FAQ
What is included in my game server hosting plan?
Each game server hosting plan includes:
· Full access to a dedicated server or virtual machine.
· An easy-to-use control panel for managing server settings.
· Automated backups for data security.
· 24/7 technical support for troubleshooting and assistance.
· DDoS protection to ensure uninterrupted gameplay.
How do I install mods or plugins on my game server?
To install mods or plugins:
1. Access your server control panel.
2. Navigate to the "Files" section.
3. Upload the mod or plugin files directly or use the auto-installation feature if available.
4. Follow specific installation instructions provided by the mod/plugin developer.
5. Restart your server to apply changes.
How does billing work for my game server hosting?
Billing for game server hosting is typically handled on a monthly basis.
Each month, you will receive an invoice detailing the charges for your server plan and any additional services or resources used.
Payments can be made via credit card, PayPal, or other available methods. To avoid service interruptions, ensure your payment details are up to date.
What should I do if I encounter technical issues?
If you encounter technical issues:
· Check our knowledge base for solutions to common problems.
· Submit a ticket through our support portal detailing your issue.
· Contact our 24/7 technical support team for immediate assistance.
· Ensure your server software and plugins are up-to-date to prevent issues.
Can I upgrade or downgrade my server plan?
Yes, you can upgrade or downgrade your server plan at any time.
To do so, access your dashboard in the client area, select the desired plan, and follow the prompts to adjust your service level.
Upgrades take effect immediately, while downgrades will apply at the start of your next billing cycle.
How is my data protected on the server?
Data protection measures include:
· Regular automated backups to ensure data recovery.
· Secure server environments with firewalls protection.
· DDoS protection to guard against external attacks.
· Encrypted data transfers between your device and the server.
· Strict access controls to prevent unauthorized data access.