^ January 2001 thread on the UNISOG mailing list
    11. ^ Honeynet Project Reverse Challenge
    12. ^ Richards, Johnathan (The Times). "Hackers Declare War on Scientology: A shadowy Internet group has succeeded in taking down a Scientology Web site after effectively declaring war on the church and calling for it to be destroyed.", FOX News, FOX News Network, LLC., January 25, 2008. Retrieved on 2008-01-25.
    13. ^ NB: no link in this <ref - ie. without consuming much processing power
    14. ^ OpenBSD's pf is a packet filter some providers use for exactly this purpose. [1]
    15. ^ "Some IoS tips for Internet Service (Providers)" (Mehmet Suzen)

    [edit] External links

    * RFC 4732 Internet Denial-of-Service Considerations
    * W3C The World Wide Web Security FAQ
    * How to Prevent Denial of Service Attacks
    * cert.org CERT's Guide to DoS attacks.
    * surasoft.com - DDoS case study, concepts, and protection.
    * ATLAS Summary Report - Real-time global report of DDoS attacks.
    * newssocket.com An article regarding a DDoS for hire incident.
    * linuxsecurity.com An article on preventing DDoS attacks.
    * and Zombies:
    o Is Your PC a Zombie? on About.com
    o Intrusive analysis of a web-based proxy zombie network

  5. #45
    I am a customer in WHB for about 1.5 year. I did have minor problems and their support resolved them more or less.
    I confirm that for two full days the rs12 is not accessible for all accounts with shared-ip. They say they have a DDos attack and cut from routing all access to shared-IP causing all sites without a dedicated IP to be inaccessible.
    But:
    From the first day, in order to avoid the downtime, I request a dedicated IP, they send me the invoice in less than an hour, I paid them at once, and for 1.5 day they do not install the dedicate IP. Instead of that, they say that they will do it when everything will be ok for their server. This of course, does not happen when they are going to get money and it is at least unfair. And all my sites are down.

    Finally, it is a hosting provider that as no problem exists everything is ok, in the smaller problem you should have an alternative.

  6. #46
    Join Date
    Aug 2002
    Posts
    1,612
    From the first day, in order to avoid the downtime, I request a dedicated IP, they send me the invoice in less than an hour, I paid them at once, and for 1.5 day they do not install the dedicate IP. Instead of that, they say that they will do it when everything will be ok for their server. This of course, does not happen when they are going to get money and it is at least unfair. And all my sites are down.
    You would get a free IP address and your money would be refunded. Our technical team was working on the issue at hand as a priority. PM me your domain name and I would personally take care of this for you.

  7. #47
    @Forumsaddict
    It is impossible to send you PM.
    But tickets AMO-704645 and OJG-682192 can make the same.
    I will post results. Still no dedicated-ip nor money refunded.

  8. #48
    Finally,
    A dedicated IP address was given free of charge and money will be refunded back. That proves a quality in their service.
    I hope this issue was just a misunderstanding and everything will continue without problems.
    I did not have any serious problem except that, I was happy with their service and I have recommended webhostingbuzz to friends in past. And I do not want such cases to exist to services I recommend.
    Let's find out if this was a bad moment I should forget.

  9. #49
    WHB's online support can't do any tech support. The ticket support is good.
    The reseller servers are OK. The uptime is very good.

    If you use WHB's reseller, please pay more attention for its free domain names. You are not the real own of the free domains. You don't have the domain control panel. If you cancel your plan, you need pay $9 to cancel the account or pay $15 to transfer out.

    This year, one of WHB's reseller servers are attacked by hacker. All websites which are attacked can't be recovered because WHB use the same server to backup the data.
    Domain, Hosting and Reseller at http://www.hostdomainzone.com

  10. #50
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,852
    Quote Originally Posted by lwbbs View Post
    WHB's online support can't do any tech support. The ticket support is good.
    The reseller servers are OK. The uptime is very good.

    If you use WHB's reseller, please pay more attention for its free domain names. You are not the real own of the free domains. You don't have the domain control panel. If you cancel your plan, you need pay $9 to cancel the account or pay $15 to transfer out.

    This year, one of WHB's reseller servers are attacked by hacker. All websites which are attacked can't be recovered because WHB use the same server to backup the data.
    Our online live sales is exactly that - live sales and basic technical support (which is clearly stated).

