VPS Hosting

About ByteCode Unmanaged VPS Hosting

If you have outgrown your shared or reseller plan, a VPS is the ideal upgrade. Your VPS will run in it’s own isolated environment and allows you to install your own software or server applications.

Your VPS server comes with it’s own dedicated resources with a guaranteed equal-share of CPU power and a predefined amount of RAM. You are also able to upgrade your resources any time.

All servers come with an easy to use, yet comprehensive SolusVM control panel, allowing you to reboot and reload your server as well as view statistics.

Please note these servers are completely unmanaged, we can only provide assistance with hardware related issues.

RAM VSWAP STORAGE IPS BANDWIDTH DEPLOYMENT MONTHLY PRICE ORDER NOW
256 MB 512 MB 10 GB 1 500 GB 30 Minutes $5.00 ORDER
512 MB 768 MB 25 GB 1 1000 GB 30 Minutes $8.00 ORDER
1024 MB 2048 MB 50 GB 1 2000 GB 30 Minutes $12.00 ORDER
2048 MB 4096 MB 75 GB 1 3000 GB 30 Minutes $20.00 ORDER
4096 MB 4096 GB 100 GB 1 5000 GB 30 Minutes $30.00 ORDER

Feature of ByteCode Managed VPS

All plans include cPanel control panel, MySQL, Raid 10 Drives, and our 24/7 support team.

hosting_img1

Instant Setup

Each server is automatically set up instantly after payment allowing you to instantly to get started configuring your server, day or night.

Control Panel

All our servers are hosted on the industry’s best control panels allowing all users, new and expert to easily manage their servers

Automated Backups

Servers are automatically backed up daily in a off site location. Accidentally delete something? We will restore it for you!

Easy Upgrades

We want to see your server grow, thats why we make it easy for users to instantly upgrade their servers to accommodate more users.

Terms of Service

Torrents, TOR, Mining, IRC, Teamspeak, Minecraft, Starbound, Runescape and Chobots are not allowed.

To ensure the best performance for all of our customers, we use the following policies:

Your VPS should not have a load of 4 for more than one hour, or your VPS will get restarted.
Your VPS should not have a load of 2 for more than two hours, or your VPS will get restarted.
Your VPS is configured to send a maximum of 50 emails per hour. If you have justification, please open a ticket and we’ll raise this limit for you.
Please note that the CPU cores are shared and they are not dedicated to you. We allow you to use all of your cores for your peak times, but you cannot use them for an extended amount of time.

IF YOUR VPS(S) GETS MORE THAN ONE DDOS ATTACK (IN TOTAL), WE ARE GOING TO REFUND YOUR LAST PAYMENT AND STOP THE SERVICE.

cPanel licenses will be activated after 3 days of grace period. You will still be able to use it on trial mode for the first 3 days.

As a provider of web site hosting and other Internet-related services, ByteCode offers its customer (also known as “Subscribers”) and their customers and users the means to acquire and disseminate a wealth of public, private, commercial and non-commercial information. ByteCode respects that the Internet provides a forum for free and open discussion and dissemination of information. However, when there are competing interests at issue, ByteCode reserves the right to take certain preventive or corrective actions. In order to protect these competing interests, ByteCode has developed an Acceptable Use Policy (“AUP”), which supplements and explains certain terms of each customer’s respective service agreement, and is intended as a guide to the customer’s rights and obligations when using ByteCode’ services. This AUP will be revised from time to time.

One important aspect of the Internet is that no one party owns or controls it. This fact accounts for much of the Internet’s openness and value, but it also places a high premium on the judgement and responsibility of those who use it, both in the information they acquire and in the information they disseminate to others. When subscribers obtain information through the Internet, they must keep in mind that ByteCode cannot monitor, verify, warrant or vouch for the accuracy and quality of the information they acquire. For this reason, the subscriber must exercise his or her best judgement in relying on information obtained from the Internet, and also should be aware that some material posted to the Internet may be sexually explicit or otherwise offensive. Because ByteCode cannot monitor or censor the Internet, and will not attempt to do so, ByteCode cannot accept any responsibility for injury to its subscribers resulting from inaccurate, unsuitable, offensive or illegal Internet communications.

