CAll Us: (+91) 96775 29002 Live Chat   Login

Shared hosting server’s PHP modules

We have our very own shared hosting policy in order to provide you the test and reliable shared hosting features and to ensure the system stability. The below PHP modules are enable in our shared server by default

bcmath: for arbitrary precision mathematics, PHP offers Binary Calculator which supports numbers of any size and precision, represented as strings.

bcompiler: bcompiler enables you to encode your scripts in phpbytecode, enabling you to protect the source code. bcompiler can be used in the following situations: to create an .exe file of a PHP-GTK application (in conjunction with other software); to create closed source libraries; to provide clients with the software expiry time (prior to payment); to deliver close source applications; to use on embedded systems, where disk space is a priority. bcompiler can improve performance by about 30% when used with uncompressed bytecodes only.

big_int: big_int library provides a set of functions for calculations with arbitrary length integers and bitsets.

bloomy: this extension implements a Bloom filter, which is a space-efficient probabilistic data structure used to test whether an element is a member of a set.

bitset: bitsets manipulation library

bz2: the bzip2 functions are used to transparently read and write bzip2 (.bz2) compressed files.

bz2_filter: bzip2 compress/decompress stream filter implementation. Performs inline compression/decompression using the bzip2 algorithm on any PHP I/O stream. The data produced by this filter, while compatible with the payload portion of a bz2 file, does not include headers or tailers for full bz2 file compatibility. To achieve this format, use the compress.bzip2:// fopen wrapper built directly into PHP.

calendar: the calendar extension presents a series of functions to simplify converting between different calendar formats.

core: this is a filter which makes it possible to run arbitrary PHP code to modify the attributes of an user.

crack: this module allows you to use the CrackLib library to test the ‘strength’ of a password. The ‘strength’ of a password is tested based on its length, use of upper and lower case as well as checked against the specified CrackLib dictionary. CrackLib will also give helpful diagnostic messages that will help ‘strengthen’ the password.

ctype: the functions provided by this extension check whether a character or string falls into a certain character class according to the current locale.

curl: PHP supports libcurl, a library created by Daniel Stenberg, that allows you to connect and communicate with different types of servers with different types of protocols. libcurl currently supports http, https, ftp, gopher, telnet, dict, file, and ldap protocols. libcurl also supports HTTPS certificates, HTTP POST, HTTP PUT, FTP uploading, HTTP-form based upload, proxies, cookies, and user+password authentication.

date: the PHP date() function is used to format a date and/or time.

dba: these functions build the foundation for accessing Berkeley DB style databases.

dbase: these functions allow you to access records stored in dBase–format (dbf) databases.

dbx: the dbx module is a database abstraction layer (db ‘X’, where ‘X’ is a supported database). The dbx functions allow you to access all supported databases using a single calling convention.

dom: the DOM extension allows you to operate on XML documents through the DOM API with PHP 5.

eio: this extension provides asyncronous POSIX I/O by means of libeio C library.

enchant: PHP binding for the Enchant library. Enchant steps to provide uniformity and conformity on top of all spelling libraries and implement certain features that may be lacking in any individual provider library.

ereg: searches for a string specified by pattern, returning true if the pattern is found, and false if otherwise. The search is case-sensitive in regard to alphabetical characters.

exif: with the exif extension, you are able to work with image meta data. For example, you may use exif functions to read meta data of pictures taken from digital cameras by working with information stored in the headers of the JPEG and TIFF images.

fileinfo: the functions in this module try to guess the content type and encoding of a file by looking for certain magic byte sequences at specific positions within the file. While this is not a bulletproof approach, the used heuristics do a very good job.

filter: this extension filters data by either validating it or sanitizing it. This is especially useful when the data source contains unknown (or foreign) data, like user supplied input. For example, this data may come from an HTML form.

ftp: the functions in this extension implement client access to files servers speaking the File Transfer Protocol (FTP) as defined in RFC959. This extension is meant for detailed access to an FTP server providing a wide range of control to the executing script.

functional: a set of functional primitives for PHP.

gd: PHP is not limited to creating just HTML output. It can also be used to create and manipulate image files in a variety of different image formats, including GIF, PNG, JPEG, WBMP, and XPM. Even more convenient, PHP can output image streams directly to a browser. For these purposes PHP is compiled with the GD library.

gender: gender PHP extension is a port of the gender.c program originally written by Joerg Michael. The main purpose is to find out the gender of firstnames. The name dictionary contains >40000 firstnames from 54 countries.

geoip: allows you to find the location of an IP address. City, State, Country, Longitude, Latitude, and other information as all, such as ISP and connection type can be obtained with the help of GeoIP.

gettext: gettext functions implement an NLS (Native Language Support) API which can be used to internationalize your PHP applications.

haru: PECL/haru extension provides bindings to the libHaru library.

hash: message Digest (hash) engine. Allows direct or incremental processing of arbitrary length messages using a variety of hashing algorithms.

homeloader: is used for the user specific PEAR repositories.

hidef: allows definition of user defined constants in simple ini files, which are then processed like internal constants, without any of the usual performance penalties.

htscanner: htscanner extension gives the possibility to use .htaccess-like file to configure PHP per directory on Business servers, just like apache’s htaccess.

iconv: module contains an interface to iconv character set conversion facility. With this module, you can turn a string represented by a local character set into the one represented by another character set, which may be the Unicode character set.

idn: used for domain name conversion.

igbinary: is a drop in replacement for the standard php serializer. Instead of time and space consuming textual representation, igbinary stores php data structures in a compact binary form.

imagick: is a native php extension to create and modify images using the ImageMagick API. ImageMagick is a software suite to create, edit, and compose bitmap images. It can read, convert and write images in a variety of formats (over 100) including DPX, EXR, GIF, JPEG, JPEG–2000, PDF, PhotoCD, PNG, Postscript, SVG, and TIFF.

imap: this function enables the possibility to operate with the IMAP protocol, as well as the NNTP, POP3 and local mailbox access methods.

inclued: traces through and dumps the hierarchy of file inclusions and class inheritance at runtime.

inotify: the inotify extension exposes the inotify functions inotify_init(), inotify_add_watch() and inotify_rm_watch(). inotify_init() returns a stream resource, usable with standard stream functions, like stream_select(), stream_set_blocking() and fclose(). inotify_read() replaces the C way of reading inotify events.