    We also explain that you have the domain for as long as you have the hosting plan with us and if you cancel the account within the first year, you have to pay the $9 we paid to register the domain or transfer it to the registrar of your choice for $15. Assuming you never cancel the hosting plan, the domain is completely free. Again, we're not shady about this, this is all clearly stated in our TOS.

    I'm not sure which incident you're talking about but we haven't had any total data loss issues....
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.namecheap.com - hosting from a registrar DONE RIGHT!

  11. #51
    For the online support, it depends you are chatting with which person. Some persons can answer lots of tech question. But some persons just tell you to submit a ticket. But all persons are courteous.

    For the free domain, if it is within the first year. It is reasonable. But I was told it is anytime, even through the customer keeps the reseller plan, just want get the full domain control panel.

    For the incident, you may refer the following topic:
    http://whbstatus.com/showthread.php?t=1930

    02-10-2008, 06:50 PM
    RS10 Server illegal intrusion RS10 was hacked because of fault of the web server software. We are constantly updating the software and following the news that concerns its security, However, it cannot guarantee the 100% protection from new attacks.

    All we could restore was restored as soon as possible, the subnets where the attacks were performed from, are blocked immediately, the source of the attacks on our server was localized and removed. The software will be changed and reset soon.

    Unfortunately we failed to restore the part of the content as a result of the changes not only of the working directories but the backups as well.

    The files containing the letter "index" in their names were changed as well. If you have their copies you can restore them on your own.

    We apologize for the arisen situation and we will do our best to prevent it in the future
    Quote Originally Posted by mdrussell View Post
    Our online live sales is exactly that - live sales and basic technical support (which is clearly stated).

    We also explain that you have the domain for as long as you have the hosting plan with us and if you cancel the account within the first year, you have to pay the $9 we paid to register the domain or transfer it to the registrar of your choice for $15. Assuming you never cancel the hosting plan, the domain is completely free. Again, we're not shady about this, this is all clearly stated in our TOS.

    I'm not sure which incident you're talking about but we haven't had any total data loss issues....
    Domain, Hosting and Reseller at http://www.hostdomainzone.com

  12. #52
    Hi all,

    I am currently looking at a couple of reseller programs: WebHostingBuzz, ResellerZoom, Ubiquity, and a few others.
    My SIMPLE question is: is this host (WebHostingBuzz) good or not? I came to this thread to find that out, and not to witness desputes over some minor stuff. Everyone knows webhosts are people like us, and their hardware is as normal as our PCs at home, so it breaks sometimes. I don't care to have 100% uptime, 3 terabytes of disk, unlimited bandwidth, and tech support that never sleeps. That's just impossible, even for offshore companies, if you know what I mean. I just want to find out whether this host is reasonable, doesn't suspend accounts for as little as normal CPU usage, deliver on their promises, etc. And what about these free domains for life? If they are free for life, then they should be free for life. "Life" is not 1 year, is it? Why don't you ask them to remove the "life" promise from their site, if they only offer free domain for 1 year?

    OK, I hope to get some info back

    webzy
    <<Record Setter for Most Colors in a Signature - Please review the communities rules for signature setup>>

  13. #53
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,852
    Quote Originally Posted by webzy View Post
    Hi all,

    I am currently looking at a couple of reseller programs: WebHostingBuzz, ResellerZoom, Ubiquity, and a few others.
    My SIMPLE question is: is this host (WebHostingBuzz) good or not? I came to this thread to find that out, and not to witness desputes over some minor stuff. Everyone knows webhosts are people like us, and their hardware is as normal as our PCs at home, so it breaks sometimes. I don't care to have 100% uptime, 3 terabytes of disk, unlimited bandwidth, and tech support that never sleeps. That's just impossible, even for offshore companies, if you know what I mean. I just want to find out whether this host is reasonable, doesn't suspend accounts for as little as normal CPU usage, deliver on their promises, etc. And what about these free domains for life? If they are free for life, then they should be free for life. "Life" is not 1 year, is it? Why don't you ask them to remove the "life" promise from their site, if they only offer free domain for 1 year?

    OK, I hope to get some info back

    webzy
    Hello webzy,

    Our free domains for life are for the lifetime of your hosting account with us. Should you ever cancel and wish to keep the domain, we offer you the chance to do this (and you just pay the registration charges). This is clearly stated on our site.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.namecheap.com - hosting from a registrar DONE RIGHT!

  14. #54
    Thanks for a quick reply. So, as I understand this, somebody tried to cancel their account before the year was up, so they had to pay the normal registration and transfer fees stated in your TOS. That's understandable and it was basically their not reading of the TOS, not your not keeping the promises.

