Methods of payment Abuse

Knowledge base — Page 2

15.04.2025
5 Apps to Control Your Home Devices with an Android Smartphone

Here are five excellent apps that turn your phone into a universal remote. Some use IR signals, others work via Wi-Fi, and one even lets you control your PC.

15.04.2025
How to Switch CentOS 7 Repositories to Vault (Archived Repos)

After the end of CentOS 7’s lifecycle (EOL on June 30, 2024), the official repositories were disabled, and systems can no longer receive updates. However, Red Hat provides archived repositories via Vault, which can still be used to install packages.

15.04.2025
Deploying the Trojan / VLESS VPN Protocol Using 3X-UI

3X-UI is a user-friendly control panel for creating proxy connection configurations that support various protocols, including VLESS, VMESS, Trojan, and Shadowsocks. In this guide, we’ll walk you through the process of setting up a VLESS connection.

11.04.2025
How to Pass Through a USB Drive to a VPS: A Step-by-Step Guide for Windows and macOS

Transferring files from your computer to a remote Windows server is a pretty common task. Usually, it’s simple: copy the file on your PC, paste it on the server — and you’re done. This method is handy for quickly sharing text, images, or documents.

11.04.2025
Site protection: what is it

Some details about the "Site Protection" service in PQ.Hosting: why a user needs it and how requests are filtered.

10.04.2025
Site protection: how to order

Told about how to order a service in the personal account.

10.04.2025
Site protection: DNS settings

Enable site protection by simply directing traffic to a secure IP. Learn how to properly configure DNS records and what to watch out for.

10.04.2025
Site protection: service settings

Described how to correctly set up the "Site Protection" service in the client area

10.04.2025
Site protection: firewall settings

Here are examples of settings for popular firewalls — make sure they are appropriate for you.