Hosting – Domain Registration (.UK domain) - Magnet Networks

Hosting – Domain Registration (.UK domain)

  • Magnet Networks. reserves the right to terminate, without warning, any account that violates this policy.
  • Usage of Magnet Networks. services constitutes acceptance and understanding of this policy.
  • Reseller may choose to pass this charge down to their client. These are non-refundable charges and will be invoiced at the time of complaint notification.
  • Magnet Networks. reserves the right to decide what it considers “SPAM”, “UCE”, “mail bombing”, or “bulk Email”, and to determine from all of the evidence whether or not the Email recipients were from an “opt-in Email” list.
  • Should you choose to Email from Magnet Networks. servers, especially if you use mailing lists, you must read and adhere to the following guidelines, which are offered as a statement of Internet standards and best current practices for proper mailing list management and preventing Email abuse.

Definition of UCE (Unsolicited Commercial Email), or SPAM:

  • The bulk UCE, bulk promotional material, or other forms of solicitation sent via Email that advertise any IP address belonging to Magnet Networks. or any URL (domain) that is hosted by Magnet Networks.
  • Unsolicited postings to newsgroups advertising any IP or URL hosted by Magnet Networks.
  • The use of web pages set up on ISPs that allow SPAM-ing (also known as “ghost sites”) that directly or indirectly reference customers to domains or IP addresses hosted by Magnet Networks.
  • Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to facilitate a means to SPAM.
  • Forging or misrepresenting message headers, whether in whole or in part, to mask the true origin of the message.
  • For further information on mail abuse, please visit the Mail Abuse Prevention System (MAPS) website.

Repercussions of SPAM:

  • Across the Web, it is generally accepted that SPAM is an inconsiderate and improper business practice.

Repercussions to Magnet Networks.:

  • SPAM is not only harmful because of its negative impact on consumer attitudes toward Magnet Networks., but also because it can overload the Magnet Networks. network and resources, especially on our shared (virtual) server environments.

Repercussions to our Providers:

  • Since it is unsolicited, users who receive SPAM often become angry and send complaints to our upstream providers. This upsets our providers who abhor SPAM for the same reasons that Magnet Networks does – it causes negative consumer attitudes and drains resources. We strive to maintain favorable business relationships in the Web community and obviously will not allow any practice that threatens these relationships.

Reason include but are not limited to

  • Non Payment of requested Fees within the specified period
  • Breach of the Registrant Agreement,
  • Threat of legal action, to include any demand letter, summons, Court Orders or injunctive relief.
  • Request from an Garda Siochana, or any recognised national law enforcement Agency ,
  • Full Confirmation of Breach, violation or infringement of Trademark of the Registrar or any other third party.
  • Spamming, Transmission of unsolicited mail, Abuse of the Services or Technology
  • In the Service Providers reasonable opinion any illegal or deceptive  practices
  • If necessary to comply with any applicable Irish or European laws, rules and Regulations,
  • The Customer ceases or threatens to cease payment of its undisputed debts or ceases or threatens to cease to carry on its business;
  • To comply with ICANN’s Uniform Dispute Resolution Policy and all associated policies;
  • Where this Agreement is terminated by the Service Provider, all information held by Service Provider, can and will be released to concerned third parties without any further notice to the Customer.  The Service Provider will have no liability for release of any information provided by the Customer, and the Customer hereby Indemnifies the Service Provider against any liability, damage, or breach of Law through release of this information.
  • The Service Provider can terminate this Agreement without cause having given the Customer at least 2 working days notice delivered via email to the Customers contract address as provided in this Agreement

Email Abuse and Email Misuse is a serious problem, and Magnet Networks will not tolerate it.