    I am currently with imhosted, and everyone knows what that's like LOL. Overselling like crazy and then suspending my account after as much as installing some PHP driven site. I was shocked, to say the least. But... it was my fault after all, that I did not do my research into hosting companies beforehand. I was a total beginner a few years back, and had no clue about all those issues. I thought, hey! loads of space, cheap plan, I like it. Was I ever wrong...

    I am not really looking for reselling, but I have over 100 domains which I'd like to setup somewhere. Only a few are going to be full "heavy" sites; others are just parked at the moment. All I need is to have my sites up most of the time, have PHP and MySQL as well as ImageMagic and Fantastico. In time, it would be nice to have easily customizable shopping carts with a possibility for European banking system incorporated into them (in Europe we can easily pay online directly from our bank accounts as well as credit cards and PayPal). SSH would be REALLY nice, as ftp is a pain in the butt. Custom nameservers would be nice and cheap SSL too.

    Am I asking a lot, or is it doable?

    webzy
    <<Record Setter for Most Colors in a Signature - Please review the communities rules for signature setup>>

  15. #55
    OK, since my last post I have signed up with hostnine. I will let you know guys how it goes.
    A review will come after a while.

    webzy
    <<Record Setter for Most Colors in a Signature - Please review the communities rules for signature setup>>

  16. #56
    OK, there's nothing really to review about hostnine... I left them already.

    See more details about why I left them in another thread, where we discuss it in more detail.

    http://www.webhostingtalk.com/showthread.php?t=574513

    webzy
    <<Record Setter for Most Colors in a Signature - Please review the communities rules for signature setup>>

  17. #57
    Subject: Stay away from webhostingbuzz!!!!
    - by deafsurf.org on 15 Apr 2008:

    " Webhosstingbzz used to be top notch at first year ago then this 2008, half year coming (I got good deal like 2 years contract for 84 dollars each year)
    Then I noticed that deafsurf.org shut down few times in each month and awful slowest.
    I complained to webhostingbuzz about this and they never respond me. Also, I can’t use my old password and username for log in deafsurf.org thru Ftp but somehow my same old PW/username don’t work any more now.
    Look like maybe they caused some mistake by their goofs and avoid answering my complaints. I am starts broiling after I tried to get Bill dept and Support’s attentions and they never respond my emails then I email them with my strong warning to them that my lawyer may contact webhostingbuzz for legal action including loss $, emotion damage and wasted my value time unless they better to respond me in within business 10 days from today Tuesday, April 15th 4 am. My patient is already run out. Time for you to clean up your damn messy action now!
    I will never do business with you again ever!

    Hey everyone, I recommend you to try dreamhost.com. I am very happy with dreamhost.com for more than one year now. Service and support customer dept are excellent. They always respond my emails in within few hours to 24 hours.

    I really hate webhostingbuzz’s tickets. Their techies seem not know what to do.
    They always play thumbs up in their butts.

    Stay Away From Webhostingbuzz! They are shady geeks!

  18. #58
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,852
    addict60,

    If we ignored our customers then we would not be in business. If you contact us through the correct means - live support, phone support or via our helpdesk, I guarantee you will get a response.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.namecheap.com - hosting from a registrar DONE RIGHT!

  19. #59
    I guessed I got your big attention and you take me seriously because you dont want potent customers to get idea that your company screwed me so bad.

    I tried to get some helps from techie, billing and custom service. They never responded my emails at all.

    Even, I tried to talk with real live salewoman online then someone was rude to me like she hang up on me then I tried to get other staff then other lady showed up online and she gave me the same damn phone # which I tried to call this same phone # many times before and they never answered my calls at all. They used the answer machines all times and they never call me back at all. I cant log in FTP after somehow they cancelled or changed my password and username, which I use them many times before.

    I am already tired and sick of your company's avoids. I demand your company to pay me back for total 4 months because your company already violent my rights under California law for customers' rights. Also, you already breached my contract for 2 years. Your company hurt our surf club alot because impossible for me to update news and change photos at deafsurf.org, thanked alot to your staff who cancelled my password / login. That;s why I cant use tickets for report to your techie about this problem.