When subscribers disseminate information from the Internet, they must keep in mind that ByteCode does not review, edit, censor or take responsibility for any information its subscribers may create. When users place information on the Internet, they have the same liability as other authors for copyright infringement, defamation and other harmful speech. Also, because the information created is carried over ByteCode’ network and may reach a large number of people, including both subscribers and non-subscribers of ByteCode, subscribers’ postings to the Internet may affect other subscribers and may affect ByteCode’ goodwill, business, reputation or operations. For these reasons, subscribers violate ByteCode policy and the Service Agreement when they, their customers, affiliates or subsidiaries engage in the following prohibited activities:

Spamming:
Sending unsolicited bulk and/or commercial information over the Internet. It is not only harmful because of its negative impact on consumer attitudes toward ByteCode, but also because it can overload ByteCode’s network and disrupt service to ByteCode’s subscribers. Also, maintaining an open SMTP relay is prohibited. When a complaint is received, ByteCode will investigate and suspend the account if it is found to be sending SPAM. A $500 charge for violating this policy will be charged to the person initiating the SPAM. Furthermore ByteCode reserves the right to prosecute for this violation.

BitTorrent::
ByteCode does not allow BitTorrent, you may not run any bit torrent application/script, tracker, or client, and will suspend/terminate any offending account.

TOR – Open Proxy/VPN:
You may not run any public proxy services or any scripts that interface with TOR, including TOR relay, entry, exit and bridge nodes. TOR, public proxies and public VPN’s are strictly forbidden and we reserve the right to immediately terminate any account, without warning, found to be running these services.

Minecraft:
ByteCode is not for Minecraft servers, the large load these servers produce causes excessive strain on our infrastructure and as such is strictly forbidden.

Digital Currency Mining
The high CPU loaded produced by mining digital currency negatively impacts performance for all of our customers, as such you may not run any BitCoin related services, this includes any BitCoin derivatives such as LiteCoin, ZeroCoin and any other digital currencies.

CamFrog:
Due to the high frequency of DDOS attacks against CamFrog servers, it is forbidden to host Camfrog servers or other server applications that are frequent targets of Denial of Service attacks or other types of attacks. If found to be running such services your server will be immediately suspended and the server will not be reconnected to the network until such time that you agree to completely remove any and all traces of the offending service, and agree to let us have access to your server to confirm that the content has been completely removed. Any server guilty of a second violation will result in immediate account termination.

Obscene Speech or Materials:
Using ByteCode’s network to advertise, transmit, store, post, display, or otherwise make available child pornography or obscene speech or material is prohibited. ByteCode is required by law to notify law enforcement agencies when it becomes aware of the presence of child pornography on or being transmitted through its network.

Defamatory or Abusive Language:
Using ByteCode’s network as a means to transmit or post negative, defamatory, harassing, abusive or threatening language.

Forging of Headers:
Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.

Illegal or Unauthorized Access to Other Computers or Networks:
Accessing, illegally or without authorization, computers, accounts or networks belonging to another party, or attempting to penetrate security measures of another individual’s system (often known as “hacking”). Also, any activity that may be used as a precursor to an attempted system penetration (i.e., port scan, stealth scan or other information-gathering activity).

Distribution of Internet Viruses, Worms, Trojan Horses or Other Destructive Activities:
Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail bombing or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service or equipment.

Facilitation a Violation of this AUP:
Advertising, transmitting or otherwise making available any software, program, product or service that is designed to violate this AUP, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail bombing, denial of service attacks and piracy of software.

Other Illegal Activities:
Engaging in activities that are determined to be illegal, including, but not limited to, advertising, transmitting or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards and pirating software.

Other Activities:
Engaging in activities, whether lawful or unlawful, that ByteCode determines to be harmful to its subscribers, operations, reputation, goodwill or customer relations.

As we have pointed out, the responsibility for avoiding harmful activities just described rests primarily with the subscriber. ByteCode will not, as an ordinary practice, monitor the communications of its subscribers to ensure that the comply with ByteCode’ policy or applicable law. However, when ByteCode becomes aware of harmful activities, it may take any action to stop the harmful activity, including, but not limited to, removal of information, shutting down a web site, implementing screening software designed to block offending transmissions, denying access to the Internet, or any other action deemed appropriate by ByteCode.

ByteCode is also aware that many of its subscribers are themselves providers of Internet services, and that information reaching ByteCode’ facilities from those subscribers may have originated from a customer of the subscriber or from another third party. ByteCode does not require its subscribers who offer Internet services to monitor or censor transmissions or web sites created by customers of its subscribers. ByteCode reserves the right to directly take action against a customer of its subscribers. Also, ByteCode may take action against the ByteCode’ subscriber because of activities of a customer of the subscriber, even though the action may affect other customers of the subscriber. Similarly, ByteCode anticipates that subscribers who offer Internet services will cooperate with ByteCode in any corrective or preventive action that ByteCode deems necessary. Failure to cooperate with such corrective or preventive measures is a violation of ByteCode policy.

