WebPC

Documentation

Machines

They are managed virtual desktops, deployed on virtual machines. You have superuser access on your virtual desktops, so you can easily install additional software, and add other users.

Authentication

After a successful transaction You will be provided with a link and a machine’s login. We recommend writing them down as they are nonrecoverable. Following the link will lead to the machine’s dashboard. Alternatively You may use a dedicated form on the index page to login.

Dashboard

A dashboard is split into three parts: Details, Credentials and Protection.
Under “Details” You can find information regarding expiry date, image type and the machine size. In this section machine expiry date can be extended via a top-up button and also machine can be deleted.
“Credentials” section contains information required to access the machine via VNC and a button for a browser connection. VNC password may be hidden if necessary, but be careful this change is forever.
In the “Protection” section VNC password can be changed.

Machine deletion

Machine deletion is permanent. Deleted machine is not a subject to restoration. WebPC does not store any backup of the machine. Machine will be deleted only in the occasions stated bellow:
1. Pre-purchased time ran out.
2. You manually delete the machine.
3. A breach to the Acceptable use Policy was found.

Traffic

Every cloud machine will have a monthly traffic limit of 20 TB. Only the outgoing traffic will be monitored. Incoming or internal traffic is free.
If you create a virtual machine, it will start with an empty traffic limit. If a cloud machine is deleted also the corresponding traffic limit will be deleted.

Browser vs VNC

A purely browser interaction with the machine is possible, however not recommended. Using VNC client in most cases leads to greater responsiveness and overall better experience.

Recommended clients

1. PC 2. Mobile

Cookie Policy

We do not use cookies that track Your personal information on our website. We do use third party solutions that have there own Cookie Policy. You can find out more by following these links:
Cloudflare: https://www.cloudflare.com/cookie-policy/
Stripe: https://stripe.com/cookies-policy/legal
Coinpayments: https://www.coinpayments.net/downloads/CoinPayments_Privacy_Policy.pdf
Our payment gateway providers require an email for any transaction to send the receipt. We do not record the email You’ve used during transaction and it is not required for a login.

Acceptable use Policy

This Policy is designed to assist in protecting the Services, our Networks and infrastructure and other Customers from improper and/or illegal activity using these services over the Internet. All users of the service/s are expected to behave in a reasonable fashion and to adhere to commonly accepted practices of the Internet community. Exercising good judgment and common sense while using the Services should enable You to remain within the purview of acceptable conduct as further described below.
If You engage in conduct while using the Services that is in violation of these Policies or is otherwise illegal or improper, We reserve the right to invoke the provisions of the Agreement in relation to Your access to the affected element(s) of the Services.
You may not attempt to gain unauthorized access to, or attempt to interfere with or compromise the normal functioning, operation, or security of any of Our networks, systems, computing facilities, equipment, data, or information. You may not use the Services to engage in any activities that may interfere with the ability of others to access or use the Services or the Internet. You may not attempt to gain unauthorized access to the user accounts or passwords of other users.
You agree to use Our Services only for lawful purposes. Use of the Services for transmission, distribution, retrieval, or storage of any information, data, or other material in violation of any applicable law or regulation (including, where applicable any tariff or treaty) is prohibited. This includes, without limitation, the use or transmission of any data or material protected by copyright, trademark, trade secret, patent, or other intellectual property right without proper authorization and the transmission of any material that constitutes an illegal threat, violates export control laws, or is obscene, defamatory, or otherwise unlawful.
We reserve the right to modify this Policy from time-to-time at Our sole discretion. We will notify You of any such modifications either via e-mail or by posting a revised copy of the Policy on our website.