    I used to love your company webhostingbuzz last year but now, I hate your company. I dont recommend my friends and customers to webhostingbuzz ever again. I dont want to do business with your company again cuz your company already wasted my time, energy, and money. Now, I am very happy with my new server like dreamhost.com for my business shakaphoto.com and I will transfer deafsurf.org to dreamhost.com from webhostingbuzz sooner after you refund my $$$ for total 4 months ( for last 4 months ) and plus this month until expire on August 2008 (total 3 months) Your company owe us total 7 months in PRO RATE now.
    Last edited by addict60; 05-06-2008 at 03:59 AM.

  20. #60
    MDrussell,

    I believed that your company already got my 2 or 3 emails with my warning repeat that I will show copy of emails to my lawyer then my lawyer may contact your company for legal action if they failed to respond my email in business 10 days since last April 10th.

    I decided to wait and give your company more time to catch up with me and solve problems with me but they seem to ignored my warning emails. They may think I am trying to scare them.

    I am deadly serious, I am not playing game with your company for legal action. I will contact my lawyer this week and see what my lawyer mention about your company's failed to serve my deaf surf club after we paid your company $84 last August 07 through my Visa. I can prove that 84 dollars had been paid to your company by showing my credit card statement to judge in California.

    Also, in my last warning email to your company's billing, customer service and techie including many eyewitnesses from members of my surf club in C.C. for trial paper back to your company.

    The same members got my copied emails to your company about their failed server, lack of cooperation and communication to me for 4 months! The $84.00 is not from my money. This is coming from our club's fund. That's why many members are not happy with your company's failed server and lack of communication to me.

    Russell, at this time, you better tell your company to smell COFFEE & WAKE UP because we will take your company to small claim court soon unless your company refund money to us like total 7 months now or you will pay us by your ARM & LEG at the court! Your choice. Think careful!

  21. #61
    Join Date
    Jul 2002
    Location
    UK
    Posts
    512
    If WebHostingBuzz didn't reply to tickets at all did they receive them?

    If you were rude I'd expect the operator to terminate the live chat...

    Is it worth taking legal action for $84/2years service?
    Bloory
    Watch this space...

  22. #62
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,852
    addict60,

    I would love to know the ticket IDs of the emails you have sent us. Every email received will generate a ticket ID and allow us to track it. Feel free to PM me with this information.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.namecheap.com - hosting from a registrar DONE RIGHT!

  23. #63
    Quote Originally Posted by Bloory View Post
    If WebHostingBuzz didn't reply to tickets at all did they receive them?

    If you were rude I'd expect the operator to terminate the live chat...

    Is it worth taking legal action for $84/2years service?
    Look, I was very patient and polite then your real live staff online was very rude, which made me very pissed off.

    I can prove you by logging and you owe me apology later.

    now, are you trying to make me look bad guy to your potent customers? Try nice.

    You screw me and get away with 84/2years service and I can screw you by make nice profit $$$ by lawsuit against you and I can ask judge to add thousand dollars for suffer and emotinal damage by your company's neglects. because your company failed to answer my tickets, emails , phone calls and your rude staff online. this drove me exhausted and frustrated big times.

  24. #64
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,852
    You explicitly stated you sent us two or three emails. If you did, you'd have ticket IDs available, so I can look into your claim of our "non response".

    Live chat is mainly for basic issues but if you can provide me with the live chat ID, I can also look into it.

    You have plenty of strong statements against us yet you have not provided me with one piece of information to determine that:

    a) you are or were a customer
    b) you sent us 2 or 3 emails
    c) what issues, if any, you had and so that these can be resolved

    All I am asking for is the ticket ID. You're making yourself look bad by not providing this.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.namecheap.com - hosting from a registrar DONE RIGHT!

  25. #65
    Join Date
    Jul 2002
    Location
    UK
    Posts
    512
    Quote Originally Posted by addict60 View Post
    Look, I was very patient and polite then your real live staff online was very rude, which made me very pissed off.

    I can prove you by logging and you owe me apology later.

    now, are you trying to make me look bad guy to your potent customers? Try nice.

    You screw me and get away with 84/2years service and I can screw you by make nice profit $$$ by lawsuit against you and I can ask judge to add thousand dollars for suffer and emotinal damage by your company's neglects. because your company failed to answer my tickets, emails , phone calls and your rude staff online. this drove me exhausted and frustrated big times.

    Sir,

    I am in no way connected with WebHostingBuzz, I was just surprised at your attitude.

    You can ask a judge to add thousands of dollars so you can "make a nice profit" but if there is any sense in the world he'll dismiss the case and award costs against you. Clause 18 of their terms would appear to limit their liability in any case.

    Looks like it's up to you to prove that they received your tickets or shut up and move on.
    Bloory
    Watch this space...

