Kötüye kullanım ve yasa dışı içeriği bildirin

Bir İnternet ihlalini DCHost'a bildirmek istiyorsanız, raporunuzu oluşturmak için aşağıdan bir seçenek belirleyin. Ekibimizin şikayetinizi inceleyebilmesi için lütfen gerekli ayrıntıları sağlayın.
E-posta ile bir rapor gönderdiyseniz ve bu forma yönlendirildiyseniz, bilgileriniz eksiktir.
Talebinizi işleme alabilmemiz için aşağıdaki formu doldurmanız ve gerekli tüm bilgileri sağlamanız gerekmektedir.

DMCA Takedown

DMCA—is a federal law that helps copyright holders.

By submiting this form, you attest, under penalty of perjury, that (1) you have a good faith belief that use of the material in this report is not authorized by the copyright owner, its agent, or the law; (2) you are the copyright owner or authorized to act on behalf of the copyright owner; and (3) you understand, under 17 U.S.C. § 512(f), that you may be liable for any damages, including costs and attorneys fees, if you knowingly materially misrepresent that the material you are reporting is infringing.

Trademark Infringement

Trademark abuse is the unauthorized use of a trademark in connection with services in a way that is likely to cause confusion about the source of the goods or services.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Spam

Spam is Unsolicited Bulk Email distributed to recipients who have not provided direct consent.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Phishing

Phishing is the fraudulent practice of sending emails purporting to be from reputable companies in order to induce individuals to reveal personal information.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Malware

Malware is software that is intended to damage or disable computers and computer systems.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Botnet

A botnet is a network of private computers infected with malicious software and controlled as a group without the owners' knowledge.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Intrusion/exploit attempts (Bruteforce, Scans etc)

Intrusion/exploit attempts (Bruteforce, Scans etc) attacks are when malicious applications makes several attempts to access, crack, or locate vulnerabilities on machines they have no right accessing. This is a technique commonly employed by malicious actors in order to find an attack vector to utilize against a server/website.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Child Abuse

Child Abuse is physical maltreatment or sexual molestation of a child.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Violent Threats and Harassment

Violent threats and harassment are any sort of content pertaining to intent to harm a person(s). These can be threats of physical altercation or content to cause emotional distress.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Other

Please utilize this form to provide DCHost with evidence of any abuse outside of our categories listed.

By entering your name, you affirm all information is true and accurate.
All information submitted to us may be relayed to the customer during our remediation process.

Xerox

Success!, your request has been successfully sent!, we will reply to you soon.

Xerox

Sorry!, it seems to be a server problem right now!, please try again later.

Gizliliğiniz önemlidir

Çerezleri hizmetlerimizi sağlamak ve analitik ve pazarlama için kullanıyoruz. Çerez kullanımımız hakkında daha fazla bilgi edinmek için lütfen Gizlilik Politikamıza ve Çerez ve İzleme Bildirimimize bakın. Web sitemizde gezinmeye devam ederek çerez kullanımımızı kabul etmiş olursunuz.
Yasal Sözleşmeler