intl: internationalization extension (further is referred as Intl) is a wrapper for ICU library, enabling PHP programmers to perform UCA-conformant collation and date/time/number/currency formatting in their scripts.

ioncube_loader: is a PHP loader used to encrypt PHP files and protect software written using the PHP programming language from being viewed, changed, and run on unlicensed computers.

jsmin: PHP extension for minifying JavaScript.

json: this extension implements JavaScript Object Notation (JSON) data-interchange format. The decoding is handled by a parser based on the JSON_checker by Douglas Crockford.

ldap: is the Lightweight Directory Access Protocol used to access ‘Directory Servers’. The Directory is a special kind of a database that holds information in a tree structure. The concept is similar to your hard disk directory structure, except that in this context, the root directory is ‘The world’ and the first level subdirectories are ‘countries’. Lower levels of the directory structure contain entries for companies, organizations or places, while yet lower still we find directory entries for people, and perhaps equipment or documents.

libevent: libevent is a library that provides a mechanism to execute a callback function when a specific event occurs on a file descriptor or after a timeout has been reached.

libxml: these functions/constants are available as of PHP 5.1.0, and the following core extensions rely on this libxml extension: DOM, libxml, SimpleXML, SOAP, WDDX, XSL, XML, XMLReader, XMLRPC and XMLWriter.

lzf: is a very fast compression algorithm, ideal for saving space with only slight speed cost. It can be optimized for speed or space at the time of compilation.

magickwand: this module enables PHP access to the ImageMagick MagickWand API. The MagickWand API is the recommended interface between the C programming language and the ImageMagick image processing libraries. Unlike the MagickCore C API, MagickWand uses only a few opaque types.

mailparse: mailparse is an extension for parsing and working with email messages. Mailparse is stream based, which means that it does not keep in–memory copies of the files it processes – so it is very resource efficient when dealing with large messages.

mbstring: mbstring provides multibyte specific string functions that help you deal with multibyte encodings in PHP. In addition to that, mbstring handles character encoding conversion between the possible encoding pairs.

mcrypt: this is an interface to the mcrypt library, which supports a wide variety of block algorithms such as DES, TripleDES, Blowfish (default), 3-WAY, SAFER-SK64, SAFER-SK128, TWOFISH, TEA, RC2 and GOST in CBC, OFB, CFB and ECB cipher modes.

mhash: this function is intended to work with mhash. Mhash can be used to create checksums, message digests, message authentication codes, and more. This is an interface to the mhash library. Mhash supports a wide variety of hash algorithms such as MD5, SHA1, GOST, and many others. For a complete list of supported hashes, refer to the constants page. The general rule is that you can access the hash algorithm from PHP with MHASH_hashname.

mongo: this extension is deprecated; instead, the MongoDB extension should be used.

mongodb: the MongoDB PHP driver should work on nearly any system: Windows, Mac OS X, Unix, and Linux; little- and big-endian machines; 32- and 64-bit machines; PHP 5.3 through 5.6 (versions prior to 1.6 also support PHP 5.2).

mysql: these functions allow you to access MySQL database servers. This extension is deprecated as of PHP 5.5.0, and has been removed as of PHP 7.0.0. Instead, either the mysqli or PDO_MySQL extension should be used.

mysqli: the mysqli extension allows you to access the functionality provided by MySQL 4.1 and above.

mysqlnd: MySQL Native Driver is a replacement for the MySQL Client Library (libmysqlclient). The MySQL database extensions MySQL extension, mysqli and PDO MYSQL all communicate with the MySQL server. With MySQL Native Driver there is now an alternative, as the MySQL database extensions can be compiled to use MySQL Native Driver instead of the MySQL Client Library.

ncurses: (new curses) is a free software emulation of curses in System V Rel 4.0 (and above). It uses terminfo format, supports pads, colors, multiple highlights, form characters and function key mapping.

nd_mysql: MySQL native driver for PHP (mysqlnd) is a drop-in replacement for the MySQL Client Library (libmysql) for the PHP script language. The mysqlnd library is highly optimized for and tightly integrated into PHP. The MySQL Client Library cannot offer the same optimizations because it is a general-purpose client library. The mysqlnd library is using PHP internal C infrastructure for seamless integration into PHP.

nd_mysqli: this extension is referred to as MySQL improved. It was developed to take advantage of the new features available in MySQL since version 4.1.3.

nd_pdo_mysql: MySQL Native Driver is a replacement for the MySQL Client Library (libmysqlclient). MySQL Native Driver is part of the official PHP sources as of PHP 5.3.0. The MySQL database extensions MySQL extension, mysqli and PDO MYSQL all communicate with the MySQL server. In the past, this was done by the extension using the services provided by the MySQL Client Library.

oauth: this extension provides OAuth 1.0a consumer and provider bindings. OAuth is an authorization protocol built on top of HTTP which allows applications to securely access data without having to store usernames and passwords.

oci8: these functions allow you to access Oracle Database 12c, 11g, 10g, 9i and 8i. They support SQL and PL/SQL statements. Basic features include transaction control, binding of PHP variables to Oracle placeholders, and support for large object (LOB) types and collections. Oracle’s scalability features such as Database Resident Connection Pooling (DRCP) and result caching are also supported.

odbc: in addition to normal ODBC support, the Unified ODBC functions in PHP allow you to access several databases that have borrowed the semantics of the ODBC API to implement their own API.

openssl: this module uses the functions of OpenSSL for generation and verification of signatures and for sealing (encrypting) and opening (decrypting) data. OpenSSL offers many features that this module currently doesn’t support.

pcntl: process control support in PHP implements the Unix style of process creation, program execution, signal handling and process termination. PCNTL now uses ticks as the signal handle callback mechanism, which is much faster than the previous mechanism.

pcre: the PCRE library is a set of functions that implement regular expression pattern matching using the same syntax and semantics as Perl 5, with just a few differences.

pdf: the PDF functions in PHP can create PDF files using the PDFlib library from PDFlib GmbH

pdo: the PHP Data Objects (PDO) extension defines a lightweight, consistent interface for accessing databases in PHP. Each database driver that implements the PDO interface can expose database–specific features as regular extension functions.