  26. #66
    Quote Originally Posted by mdrussell View Post
    addict60,

    I would love to know the ticket IDs of the emails you have sent us. Every email received will generate a ticket ID and allow us to track it. Feel free to PM me with this information.
    I told you before. You didnt read my previous posts earlier. Please re-read it, scroll down.

    I stopped to use tickets# after your staff didnt bother to respond my tickets. I gave up them for good. This forced me to use emails to your staff and they still failed to respond me repeat.

    They failed to call me back after I tried to call and leave few messages and no luck at all.

    My patient is already ran out and I said HELL WITH WEBHOSTINGBUZZ.COM!

    However, you better report your company that I am considering legal action against your company soon if your company dont bother to look and find my previous emails sooner.

    We will be better off alot if your company refund my $$$$ in PRO RATE for total 7 months then I will forget the legal action. this is best interesting for everyone. This is cheaper than legal action. THINK HARDER!

    I am very tired and go to bed right now. I will read your more posts in morning or noon.

  27. #67
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,852
    And like I said, we wouldn't be in business if we didn't respond to tickets. All email addresses published on our site pipe into our helpdesk so either way, you would get a ticket ID.

    Your whole approach, tone and empty threats have made you look bad. My initial response was to determine the ticket ID to try and help you. Your loss.
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.namecheap.com - hosting from a registrar DONE RIGHT!

  28. #68
    What is wrong with your brain?
    Scroll down and re-read about why tickets# were not work for me. Now , you are making yourself look bad by not read my previous posts in careful!

    I will provide you all information next day when I feel fresh energy. I want your email address under webhostingbuzz.com then I can email you all documatary and you will be shock about your company's lack of communication with me. I can prove you about this. I gotta go to bed now. good night.

    Quote Originally Posted by mdrussell View Post
    You explicitly stated you sent us two or three emails. If you did, you'd have ticket IDs available, so I can look into your claim of our "non response".

    Live chat is mainly for basic issues but if you can provide me with the live chat ID, I can also look into it.

    You have plenty of strong statements against us yet you have not provided me with one piece of information to determine that:

    a) you are or were a customer
    b) you sent us 2 or 3 emails
    c) what issues, if any, you had and so that these can be resolved

    All I am asking for is the ticket ID. You're making yourself look bad by not providing this.

  29. #69
    I already told you before. I will provide you all information ASAP next day.

    LET ME BE BLUNT WITH YOU!!!

    Nah, I am not loss at all. You are desperate and try to make me look very bad to your potent customers. I am not hiding anything from you. I STAND AND STAY HERE TO FACE TO YOUR FACE! BECAUSE I WANT YOUR COMPANY TO SMELL COFEEE AND WAKE UP NOW!

    I want all potent customers to know the truth about your company's neglects to me.

    I want you to give me your company's email address or should I post all of information at here, so you and people can read all my truths? You better be very careful what you just called me "loss"
    "
    You can try to make me look like bad person to public eyes but I want all public eyes to know the truth that I tried to contact you many times and your company failed to respond me.
    I have rights to be very pissed off cuz I already paid you 84 dollars in advance.

    okay, how would you feel if you hired and pay mechanic in advance for repair your car then later weeks / months, your mechanic keeps to ignore your emails, phone calls, fax, snail mail etc...cuz he never finish to work on your car at all and he got all of your money. He laugh at you cuz you are big sucker.

    then you become very frustrated and pisses off cuz your mechanic avoid or ignored your calls all times. How do you feel about this? Now, you understand about my feeling.

    Now, are you trying to cover your butt again by try to make me look more like bad guy? Huh.
    I better shaddaup and hit my sack. Good late night.

    Quote Originally Posted by mdrussell View Post
    And like I said, we wouldn't be in business if we didn't respond to tickets. All email addresses published on our site pipe into our helpdesk so either way, you would get a ticket ID.

    Your whole approach, tone and empty threats have made you look bad. My initial response was to determine the ticket ID to try and help you. Your loss.

  30. #70
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,852
    Seriously, you have time to make multiple posts to slander my company yet you cannot spend 30 seconds to locate a ticket ID that will prove you contacted us? And thus allow me to look into our alleged lack of response?

    And you expect me to sit here, read this slander and not defend my business?
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.namecheap.com - hosting from a registrar DONE RIGHT!