ByteCode will not intentionally monitor private electronic mail messages sent or receive by its subscribers, unless required to do so by law, governmental authority or when public safety is at stake. ByteCode may, however, monitor its service electronically to determine that its facilities are operating satisfactorily. Also, ByteCode may disclose information, including, but not limited to, information concerning a subscriber, a transmission made using our network, or a web site, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation or governmental request. ByteCode assumes not obligation to inform the subscriber that subscriber information has been provided and, in some cases, may be prohibited by law from giving such notice. Finally, ByteCode may disclose subscriber information or information transmitted over its network where necessary to protect ByteCode and others from harm, or where such disclosure is necessary to the proper operation of the system. However, ByteCode will never sell information to other services or outside companies.

ByteCode expects that its subscribers who provide Internet services to others will comply fully with all applicable laws concerning the privacy of online communications. A subscriber’s failure to comply with those laws will violate ByteCode policy. Finally, ByteCode wishes to emphasize that, in signing the Service Agreement, subscribers indemnify ByteCode for any violation of the Service Agreement, law or ByteCode policy resulting in loss to ByteCode or the bringing of any claim against ByteCode by any third party. This means that, if ByteCode is sued because of a subscriber’s or customer of a subscriber’s activity, the subscriber will be responsible for payment of any damages awarded against ByteCode, plus costs and reasonable attorney’s fees.

 

Acceptable Use Policy

As a provider of web site hosting and other Internet-related services, ByteCode offers its customer (also known as “Subscribers”) and their customers and users the means to acquire and disseminate a wealth of public, private, commercial and non-commercial information. ByteCode respects that the Internet provides a forum for free and open discussion and dissemination of information. However, when there are competing interests at issue, ByteCode reserves the right to take certain preventive or corrective actions. In order to protect these competing interests, ByteCode has developed an Acceptable Use Policy (“AUP”), which supplements and explains certain terms of each customer’s respective service agreement, and is intended as a guide to the customer’s rights and obligations when using ByteCode’ services. This AUP will be revised from time to time.

One important aspect of the Internet is that no one party owns or controls it. This fact accounts for much of the Internet’s openness and value, but it also places a high premium on the judgement and responsibility of those who use it, both in the information they acquire and in the information they disseminate to others. When subscribers obtain information through the Internet, they must keep in mind that ByteCode cannot monitor, verify, warrant or vouch for the accuracy and quality of the information they acquire. For this reason, the subscriber must exercise his or her best judgement in relying on information obtained from the Internet, and also should be aware that some material posted to the Internet may be sexually explicit or otherwise offensive. Because ByteCode cannot monitor or censor the Internet, and will not attempt to do so, ByteCode cannot accept any responsibility for injury to its subscribers resulting from inaccurate, unsuitable, offensive or illegal Internet communications.

When subscribers disseminate information from the Internet, they must keep in mind that ByteCode does not review, edit, censor or take responsibility for any information its subscribers may create. When users place information on the Internet, they have the same liability as other authors for copyright infringement, defamation and other harmful speech. Also, because the information created is carried over ByteCode’ network and may reach a large number of people, including both subscribers and non-subscribers of ByteCode, subscribers’ postings to the Internet may affect other subscribers and may affect ByteCode’ goodwill, business, reputation or operations. For these reasons, subscribers violate ByteCode policy and the Service Agreement when they, their customers, affiliates or subsidiaries engage in the following prohibited activities:

Spamming:
Sending unsolicited bulk and/or commercial information over the Internet. It is not only harmful because of its negative impact on consumer attitudes toward ByteCode, but also because it can overload ByteCode’s network and disrupt service to ByteCode’s subscribers. Also, maintaining an open SMTP relay is prohibited. When a complaint is received, ByteCode will investigate and suspend the account if it is found to be sending SPAM. A $500 charge for violating this policy will be charged to the person initiating the SPAM. Furthermore ByteCode reserves the right to prosecute for this violation.

BitTorrent::
ByteCode does not allow BitTorrent, you may not run any bit torrent application/script, tracker, or client, and will suspend/terminate any offending account.

TOR – Open Proxy/VPN:
You may not run any public proxy services or any scripts that interface with TOR, including TOR relay, entry, exit and bridge nodes. TOR, public proxies and public VPN’s are strictly forbidden and we reserve the right to immediately terminate any account, without warning, found to be running these services.

Minecraft:
ByteCode is not for Minecraft servers, the large load these servers produce causes excessive strain on our infrastructure and as such is strictly forbidden.