For reporting Abuse or Spam please email hostmaster@magnet.ie

An agent will respond to you within 24 hours

  • Mailing lists are an excellent vehicle for distributing focused, targeted information to an interested, receptive audience. Consequently, mailing lists have been used successfully as a highly effective direct marketing tool.
  • Unfortunately, some marketers misuse mailing lists through a lack of understanding of Internet customs and rules of the forum pertaining to Email. Others fail to take adequate precautions to prevent the lists they manage from being used in an abusive manner.
  • The Email addresses of new subscribers must be confirmed or verified before mailings commence.
  • This is usually accomplished by means of an Email message sent to the subscriber to which s/he must reply, or containing a URL which s/he must visit, in order to complete the subscription. However it is implemented, a fundamental requirement of all lists is the verification of all new subscriptions.
  • Mailing list administrators must provide a simple method for subscribers to terminate their subscriptions, and administrators should provide clear and effective instructions for unsubscribing from a mailing list. Mailings from a list must cease promptly once a subscription is terminated.
  • Mailing list administrators should make an “out of band” procedure (e.g., a means of contact by which messages may be sent for further correspondence via Email or telephone) available for those who wish to terminate their mailing list subscriptions but are unable or unwilling to follow standard automated procedures.
  • Mailing list administrators must ensure that the impact of their mailings on the networks and hosts of others is minimized by proper list management procedures such as pruning of invalid or undeliverable addresses, or taking steps to ensure that mailings do not overwhelm less robust hosts or networks.
  • Mailing list administrators must take adequate steps to ensure that their lists are not used for abusive purposes. For example, administrators can maintain a “suppression list” of Email addresses from which all subscription requests are rejected. Addresses would be added to the suppression list upon request by the parties entitled to use the addresses at issue. The purpose of the suppression list would be to prevent subscription of addresses appearing on the suppression list by unauthorized third parties. Such suppression lists should also give properly authorized domain administrators the option to suppress all mailings to the domains for which they are responsible.
  • Mailing list administrators must make adequate disclosures about how subscriber addresses will be used, including whether or not addresses are subject to sale or trade with other parties. Once a mailing list is traded or sold, it may no longer be an opt-in mailing list. Therefore, those who are acquiring “opt-in” lists from others must examine the terms and conditions under which the addresses were originally compiled and determine that all recipients have in fact opted-in specifically to the mailing lists to which they are being traded or sold.
  • Mailing list administrators should make adequate disclosures about the nature of their mailing lists, including the subject matter of the lists and anticipated frequency of messages. A substantive change in either the subject matter or frequency of messages may constitute a new and separate mailing list requiring a separate subscription. List administrators should create a new mailing list when there is a substantive change in either the subject matter or frequency of messages. A notification about the new mailing list may be appropriate on the existing mailing list, but existing subscribers should never be subscribed automatically to the new list. For example, if Company A acquires Company B, and Company B has compiled opt-in mailing lists, Company A should not summarily incorporate Company B’s mailing lists into its own.
  • Bash_history – .bash_logout – .bash_profile – .bashrc..:
    A number of files related to a shell account. These include configuration directives and logging of user actions.
  • Bouncer (bnc):
    A bnc is short for ‘bouncer’. A bnc acts as a proxy to IRC, allowing you to hide your real IP address and use a vhost (vanity host – something like ‘this.is.high.quality.web.hosting.in.ireland.com’).
  • Cgi:
    A standard for running external programs from a World-Wide Web HTTP server. CGI specifies how to pass arguments to the executing program as part of the HTTP request. It also defines a set of environment variables. Commonly, the program will generate some HTML which will be passed back to the browser but it can also request URL redirection
  • DNS:
    A general-purpose distributed, replicated, data query service chiefly used on Internet for translating hostnames into Internet addresses. Also, the style of hostname used on the Internet, though such a name is properly called a fully qualified domain name. DNS can be configured to use a sequence of name servers, based on the domains in the name being looked for, until a match is found
  •  FTP:
    A communications protocol governing the transfer of files from one computer to another over a network
  • IRC Bots:
    An automated program that operates on IRC.
  • IRC:
    A client-server chat system of large (often worldwide) networks
  • Shell Hosting:
    A hosting account used primarily for either shell commands or to run shell processes, such as IRC bouncers etc.
  • Shell:
    The command interpreter used to pass commands to an operating system; so called because it is the part of the operating system that interfaces with the outside world. The commonest Unix shells are the c shell (csh) and the Bourne shell (sh).
  • Warez:
    Widely used in cracker subcultures to denote cracked versions of commercial software, that is versions from which copy-protection has been stripped

Get in touch

Call us on 1800 789 789