pdo_dblib: is a driver that implements the PHP Data Objects (PDO) interface to enable access from PHP to Microsoft SQL Server and Sybase databases through the FreeTDS library.

pdo_firebird: a driver that implements the PHP Data Objects (PDO) interface to enable access from PHP to Firebird database.

pdo_mysql: is a driver that implements the PHP Data Objects (PDO) interface to enable access from PHP to MySQL 3.x, 4.x and 5.x databases. PDO_MYSQL will take advantage of native prepared statement support present in MySQL 4.1 and higher.

pdo_odbc: connecting to ODBC or DB2 databases

pdo_pgsql: this extension provides an PostgreSQL driver for PDO.

pdo_sqlite: PDO_SQLITE is a driver that implements the PHP Data Objects (PDO) interface to enable access to SQLite 3 databases.

pgsql: PostgreSQL database is an Open Source product. Postgres, developed originally in the UC Berkeley Computer Science Department, pioneered many of the object-relational concepts now becoming available in some commercial databases.

phalcon: phalcon is a high-performance web application framework for PHP based on the model-view-controller (MVC) pattern. Unlike most PHP frameworks, Phalcon is implemented as an extension written in C in order to optimize performance. This is intended to boost execution speed and reduce resource usage with the goal of handling more requests per second than comparable frameworks written primarily in PHP.

phar: the phar extension provides a way to put entire PHP applications into a single file called a ‘phar’ (PHP Archive) for easy distribution and installation. In addition to providing this service, the phar extension also provides a file-format abstraction method for creating and manipulating tar and zip files through the PharData class, much as PDO provides a unified interface for accessing different databases. Phar archives are best characterized as a convenient way to group several files into a single file.

posix: this module contains an interface to those functions defined in the IEEE 1003.1 (POSIX.1) standards document which are not accessible through other means.

propro: a reusable split-off of pecl_http’s property proxy API.

pspell: a reusable split-off of pecl_http’s property proxy API. These functions allow you to check the spelling of a word and offer suggestions.

raphf: a reusable split-off of pecl_http’s persistent handle and resource factory API.

rar: PHP extension for reading RAR archives using bundled unRAR library. This extension gives you possibility to read Rar archives but doesn’t support writing Rar archives, because this is not supported by the UnRar library and is directly prohibited by its license.

rsync: this algorithm is using a rolling check-sum and a md4 check’sum for blocks of the file to generate a signature file. The signature file is used to generate a diff from the file on the remote site. This diff can be used on the local site to patch the file.

session: session support in PHP consists of a way to preserve certain data across subsequent accesses. This enables you to build more customized applications and increase the appeal of your website.

shmop: shmop is an easy to use set of functions that allows PHP to read, write, create and delete Unix shared memory segments.

simplexml: the SimpleXML extension provides a very simple and easily usable toolset to convert XML to an object that can be processed with normal property selectors and array iterators.

snmp: Simple Network Management Protocol (SNMP) is a widely used protocol for monitoring the health and welfare of network equipment (for example, routers), computer equipment and even devices like UPSs. The SNMP extension provides a very simple and easily usable toolset for managing remote devices via the Simple Network Management Protocol. .

soap: the SOAP extension can be used to write SOAP Servers and Clients.

sockets: the socket extension implements a low–level interface to the socket communication functions based on the popular BSD sockets, providing the possibility to act as a socket server as well as a client.

sqlite: this is an extension for the SQLite Embeddable SQL Database Engine. SQLite is a C library that implements an embeddable SQL database engine. Programs that link with the SQLite library can have SQL database access without running a separate RDBMS process. SQLite is not a client library used to connect to a big database server. SQLite is the server. The SQLite library reads and writes directly to and from the database files on disk.

sqlite3: support for SQLite version 3 databases.

ssh2: bindings to the libssh2 library which provide access to resources (shell, remote exec, tunneling, file transfer) on a remote machine using a secure cryptographic transport.

standard: the standard set of classes.

stats: this is the statistics extension. It contains few dozens of functions useful for statistical computations.

stem: a PHP extension that provides word stemming.

stomp: this extension allows php applications to communicate with any Stomp compliant Message Brokers through easy object oriented and procedural interfaces.

suhosin: is an advanced protection system for PHP installations. It was designed to protect servers and users from known and unknown flaws in PHP applications and the PHP core. Suhosin comes in two independent parts, that can be used separately or in combination. The first part is a small patch against the PHP core, that implements a few low–level protections against buffer overflows or format string vulnerabilities and the second part is a powerful PHP extension that implements numerous other protections.

sysvmsg: shared memory support.

sysvsem: shared memory functions.

sysvshm: extension for shared memory.

tidy: tidy is a binding for the Tidy HTML clean and repair utility which allows you to not only clean and otherwise manipulate HTML documents, but also traverse the document tree.

timezonedb: timezone Database to be used with PHP’s date and time functions

tokenizer: the tokenizer functions provide an interface to the PHP tokenizer embedded in the Zend Engine. Using these functions you may write your own PHP source analyzing or modification tools without having to deal with the language specification at the lexical level.

trader: the trader extension is a free open source stock library based on TA–Lib. It’s dedicated to trading software developers requiring to perform technical analysis of financial market data.

translit: this module allows to transliterate non-latin character sets to latin.

uploadprogress: an extension to track progress of a file upload.

uri_template: implementation of URI Template specification for PHP.

uuid: this extension allows to generate a unique ID.

xml: XML (eXtensible Markup Language) is a data format for structured document interchange on the Web.

xmlreader: the XMLReader extension is an XML Pull parser. The reader acts as a cursor going forward on the document stream and stopping at each node on the way.

xmlrpc: XML-RPC is a remote procedure call (RPC) protocol which uses XML to encode its calls and HTTP as a transport mechanism. XML-RPC also refers generically to the use of XML for remote procedure call, independently of the specific protocol. This article is about the protocol named ‘XML-RPC’.

xmlwriter: this extension represents a writer that provides a non-cached, forward-only means of generating streams or files containing XML data.

yaml: this extension implements the YAML Ain’t Markup Language (YAML) data serialization standard. Parsing and emitting are handled by the LibYAML library. YAML is a human friendly data serialization standard for all programming languages.

yaz: this extension offers a PHP interface to the YAZ toolkit that implements the Z39.50 Protocol for Information Retrieval. With this extension you can easily implement a Z39.50 origin (client) that searches or scans Z39.50 targets (servers) in parallel.

zend guard loader: Zend Guard is the most widely accepted PHP encoding and obfuscation product on the market which protects your application from unlicensed use and reverse engineering.

zend_optimizer: allows PHP to run files encoded by Zend Guard which greatly enhances the performance of PHP applications. The Zend Optimizer goes over the code generated by the standard Zend run-time compiler and optimizes it for faster execution.

zip: this extension enables you to transparently read or write ZIP compressed archives and the files inside them.

zlib: this module enables you to transparently read and write gzip (.gz) compressed files, through versions of most of the filesystem functions which work with gzip-compressed files (and uncompressed files, too, but not with sockets).