Digital Currency Mining
The high CPU loaded produced by mining digital currency negatively impacts performance for all of our customers, as such you may not run any BitCoin related services, this includes any BitCoin derivatives such as LiteCoin, ZeroCoin and any other digital currencies.

CamFrog:
Due to the high frequency of DDOS attacks against CamFrog servers, it is forbidden to host Camfrog servers or other server applications that are frequent targets of Denial of Service attacks or other types of attacks. If found to be running such services your server will be immediately suspended and the server will not be reconnected to the network until such time that you agree to completely remove any and all traces of the offending service, and agree to let us have access to your server to confirm that the content has been completely removed. Any server guilty of a second violation will result in immediate account termination.

Obscene Speech or Materials:
Using ByteCode’s network to advertise, transmit, store, post, display, or otherwise make available child pornography or obscene speech or material is prohibited. ByteCode is required by law to notify law enforcement agencies when it becomes aware of the presence of child pornography on or being transmitted through its network.

Defamatory or Abusive Language:
Using ByteCode’s network as a means to transmit or post negative, defamatory, harassing, abusive or threatening language.

Forging of Headers:
Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message.

Illegal or Unauthorized Access to Other Computers or Networks:
Accessing, illegally or without authorization, computers, accounts or networks belonging to another party, or attempting to penetrate security measures of another individual’s system (often known as “hacking”). Also, any activity that may be used as a precursor to an attempted system penetration (i.e., port scan, stealth scan or other information-gathering activity).

Distribution of Internet Viruses, Worms, Trojan Horses or Other Destructive Activities:
Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mail bombing or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service or equipment.

Facilitation a Violation of this AUP:
Advertising, transmitting or otherwise making available any software, program, product or service that is designed to violate this AUP, which includes the facilitation of the means to spam, initiation of pinging, flooding, mail bombing, denial of service attacks and piracy of software.

Other Illegal Activities:
Engaging in activities that are determined to be illegal, including, but not limited to, advertising, transmitting or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards and pirating software.

Other Activities:
Engaging in activities, whether lawful or unlawful, that ByteCode determines to be harmful to its subscribers, operations, reputation, goodwill or customer relations.

As we have pointed out, the responsibility for avoiding harmful activities just described rests primarily with the subscriber. ByteCode will not, as an ordinary practice, monitor the communications of its subscribers to ensure that the comply with ByteCode’ policy or applicable law. However, when ByteCode becomes aware of harmful activities, it may take any action to stop the harmful activity, including, but not limited to, removal of information, shutting down a web site, implementing screening software designed to block offending transmissions, denying access to the Internet, or any other action deemed appropriate by ByteCode.

ByteCode is also aware that many of its subscribers are themselves providers of Internet services, and that information reaching ByteCode’ facilities from those subscribers may have originated from a customer of the subscriber or from another third party. ByteCode does not require its subscribers who offer Internet services to monitor or censor transmissions or web sites created by customers of its subscribers. ByteCode reserves the right to directly take action against a customer of its subscribers. Also, ByteCode may take action against the ByteCode’ subscriber because of activities of a customer of the subscriber, even though the action may affect other customers of the subscriber. Similarly, ByteCode anticipates that subscribers who offer Internet services will cooperate with ByteCode in any corrective or preventive action that ByteCode deems necessary. Failure to cooperate with such corrective or preventive measures is a violation of ByteCode policy.

ByteCode will not intentionally monitor private electronic mail messages sent or receive by its subscribers, unless required to do so by law, governmental authority or when public safety is at stake. ByteCode may, however, monitor its service electronically to determine that its facilities are operating satisfactorily. Also, ByteCode may disclose information, including, but not limited to, information concerning a subscriber, a transmission made using our network, or a web site, in order to comply with a court order, subpoena, summons, discovery request, warrant, statute, regulation or governmental request. ByteCode assumes not obligation to inform the subscriber that subscriber information has been provided and, in some cases, may be prohibited by law from giving such notice. Finally, ByteCode may disclose subscriber information or information transmitted over its network where necessary to protect ByteCode and others from harm, or where such disclosure is necessary to the proper operation of the system. However, ByteCode will never sell information to other services or outside companies.

ByteCode expects that its subscribers who provide Internet services to others will comply fully with all applicable laws concerning the privacy of online communications. A subscriber’s failure to comply with those laws will violate ByteCode policy. Finally, ByteCode wishes to emphasize that, in signing the Service Agreement, subscribers indemnify ByteCode for any violation of the Service Agreement, law or ByteCode policy resulting in loss to ByteCode or the bringing of any claim against ByteCode by any third party. This means that, if ByteCode is sued because of a subscriber’s or customer of a subscriber’s activity, the subscriber will be responsible for payment of any damages awarded against ByteCode, plus costs and reasonable attorney’s fees.

