Logger Script

About Us

General Statement

WDS is dedicated to the use of the Internet to improve the lives of individuals throughout the world. Our goal is to deliver enterprise quality on-demand IT Services to all of our Customers at a reasonable price and make available the benefits of the Internet as broadly as possible. The purpose of this AUP is to inform all Customers of the acceptable uses of the Services. WDS is committed to encouraging the use of the Internet through its Services and Third Party Services, but such use must be consistent with the laws and regulations governing use of the Internet and must protect the right of its other customers to use its Services. The AUP is designed to achieve these goals. Customer agrees to comply with the AUP and is responsible for the use of the Services and Third Party Services by all entities and individuals whom Customer permits to use the Services, Third Party Services or the Customer Offering. In addition to its rights under Section 19.1 of the Terms of Service, WDS has the right to change or modify the terms of the AUP at any time, effective when posted to the Customer Portal. Customer셲 use of the Services or Third Party Services after changes to the AUP are posted shall constitute acceptance of any changed or additional terms.

Public Network

The Public Network of WDS provides public Internet access to Customer servers and data storage services on WDS셲 network. All Customers are granted equal access to the Public Network.

Private Network

The Private Network of WDS provides Customer with secure private network connectivity from Customer셲 private backend network directly to Customer servers and data storage devices on WDS셲 internal network and to other Services. Customer may use the Private Network to upload/download content, administer Customer servers and data storage devices, transmit information between Customer servers and data storage devices, transmit information between Customer셲 private backend servers and Customer servers and data storage devices provided by WDS, administer the Customer Content, retrieve data, access server consoles, and otherwise manage the Customer Content. The Private Network can also be utilized for access during periods of temporary suspension of Services to Customer as provided under the MSA.

IP Addresses

The IP Address Policy (as described in the Terms of Services) which may be changed from time to time at WDS셲 sole discretion, is incorporated into this MSA by reference. Customer acknowledges and agrees to adhere to the IP Address Policy. All IP Addresses assigned to Customer are owned and managed by WDS. Such IP Addresses are non-transferable, and Customer retains no ownership or transfer rights to such IP Addresses. All IP Addresses are assigned by the WDS engineering team on a per VLAN, per server basis. Attempted use by Customer of any unallocated IP Address or any IP Addresses on VLANs not assigned to Customer is a violation of this AUP. Prohibited Uses The following list provides a number of general prohibited uses of the Services and/or Third Party Services that are violations of this AUP. Please note that the following list does not represent a comprehensive or complete list of all prohibited uses.
Unlawful Activities. The Services and/or Third Party Services shall not be used in violation of any criminal, civil or administrative violation of any applicable local, state, provincial, federal, national or international law, treaty, court order, ordinance, regulation or administrative rule. This includes, but is not limited to:
Unlawful gambling activities