Privacy Policy

Oryon (Exceeding Expectations) India, (referred hereinafter as ‘Oryon Exceeding Expectations’, ’www.oryon.co.in’, ‘our’, ‘we’ and ‘us’) is a web hosting solutions provider. We respects your privacy and is committed to maintaining the privacy and confidentiality of personal data we collect. The purpose of our Privacy Policy is to demonstrate our firm commitment to the privacy and protection of all persons who provide personal data to Oryon (Exceeding Expectations) India. This Privacy Policy describes the ways we collect information from and about you, and what we do with the information, so that you may decide whether or not to provide information to us. By providing your personal information to Oryon (Exceeding Expectations), via any means, you are accepting and consenting to the practices described in this Privacy Policy.

Information Collection

The information we collect may include your personal information, such as your name, contact information, IP addresses, Live Chat Messages, Telephone conversations, product and service selections and orders or other things that identify you individually.

Generally, we may collect information about you in the following manners:

you may provide your personal information to us via chat, email or other written correspondence, telephone calls, web based forms, or other means;
we use automated technical means to collect information about all website visitors for example by use of cookies;

Information Use

Personal Information

We may use your information to process your service requests, handle orders, deliver products and services, process payments, communicate with you about orders, provide access to secure areas of the Website, recommend services that might be of interest to you, to personalize your visit to our Website, and to enable us to review develop and continually improve the products services and offers we provide online. We also use this information to prevent or detect fraud or abuses of our Website and to enable third parties to carry out technical, logistical or other functions on our behalf.

Contact Information

We use visitor information to send information about our company to visitors and to get in touch with them when necessary. We also use the information we collect to improve the content of our websites and as training aides for our employees. Visitors are given the choice at the point when we request their information.

Non-Disclosure Of Information

Information we gather is for internal use only and will not authorize the release of this information to anyone outside Oryon (Exceeding Expectations), unless you have consented to such disclosure.

Should you breach our terms and conditions or website terms, or if we are under a duty to disclose or share your personal data in order to comply with any legal obligation, we may disclose your information to a relevant authority. In particular, we may release the information we collect to the authorities when we believe it is appropriate to comply with the law, to enforce our legal rights, to protect the rights and safety of others, or to assist with industry efforts to control fraud, spam or other undesirable conduct.

Security of Your Information

Oryon (Exceeding Expectations), is committed to industry best practices approaches concerning security measures to prevent the loss, misuse and alteration of the information in our possession. We use various security measures to protect the information we collect, as appropriate to the type of information, including encryption, firewalls, and access controls. We store information you provide to us on a computer system located in a controlled facility with a limited access. Visitor textual information is encrypted during transmission, our company databases are accessible only by Oryon employees.

Inquiries Or Complaints

If you have a question or complaint about this Privacy Policy or our information collection practices, please contact us at info@oryon.co.in or write us at Compliance Officer, Oryon (Exceeding Expectations), Sakthi Towers 4th Floor, 12th East Cross Street, Anna Nagar, Madurai, Tamil Nadu 625020, India. We will investigate the matter and are committed to resolve any privacy concerns that you may have.

Acceptable Use Policies (AUP)

Acceptable Use Policies (AUP)

Oryon (Exceeding Expectations) India, (referred hereinafter as ‘Oryon Exceeding Expectations’, ’www.oryon.co.in’, ‘our’, ‘we’ and ‘us’) is a web hosting solutions provider. All accounts on our web servers are subject to the Acceptable Use Policy (AUP) described in this document. Under this Acceptable Use Policy, your placement of information on our servers is an acknowledgement that you have read, understand, and agree to be bound by terms and conditions below.

Oryon (Exceeding Expectations) has developed this Acceptable Use Policy (“AUP”), which supplements and explains certain terms of each customer’s respective service agreement and is intended as a guide to the customer’s rights and obligations when utilizing Oryon (Exceeding Expectations) services.

This AUP will be revised from time to time. A customer’s use of Oryon (Exceeding Expectations) after changes to the AUP are posted on Oryon (Exceeding Expectations)’s web site and www.oryon.co.in will constitute the customer’s acceptance of any new or additional terms of the AUP that result from those changes.

Why does Oryon Exceeding Expectations have this policy?

The policies are in place to protect you, our customers, from poor service quality. Generally, we will not shutdown any site unless it is adversely affecting other customers on the same server. However, it is good for you, our customers to be aware of it.

1. Unsolicited Bulk/Commercial Email/SPAM

The use of Oryon (Exceeding Expectations) servers and networks to transmit unsolicited bulk/commercial email (also know as SPAM) is strictly forbidden. Under no circumstance is the transmission of spam acceptable or tolerated. Also, maintaining an open SMTP relay is prohibited. When a complaint is received, Oryon (Exceeding Expectations) has the discretion to determine from all of the evidence whether the e-mail recipients were from an “opt-in” e-mail list. Refer to our UCE/SPAM Policy for more information. & without notice.

2. Content & Service Restrictions

A) Adult Content
Under no circumstance is pornography permitted.Oryon (Exceeding Expectations) will be the sole arbiter as to what constitutes a violation of this provision.