Privacy Policy

By using ByteCode’s (“ByteCode”, “our”, “us” or “we”) products and services, you (“you”, “your”, “Client” or “Customer”) agree to comply with our policies.

This Privacy Policy describes the information we collect from you, what we do with the information, and our information security practices. If you have any questions about our Privacy Policy, please contact support[at]ByteCode.com.

Information

When you sign up for our service, we will ask you to provide contact information such as your name, address, telephone number, and e-mail address.

We may ask you to complete user surveys, and to provide certain demographic information, such as age, gender, special interests, etc. You do not have to provide this type of information to use our service if you do not want to.

If you contact us for customer support, we may also ask you for information about your account and services.

When you visit our website we will capture your IP Address, time of and duration of visit, and time and duration of the pages on our website that you view. We may tie this information to personally identifiable information we have about you.

We will also place a cookie that will identify you to us as a repeat visitor or a customer when you visit our website. See “What is a Cookie?” below.

[If we send you an e-mail, we may include a marker that will allow us to identify e-mail that is opened and viewed.]

Use of Personally Identifiable Information

We will use your personally identifiable information only as follows:

For payment purposes and to provide customer support.
For fraud checking, reporting, and other screening methods to verify information submitted to us.
For IP usage reporting to ARIN.
To announce special offers or provide other information from time to time via e-mail. We may also send e-mail announcing special offers by our third parties, but we will not provide the third parties with your e-mail address or other personally identifiable information. If you do not wish to receive these e-mails, you may opt out of future e-mails at any time by following the instructions included in the e-mail.
To improve our service and the marketing of our service. For example, we may use the information we gather from user surveys, demographic data, and website visits to help us improve or target our website and customize your visit.
We will not provide any personally identifiable information about you to any other person other than:

a law enforcement or regulatory agency at their request;
a person or company who acquires our business;
third parties who perform services on our behalf (such as payment processing), subject to the third party agreeing with us that it will keep your personally identifiable information confidential;
as otherwise needed to protect or enforce the rights of others.
We absolutely do not transfer or sell your information for inclusion on third party e-mail or other marketing lists.

Use of Non-Personally Identifiable Information

We may share aggregate statistical data about our customers with third parties, such as advertisers or suppliers. This aggregate statistical data will not identify you personally.

What is a Cookie?

A “cookie” is an alphanumeric identifier that is unique to your browser. The cookie will identify your browser to us when you visit our web site so that we may customize your visit.

Security of Your Information

We store your personally identifiable information and payment information in forms viewable by administration only. Your transfer of data to us occurs over a SSL connection so that all information is securely encrypted during the transfer.

Children’s Privacy

Our service is not available to children under the age of 13, and we will not intentionally maintain information about anyone under the age of 13.

Additional Information About Our VPS’s

LINUX VPS TECHNOLOGY POWERED BY OPENVZ

WANT TO RUN ANY APPS OR TEST ANY SCRIPT OR RUN YOUR COMPANY SITE ?WE HAVE GREAT VPS PLAN. YOUR VPS WILL RUN IN IT’S OWN ISOLATED ENVIRONMENT AND ALLOWS YOU TO INSTALL YOUR OWN SOFTWARE OR SERVER APPLICATIONS. YOUR VPS SERVER COMES WITH IT’S OWN DEDICATED RESOURCES WITH A GUARANTEED EQUAL SHARE OF CPU POWER AND A PREDEFINED AMOUNT OF RAM. YOU ARE ALSO ABLE TO BURST UP TO DOUBLE YOUR GUARANTEED RAM. ALL SERVERS COME WITH AN EASY TO USE, YET COMPREHENSIVE SOLUSVM CONTROL PANEL, ALLOWING YOU TO REBOOT AND RELOAD YOUR SERVER AS WELL AS VIEW STATISTICS. PLEASE NOTE THESE SERVERS ARE COMPLETELY UNMANAGED, WE CAN ONLY PROVIDE ASSISTANCE WITH HARDWARE RELATED

 

CentOS: 5.x, 6.x
Debian: 6.x, 7.x
Slackware: 12.x, 13.x
Ubuntu: 12.04, 13.04

DEDICATED IP’S ONLY $2

LEVEL – 1 SUPPORT

FREE OS INSTALLATION

CLOUDFLARE PRO ALSO AVAILABLE

SOLUSVM PANEL

cpanel

CPANEL IS AVAILABLE FOR LINUX-VPS