Threats, harassment and abuse of any individual, organization or business
Fraudulent activities
Terrorist websites or other sites advocating human violence and hate crimes based upon religion, ethnicity or country of origin
Unlawful high yield investment plans, Ponzi schemes or linking to and or advertising such schemes
Child Pornography: In particular, the Services and/or Third Party Services shall not be used to publish, submit, receive, upload, download, post, use, copy or otherwise produce, transmit, distribute or store child pornography.
Unsolicited Email: The use of the Services and/or Third Party Services to send or receive mass unsolicited email ("SPAM"). This prohibition includes the direct sending and receiving of such messages, support of such messages via web page, splash page or other related sites, or the advertisement of such services. The falsifying of packet header, sender, or user information whether in whole or in part to mask the identity of the sender, originator or point of origin or knowingly deleting any author attributions, legal notices or proprietary designations or labels in a file that the Customer mails or sends.
Email Bombing: The sending, return, bouncing or forwarding of email to specified user(s) in an attempt to interfere with or overflow email services.
Proxy Email: The use of the Services and/or Third Party Services as a proxy email server to forward email to unrelated Third Parties.
UseNet SPAM: The use of Services to send, receive, forward, or post UseNet unsolicited email or posts. This includes UseNet services located within the WDS network or unrelated networks of Third Parties.
Hacking: The use of the Services and/or Third Party Services or hacking, attacking, gaining access to, breaching, circumventing or testing the vulnerability of the user authentication or security of any host, network, server, personal computer, network access and control devices, software or data without express authorization of the owner of the system or network.
Threatening Material or Content: The Services and/or Third Party Services shall not be used to host, post, transmit, or retransmit any content or material that harasses, or threatens the health or safety of others. In addition, WDS reserves the right to decline to provide Services and/or Third Party Services if the content is determined by WDS to be obscene, indecent, hateful, malicious, racist, defamatory, fraudulent, libelous, treasonous, excessively violent or promoting the use of violence or otherwise harmful to others.
Violation of Intellectual Property Rights: The Services and/or Third Party Services shall not be used to publish, submit/receive, upload/download, post, use, copy or otherwise reproduce, transmit, retransmit, distribute or store any content/material or to engage in any activity that infringes, misappropriates or otherwise violates the intellectual property rights or privacy or publicity rights of WDS or any other party, including but not limited to any rights protected by any copyright, patent, trademark laws, trade secret, trade dress, right of privacy, right of publicity, moral rights or other intellectual property right now known or later recognized by statute, judicial decision or regulation. Please refer to http://www.WDS.com/about/legal to file complaints or counter notifications related to copyright or trademark claims.
Distribution of Malware: The storage, distribution, fabrication, or use of malware, including without limitation, virus software, root kits, password crackers, adware, key stroke capture programs and other programs normally used in malicious activity is prohibited. The use of such programs in the normal ordinary course of business, however, may be requested by Customer and approved by WDS on a case by case basis. Example: Security company using the Services to analyze the latest root kit for new security analysis/software.
Phishing: Any activity designed to collect personal information (name, account numbers, usernames, passwords, etc.) under false pretense. Splash pages, phishing forms, email distribution, proxy email or any activity related to phishing activities may result in the immediate suspension of Customer셲 account.
Violation of Agreements relating for Third Party Services. Any activity which violates any TPS Agreements.
Denial of Service. Any activity to implement or assist in the implementation of denial of service attack. WDS absolutely prohibits the use of Services for the origination, propagation or control of denial of service attacks ("DoS") or distributed denial of service attacks ("DDoS"). Customers may not utilize the Services to perform DoS or DDoS mitigation activities (such as service proxying or data scrubbing) which may result in attracting inbound denial of service attacks toward the Services. Any relation to DoS or DDoS type activity is a direct violation of WDS셲 AUP. Reporting Violation of the Acceptable Use Policy
WDS accepts reports of alleged violations of this AUP via email sent to abuse@WDS.com. Reports of alleged violations must be verified and must include the name and contact information of the complaining party, and the IP address or website allegedly in violation, and a description of the alleged violation. Unless otherwise required by law, such as the DMCA, WDS owes no duty to Third Parties reporting alleged violations. WDS will review all verified Third Party reports and will take such actions as it deems appropriate in its sole discretion.
WDS will comply with and respond to valid (as WDS determines in its sole discretion) subpoenas, warrants, and/or court orders. If permitted by applicable law or regulation, WDS will forward such subpoenas, warrants, and/or orders to Customer and Customer may respond; however, WDS reserves the right to respond to any such subpoena, warrant and/or order if it is the named party in such subpoena, warrant, and/or order.
Methods of Resolution for Violations of WDS셲 Acceptable Use Policy The goal of our Methods of Resolution is to mitigate service interruptions while resolving potential violations under this AUP. Our sales, support and abuse staffs are dedicated to working with the Customer in resolving potential violations, and are available via phone, ticket, or email. The Methods of Resolution below is provided for informational purposes only and forms the framework and guidance with respect to resolving potential violations, but in the event of any conflicts between the Acceptable Use Policy (in particular its enforcement) and Terms of Services, the Terms of Services shall control. Timing for resolution differs according to the degree of the violation, the nature of the violation, involvement of law
enforcement, involvement of third party litigation, or other related factors.

Step 1: First alleged violation of AUP: a ticket will be generated under WDS to provide the Customer셲 master user with information regarding the potential violation of WDS셲 AUP. This is often a fact-finding email requiring further information or notifying Customer of the potential violation and the required actions to resolve the issue.
Step 2: Acknowledgement of violation of AUP: a ticket is generated under the Customer셲 master user account with information specific to the violation. This ticket will also include any additional facts about the situation and will notify Customer of the action required to resolve the violation.
Step 3: Violation of AUP disregarded, not properly addressed, or continuing violation if a ticket has been disregarded, not properly addressed, or resolved by the Customer for a specified period of time: WDS engineers will turn the public network port to the specified dedicated services off. Access to the dedicated services may then be achieved through the secure private service network for Customer resolution. As soon as the violation is addressed, the public access shall be restored and service will continue as normal.
Step 4: Failure to address violation and resolve violation: if Customer fails to address the violation AND fails to resolve the violation, a suspension of services shall occur. This is a last resort for WDS and only results when the Customer completely fails to participate in WDS셲 resolution process. A permanent suspension of services includes reclamation of all dedicated services and the destruction of Customer셲 data
Virtual Machine Alert
Option 1.
  • Select Server (CPU/RAM)
  • : Server(VM) 1v core/1G memory
  • Operatoion System
  • :
  • Comment
  • :