B) Intellectual Property Violations

Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including copyrights, trademarks, service marks, trade secrets, software piracy, and patents held by individuals, corporations, or other entities. It includes also, engaging in activity that violates privacy, publicity, or other personal rights of others. Oryon (Exceeding Expectations) is required by law to remove or block access to customer content upon receipt of a proper notice of copyright infringement. It is also Oryon (Exceeding Expectations)’s policy to terminate the privileges of customers who commit repeat violations of copyright laws.

C) Chat Applications

All interactive chat web applications are strictly prohibited on Oryon (Exceeding Expectations)’s servers. This includes but is not limited to chat applications written in PHP, Perl, CGI, Python, Ruby, etc. in addition to IRC or IRC bots. Any web application that provides ‘real-time’ chat is not permitted. Shoutboxes, chatboxes, live chat/live help (such as but not limited to LiveZilla) and other web based chat programs are prohibited

D) Actively Exploited Web Applications

All web applications that are out of date and actively being exploited will be shut down immediately without notice. As a webmaster you should evaluate your web based applications and scripts on a regular basis to ensure they’re secure and up to date.

Forums and any applications using a commenting system should have some form of spam protection or moderation. CAPTCHA is a popular way to eliminate spam robots from spamming your website.

E) Others

1) Offering Image, File, Document and Data storage, and free hosting and email services are strictly prohibited.

2) Running a proxy or anonymizer, whether publicly accessible or protected, is not permitted.

3) Prime bank or bank debenture-related sites, lottery sites, muds or online RPGs, hate sites, hacker-related sites, sites promoting illegal activity, IP scanner or other hacking tools, mail bombing or spam scripts, or forums and websites that distribute or promote warez content are expressly forbidden.

4) Bit torrent applications, trackers, and clients as well as any file-sharing/peer-to-peer activities are forbidden.

3. Resource Usage Restrictions

A) Processes Restrictions

Processes invoked by the web server, cron, shell or any other method should not exceed the following limitations:

1) Consume more than 1 GB of RAM.

2) Create core dumps

3) Number of simultaneous processes should not exceed 15.

4) Execute a script/binary that forks in a way to create a fork bomb.

5) Programs may not run in the background or listen on a network port. If you require a bot, service or daemon, you should consider a dedicated server, as very few shared web hosts allow this type of program.

B) Database Restrictions

1) All users are restricted to 15 concurrent MySQL connections.

2) Each database is restricted to 2 GB of disk space.

3) Database queries should not exceed 3,000 per hour.

4) Database changes (insert/update/delete) should not exceed 1,000 queries per hour.

5) Remote database access is for administrative purposes only.

B) Web Restictions

1) Simultaneous web server (Apache/LiteSpeed) connections may not exceed 50 from one individual source at any given time

2) Web processes should not fork or spawn subprocesses.

C) Email and Mailing Lists

1) The maximum number of members per mailing list is 1,500. Mailing lists larger than 1,500 will require a semi dedicated, VPS, or dedicated server from us. Dividing one list into smaller parts to get around this limit is not allowed.

2) POP connections are limited to 60 per hour.

3) SMTP connections (outbound email connections) are limited to 350 per hour per server account.

D) Cron Jobs

The frequency of any cron job must not be less than 15 minutes.

4. Indemnification

You agree to indemnify, defend, and hold harmless Oryon (Exceeding Expectations) from any and all liability, penalties, losses, damages, costs, expenses, lawyers’ fees, causes of action or claims caused by or resulting indirectly from your use of the service which damages either you, Oryon (Exceeding Expectations), or any other party or parties without limitation or exception. This indemnification and hold harmless agreement extends to all issues associated with your account, including but not limited to domain name selection and Web site content.

5. Refusal or discontinuation of service

Oryon (Exceeding Expectations) reserves the right to refuse or discontinue service to anyone at Oryon (Exceeding Expectations) management’ sole discretion. Oryon (Exceeding Expectations) may deny you access to all or part of the service without notice if you engage in any conduct or activities that Oryon (Exceeding Expectations) in its sole discretion believes violates any of the terms and conditions in this agreement. Oryon (Exceeding Expectations) shall have no responsibility to notify any third-party providers of services, merchandise, or information, nor any responsibility for any consequences resulting from such discontinuance or lack of notification. You agree that Oryon (Exceeding Expectations) has the right to monitor the service electronically from time to time and to disclose any information as necessary to satisfy the law, or to protect itself or its subscribers. Oryon (Exceeding Expectations) reserves the right to refuse to post or to remove any information or materials, in whole or in part, that, in its sole discretion, are unacceptable, undesirable, or in violation of this agreement. Oryon (Exceeding Expectations) also reserves the right to refuse refunds in cases where Oryon (Exceeding Expectations) believes abuse has taken place.

6. No warranties

Oryon (Exceeding Expectations) makes no warranties or representations of any kind for the services being offered. The service is provided on an “as is” and “as available” basis without warranties of any kind, either express or implied, including but not limited to warranties of title, non-infringement, or implied warranties of merchantability or fitness for a particular purpose. No advice or information given by Oryon (Exceeding Expectations) or its agents or employees shall create a warranty. Oryon (Exceeding Expectations) provides no warranty that the service will be uninterrupted or error free or that any information, software or other material accessible on the service is free from viruses or other harmful components. Under no circumstances shall Oryon (Exceeding Expectations) be liable for any direct, indirect, special, punitive, or consequential damages that result in any way from your use of or inability to use the service, or for third parties’ use of the service to access your Web space, or to access the Internet or any part thereof, or your or any third parties’ reliance on or use of information, services, or merchandise provided on or through the service, or that result from mistakes, omissions, interruptions, deletion of files, errors, defects, delays in operation or transmission, or any failure of performance. If you are dissatisfied with Oryon (Exceeding Expectations) service or any of its terms, conditions, rules, policies, guidelines, or practices, your sole and exclusive remedy is to discontinue using the service.

You understand that by placing information on Oryon (Exceeding Expectations)’ servers that such information becomes available to all Internet users and that Oryon (Exceeding Expectations) has no way of limiting or restricting access to such information or protecting such information from copyright infringement. You assume total responsibility and risk for your use of Oryon (Exceeding Expectations)’ servers and the Internet. It is solely your responsibility to evaluate the accuracy, completeness, and usefulness of all opinions, advice, services and other information, and the quality and merchantability of all merchandise provided through Oryon (Exceeding Expectations) or on the Internet generally.

Your use of the service is at your sole risk. Oryon (Exceeding Expectations) is not responsible for files and data residing on your account. You agree to take full responsibility for files and data transferred and to maintain all appropriate backup of files and data stored on Oryon (Exceeding Expectations) servers.

You agree not to interfere with the operation of the system. You further agree not to interfere with the proper operation of other systems reachable through the Internet, including any attempt at unauthorized access. You agree to adhere to system policies as published by Oryon (Exceeding Expectations), including restrictions on services available with each service type, restrictions on certain features, and all other policies. You agree to abide by any and all future Oryon (Exceeding Expectations) policy decisions.

Oryon (Exceeding Expectations) reserves the right to monitor any and all communications through or with our facilities. You agree that Oryon (Exceeding Expectations) is not considered a “secure communications medium” for the purposes of the ECPA, and that no expectation of privacy is afforded.

7. Account-Holder Identification Information

You agree that you as the person legally responsible for all use of this account are at least 21 years of age. If you are under 21 years of age, you need to have parental consent in order to sign up, and the account must be ordered by a parent or guardian, in their own name. You agree to supply Oryon (Exceeding Expectations) with a current and truthful name, postal address and telephone number for our records, and you have a continued obligation to keep this information current. You also agree that you are an authorized user of any credit card that you supply to us, and you understand and agree that we have an obligation to fully investigate any possible fraudulent credit card use.

8. Sharing of account space

You agree and understand that the account you purchase is purchased either for yourself or on behalf of a client if you are a reseller.

9. Payment & Other Information

You agree to supply appropriate payment for the services received from Oryon (Exceeding Expectations), in advance of the time period during which such services are provided. You agree that until and unless you notify Oryon (Exceeding Expectations) of your desire to cancel any or all services received, those services will be billed on a recurring basis.

10. 30 Days Money Back Guarantee

Each Shared hosting plan includes a full 30-days money back guarantee.

If you are not completely satisfied with our services within the 30 Days Money Back Guarantee time period specified for your plan, you will be given a full refund of the contract amount excluding overages. No refund is available after that period. This policy does not apply to any additional services such as overages, disk space, bandwidth, maintenance fees, etc.

Accounts cancelled/terminated by Oryon (Exceeding Expectations) for violating our Acceptable Use Policy do not qualify for the 30-day money back guarantee. Only first-time accounts are eligible for a refund. For example, if you’ve had an account with us before, cancelled and signed up again, you will not be eligible for a refund. This is to protect our refund guarantee from being abused. To receive a full refund, contact our customer service department.

11. Agreement Acknowledgement

This agreement supersedes any written, electronic, or oral communication you may have had with Oryon (Exceeding Expectations) or any agent or representative thereof, and constitutes the complete and total agreement between the parties. Should any provision of this agreement is determined to be invalid or unenforceable, all other provisions shall remain in full force and effect and said provision shall be reformed only to the extent necessary to make it enforceable.

By placing and continuing to maintain or place information on Oryon (Exceeding Expectations)’ servers you are stating and acknowledging that you have read the aforementioned terms and conditions and that you understand such terms and conditions and agree to be bound by them.

We hope this AUP is helpful in clarifying the obligations of Internet users, including Oryon (Exceeding Expectations) and its clients, as responsible members of the Internet. Any complaints about a client’s violation of this AUP should be sent to support@oryon.co.in

Notice

Any violation to the above AUP warrants the immediate termination of the customer’s account with no refund been made.

Any other cost associate with the violation of the above AUP will be bear by the customer. Oryon (Exceeding Expectations) will not be responsible for any such cost as a result of violation of the customer account.

OFFICE 365 SERVICES PRODUCT TERMS

Oryon (Exceeding Expectations) India, (referred hereinafter as ‘Oryon Exceeding Expectations’, ’oryon’, ‘our’, ‘we’ and ‘us’) is a web hosting solutions provider.

In addition to the other terms of your Agreement, your use of the Office 365 Services (as defined below) is subject to the following terms and conditions:

1. ADDITIONAL DEFINED TERMS

“Business Hours” means 24 hours per day, seven days per week.

“Microsoft Customer Agreement” means the Agreement that Microsoft uses to convey or provide Microsoft Products to you.

“Product(s)” means the Microsoft online services, which may include Microsoft software technology.

“Office 365 Services” means the Priority Support from Oryon for Office 365™ described in your Services Description, plus Support, as defined below.

“Sensitive Data” means any: (i) personally identifiable information or information that is referred to as personal data (including sensitive personal data), PII (or other like term) under applicable data protection or privacy law and includes information that by itself or combined with other information can be used to identify a person, (ii) trade secrets, (iii) financial records (iv) other sensitive, regulated, or confidential information. “Support” means Oryon live support by chat and ticket during Business Hours.

2. ADDITIONAL ORYON OBLIGATIONS. Oryon will provide the following services as part of your Office 365 Services:

2.1 Priority Support from Oryon for Office 365. Oryon will provide the following services as described below: Oryon will create your account and will help you provision the Services including assisting with the following tasks: (i) creating your Microsoft customer account; (ii) verifying your ownership of that account; (iii) provisioning your end users on your customer account; and (iv) activating your end user accounts.

2.2 Mail Migration. Oryon will help you gather and document your requirements for the migration of your email, calendar, and contacts from your existing platform to the Microsoft Office 365 platform. You represent and warrant that you have the right to migrate email in the manner requested and are authorized to allow Oryon access to your email as required to perform the Services. You acknowledge that there is a special risk that data will be lost during a migration. You agree that you will create a reliable back up of all data to be migrated prior to the time that we begin the migration. You agree that we are not liable to you for damages resulting from the loss or corruption of your information as part of the migration.

2.3 Archiving and Email Retention Services. If your Office 365 Services include archiving or email retention services, the archiving or email retention services will capture only the email that you send or receive after the date that the archiving or email retention services are implemented. Upon termination of your account for the Office 365 Services, or your archiving or email retention service, we will destroy your archived data unless you have made other arrangements with us.

2.4 Support. Oryon will provide a support team for you to contact with any Support requests related to the Office 365 Services. Examples of Support include: service and software updates, troubleshooting of performance issues relating to your connectivity or desktop, your mobile device setup, and service availability. Oryon may escalate support issues to Microsoft on your behalf as needed. You shall submit all support issues directly to Oryon by telephone, chat, or ticket at the contact information provided in your Services Description. Such requests will be subject to our SLA in Subsection 3 below. You may not submit support issues directly to Microsoft; no SLA applies to and requests you submit directly to Microsoft.

3 SERVICE LEVEL AGREEMENT.

3.1 Response Time. We will respond to your Support requests submitted directly to Oryon via telephone, chat, or ticket within the following time frames. Urgent: If you cannot access your Oryon or your Microsoft account from the public Internet or if your account is functioning improperly or at less than optimal performance, we will respond to your Support request within four (4) Business Hours. Standard: If your Microsoft account is functioning normally but you (i) require information or assistance; (ii) wish to schedule maintenance or any other nonimmediate tasks; or (iii) require assistance in loading software or have a help desk-type question, we will respond to your Support request within eight (8) Business Hours. We will respond to you via telephone call, chat, or ticket depending upon the severity of the situation and consistent with any procedures we have established with you for your account

3.2 Remedy. If we fail to meet the response time SLAs stated in this Section, you are entitled to a credit of $10 per event, up to 100% of your then current monthly recurring fee for the Office 365 Services in that calendar month. You are not entitled to a credit under this subsection if the event giving rise to the credit occurred because of Microsoft downtime or because Oryon could not access your Microsoft account (if such inaccessibility is caused by you or Microsoft). You must request a credit through your Oryon account within seven (7) days following the event giving rise to the credit. If you are paying for your Services in a currency other than Singapore dollars, then any credit that is expressed above as a fixed number of Singapore dollars will be converted to the currency in which you pay for your Services as of the date of the invoice on which the credit is applied.

3.3 Microsoft Office 365 SLA. The Microsoft Customer Agreement provides a service level agreement from Microsoft to you that may be updated periodically by Microsoft, but remedies for service level violations will be provided by Oryon to you. You may not go directly to Microsoft with service level inquiries or requests for remedies.

4. YOUR OBLIGATIONS. You must give Oryon access to the Microsoft administrative console for your account in order for Oryon to provide the Office 365 Services as well as any increased level of access that may be required on specific Support requests. Oryon will share your company name and other contact information with Microsoft for the purpose of provisioning the Products and related accounts. You must use reasonable security precautions in connection with your use of the Office 365 Services, including, but not limited to, encrypting any Sensitive Data transmitted to or from, or stored on the Office 365 Services or storage devices you use. You must comply with the laws applicable to your use of the Office 365 Services and with the Acceptable Use Policy. You may not resell the Microsoft Products or the Office 365 Services provided to you pursuant to this Agreement unless separately agreed in writing.

5. MICROSOFT CUSTOMER AGREEMENT. By accepting these Office 365 Terms and Conditions and using the Microsoft Products, you also accept the terms of the Microsoft Customer Agreement located here:

https://cmsresources.windowsphone.com/devcenter/enUS/downloads/partnercenter/CustomerAgreements/Americas/MCA2015Agr_NA_ENG_Jul20 15_PDF.pdf. You may not use the Microsoft Products if you do not accept the terms of the Microsoft Customer Agreement and these Office 365 Terms of Service.

6. ACCESS TO YOUR CUSTOMER DATA. By using the Office 365 Services, you acknowledge that Microsoft will have access to your Customer Data. Additionally, you acknowledge that Microsoft may collect, use, transfer, disclose, and otherwise process your Customer Data, including PersonaI Data, as further described in the Microsoft Customer Agreement.

Oryon has authorized Microsoft (and its service providers and subcontractors) at our direction to access and disclose to law enforcement or other government authorities data from, about or related to you, including the content of your communications (or to provide law enforcement or other government entities access to such data as required). You agree that, as and to the extent required by law, you will notify your individual users of the Services that their data may be processed for the purpose of disclosing it to law enforcement or other governmental authorities as directed by Oryon, and shall obtain your users’ consent to the same.

7. PURCHASE AND PAYMENT

7.1 Your right to use the Office 365 Services is subject to payment of the applicable fees in accordance with the terms of the Agreement. Oryon will charge you those fees stated in your order. Recurring fees will be billed monthly, quarter or yearly in advance.

7.2 Fee changes due to changes in the Office 365 Services (e.g., increase or decrease in number of end users) will be effective as of the beginning of the next calendar month. We may increase our fees for Office 365 Services at any time by posting the new fees in the control panel or providing notice to you via ticket. Fee increases will not be applied to your Office 365 Services purchased prior to the time of the fee increase until at least forty-five (45) days after the date the new fees are first published, but any new Office 365 Services you purchase after a fee increase will be charged at the new fees.

7.3 Fees are due within thirty days from the invoice date. If your undisputed payment is fifteen days or more late Oryon may suspend the Services and any other services you receive from Oryon on written notice. Oryon shall undertake collection efforts prior to suspension. Invoices that are not disputed within one hundred and twenty days of the invoice date are conclusively deemed accurate. Fees must be paid in the currency identified on the Service Order/Services Description. Oryon may charge interest on overdue amounts at the greater of 1.5% per month or the maximum legal rate, and may charge you for any cost or expense arising out of our collection efforts.

8. TERM. The initial term of the Service Order/Services Description for Office 365 Services commences upon the effective date of the Service Order/Services Description and will continue for an initial term of one month. Anything to the contrary in the Agreement notwithstanding, upon expiration of the initial term the Service Order/Services Description will automatically renew for successive renewal terms of one month each, unless and until one of us provides the other with at least thirty (30) days advance written notice of non renewal.

9. DISCLAIMERS

9.1 You agree that you will not bring any legal claim or commence any adverse action against Microsoft in connection with Oryon’s resale of the Microsoft Products.

9.2 You agree that you will maintain at least one additional current copy of your programs and data. You are solely responsible for performing and testing restores as well as testing your systems and monitoring the integrity of your data.

Managed Servers Service Level Agreement

Managed Server Service Level Agreement (SLA)

Oryon (Exceeding Expectations) India, (referred hereinafter as ‘Oryon Exceeding Expectations’, ’www.oryon.net’, ‘our’, ‘we’ and ‘us’) is a web hosting solutions provider. All managed servers are subject to the managed Server SLA described in this document.

 

1. Deployment

Unless otherwise stated, Oryon (Exceeding Expectations) does not guarantee a deployment timeframe but will use reasonable endeavours to deploy the server(s) promptly. Oryon (Exceeding Expectations) may, from time to time, agree to provide a guaranteed deployment timeframe (a “Deployment Guarantee”) for an additional fee. Where such Deployment Guarantee is agreed, Oryon (Exceeding Expectations) will deploy the Server(s) by the date stated in the Hosting Services Agreement, provided that you promptly provide all information that we reasonably request from you to complete deployment. Servers are deemed deployed as of the time that Oryon (Exceeding Expectations) generates an email message to you that includes the information needed to allow you to transfer information to and from the Server(s). Your sole and exclusive remedy for our failure to meet the Deployment Guarantee shall be a credit equal to the amount of the fee paid for the Deployment Guarantee service. You are not entitled to a credit if you request or cause the deployment delay. This Deployment Guarantee does not apply to any software, other managed services, or hardware devices other than the Server(s). If you request (orally or in writing) that we deploy your servers by a specific date or on an “expedited” basis for no additional fee, then the Deployment Guarantee shall not apply, and we commit only to using reasonable endeavours to deploy the Server(s) by the date requested.

2. Network

We guarantee that our data center network will be available 99.9% of the time in any given monthly billing period, excluding scheduled maintenance.

3. Data Center Infrastructure

We guarantee that data center power will be functioning 99.9% of the time in any given monthly billing period, excluding scheduled maintenance. Infrastructure downtime exists when managed servers downtime occurs as a result of power or heat problems.

4. Hardware

We guarantee the functioning of the following hardware: (i) switches, firewalls, load balancers and servers; (ii) direct attached storage devices; (iii) network attached storage devices; and (iv) storage area networks (“SAN”). Hardware repair or replacement will begin once we identify the cause of the problem. Hardware repair or replacement is guaranteed to be complete within one (1) hour of problem identification for switches, firewalls, load balancers, servers and direct attached storage devices, and within five (5) hours of problem identification for network attached storage devices. For SAN hardware failures, we guarantee that we will have a technical specialist and necessary parts onsite to begin repairs within four (4) hours of problem identification. We will credit your account five per cent (5%) of the monthly fee per additional hour of downtime (after the initial one (1) hour or five (5) hours for repair or replacement, as applicable, or, for SAN, the additional hour of delay in beginning repairs), up to one hundred per cent (100%) of your monthly fee for the affected hardware. This guarantee excludes the time required to rebuild your system, such as the time required to configure a replacement device, rebuild a RAID array, reconfigure devices from their default settings, reload operating systems, reload and configure applications, and/or restore from backup (if necessary).

5. Maintenance

You are not entitled to a credit for downtime or outages resulting from Maintenance. For the purposes of the Service Level Guarantee, Maintenance shall mean:

  • a. Oryon (Exceeding Expectations) maintenance windows – modifications or repairs to shared infrastructure, such as core routing or switching infrastructure that we provide notice of at least seventy two (72) hours in advance, that occurs during off peak hours in the time zone where the data centre is located;
  • b. Scheduled customer maintenance – maintenance of your configuration that you request and that we schedule with you in advance (either on a case by case basis, or based on standing instructions), such as hardware or software upgrades;
  • c. Emergency maintenance – critical unforeseen maintenance needed for the security or performance of your configuration or Oryon (Exceeding Expectations)’s network.

6. Your Breach of the Agreement

You are not entitled to a credit if you are in breach of the Agreement (including your payment obligations to us) at the time of the occurrence of the event giving rise to the credit until you have remedied the breach. You are not entitled to a credit if the event giving rise to the credit would not have occurred but for your breach of the Agreement or misuse of your Hosted System.

7. Unsupported Configuration Elements or Services

If you ask us to implement a configuration element (hardware or software) or hosting service in a manner that is not customary at Oryon (Exceeding Expectations), or that is in “end of life” or “end of support” status we may designate the element or service as “unsupported”, “non-standard”, “best efforts”, “reasonable endeavours”, “one-off”, “EOL”, “End of Support”, or with like term in the Services Description (referred to in this Section as an “Unsupported Service”). Oryon (Exceeding Expectations)makes no representation or warranty whatsoever regarding Unsupported Service so designated, and you agree that Oryon (Exceeding Expectations)shall not be liable to you for any loss or damage arising from the provision of the Unsupported Service. The Service Level Guarantees shall not apply to the Unsupported Service, or any other aspect of the Hosting Services that is adversely affected by the Unsupported Service. You acknowledge that Unsupported Services may not interoperate with Oryon (Exceeding Expectations)’s other services, such as backup or monitoring.

8. Extraordinary Events.

You are not entitled to a credit for downtime or outages resulting from denial of service attacks, virus attacks, hacking attempts, or any other circumstances that are not within our control.

9. Credits

If we fail to meet a guarantee stated above, you will be eligible for a credit. Credits will be calculated as a percentage of the fees for the managed servers adversely affected by the failure for the current monthly billing period during which the failure occurred (to be applied at the end of the billing cycle), as follows:

Network: Five percent (5%) of the fees for each 30 minutes of network downtime, up to 100% of the monthly fees;

Data Center Infrastructure: Five percent (5%) of fees for each 30 minutes of infrastructure downtime, up to 100% of the monthly fees;

10. Limitations

You are not entitled to a credit if you are in breach of your services agreement with Oryon (Exceeding Expectations) India, (including your payment obligations to us) until you have cured the breach. You are not entitled to a credit if downtime would not have occurred but for your breach of your agreement with Oryon (Exceeding Expectations).

To receive a credit, you must contact your Oryon (Exceeding Expectations) account team within thirty (30) days following the end of the downtime. You must show that your use of the servers was adversely affected in some way as a result of the downtime to be eligible for the credit.

Notwithstanding anything in this Service Level Agreement to the contrary, the maximum total credit for the billing period, including all guarantees, shall not exceed 100% of your fee for that month. Credits that would be available but for this limitation will not be carried forward to future billing periods.