  31. #71
    Join Date
    Jul 2002
    Location
    UK
    Posts
    512
    Matt,

    You've explained several times that all your company's email goes into the helpdesk, yet he insists he wants YOUR email address. I'd have thought that the helpdesk was more robust - especially since WHB isn't a tiny company and because even you need to be offline sometimes!

    He appears to be out to make you guys look bad and maybe make a quick buck in the process.
    Bloory
    Watch this space...

  32. #72
    Matt,

    ticket # helpdesk is not work for me like I told you many times before. That's email is good enough for me but your company never answer my few emails and even my few calls.

    Also, I am not surprised to see your ex customers pissed off at your company. Some guys claimed that your company never responded their ticket# and even calls. Sound like I am not alone in the boat. You can google search webhostingbuzz.com sucks and find out for your education.

    That's why I required to your email address. What is your email address, so I can send copies of my old emails to you thru webhostingbuzz? I am not interesting to deal with your failed helpdesk tickets.

    I am waiting for your email address, just PM me for this. I am going out for chores. Thanks.

  33. #73
    Quote Originally Posted by Bloory View Post
    Matt,

    You've explained several times that all your company's email goes into the helpdesk, yet he insists he wants YOUR email address. I'd have thought that the helpdesk was more robust - especially since WHB isn't a tiny company and because even you need to be offline sometimes!

    He appears to be out to make you guys look bad and maybe make a quick buck in the process.
    You said "WHB isn't a tiny company"

    I say Oh please, come on. I cant understand why WHB isn't a tiny company who failed to answer my emails and calls after WHB isn't a tiny company cancelled my password / username then I cant use deskhelp tickets anymore cuz of this. Tell me how?

    WHB is no excuse for failed to respond my emails and calls.

  34. #74
    Join Date
    Nov 2001
    Location
    London
    Posts
    4,852
    Matthew Russell | Namecheap
    Twitter: @mattdrussell

    www.namecheap.com - hosting from a registrar DONE RIGHT!

  35. #75
    Matt,

    I got your email address. I have t go out for some chore. I will email you all information ASAP and I hope that we can work out without any hardship feeling. Thanks for your patient.

  36. #76
    I remind you again, remember, I cant log in and send you the tickets# cuz your company cancelled or changed my password/username. That's why you didnt find my many tickets# cuz I had to use emails to your company and they never answer me at all.

  37. #77
    I used WHB service for 6 months. It is OK for me.

    Even through the online support can't provide any tech support. But they will tell you to submit a ticket at whbsupport.com. The ticket support is good. I also use the telephone support. I don't have any problem.

    Anyone can register an account at whbsupport.com. You just need provide an email address. The user name is your email address. If you forget password, you can reset it.
    Domain, Hosting and Reseller at http://www.hostdomainzone.com

  38. #78
    Join Date
    Oct 2008
    Posts
    87

    * RULE #54

    This have to do with something on the small letters that says you can have like 90% of the files called from the html files, but the files like: images, music, streaming, etc, can´t be bigger than 500kb each, and thouse files can't be more than the 10% of your hd space. This was applied for a resseler account... i read this on a post in other site. Im doing my reaserch to about this company, i like the plans but seems to me that are a bit exaggerated so there must be a trick... i cant find the exact text but maybe the people from WHB can explain us a bit more about this.

    Quote Originally Posted by ldcdc View Post
    Opinions might vary, but if a host is limiting the number of files a customer can host (something that is getting rather common), I think the limit should be mentioned somewhere on the site (I didn't find it). With many relatively common applications having thousands of files, it can be a limit a customer can easily run into.

    Yes, Matt's a good guy, I've no doubts about that.

  39. #79
    Join Date
    Jul 2005
    Location
    Edinburgh
    Posts
    3,878
    Quote Originally Posted by t2chen View Post
    1 post newbie
    That's a terrific name for a boyband that only has 1 member.

    And yeah Matt's a decent enough person, WHBuzz seem stable enough as well as Matt being a regular WHT'er.

    When it comes to finding a host a decent rule to follow is to "Let your eye be your merchant and your pocket the guide!"

    ie...read reviews to find a company which will suit you and pay accordingly for the quality.

    It's tough times that make monkeys eat red peppers.

    owm
    ‹(¿)›
    Life's what you make it.

  40. #80

    Best Hosting

    I think Web Hosting Buzz is one of best hosting. One thing i like most about Web Hosting Buzz is their support stuff, when you are in problem send them support ticket soon they will help you out. They are best and reliable.

Page 2 of 4 FirstFirst 1234 LastLast

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •