LEA (LowEndAdmin) is the original founder of LowEndBox and the visionary who gave rise to an entire movement around minimalist, efficient hosting. In 2008, LEA launched LowEndBox with a simple but powerful idea: that it was possible to run meaningful applications, web servers, VPNs, mail servers, and more – on small, low-cost virtual machines with minimal resources.
At a time when most infrastructure discussions were dominated by high-end servers and enterprise platforms, LEA championed the opposite approach: lightweight Linux distros, self-managed servers, open source software, and thoughtful optimization. This philosophy gave birth to the term “Low End Box”, which would come to define a new genre of hosting tailored to developers, tinkerers, and budget-conscious users around the world.
Through LowEndBox and its companion forum, LowEndTalk, LEA built the foundation for what would become one of the most active and enduring communities in the hosting world, prioritizing knowledge-sharing, transparency, and accessibility.
After several years of nurturing the site and community, LEA stepped away from active involvement, passing the torch to a new generation of admins, contributors, and moderators. Today, LEA remains a respected figure in the LowEnd ecosystem, credited with launching a platform and philosophy that continues to influence thousands of infrastructure providers and users globally.
LowEndBox’s legacy, and its thriving community, is a direct result of LEA’s original vision.
Forgot to notify.
Templates are updated. Ubuntu 9.10 64Bit/32Bit is added. Alos Ubuntu 10.04 64Bit/32Bit. And you can also get on request access to pygrub. The new feature from SolusVM per template base.
Greets
promo code not working for me..
@Alex: give me test ip please
Been with SysCentral since last ad, it’s been running good and support been there when i’ve needed it.
Thumbs up.
What throughput to expect? 10, 20, 30… 100mbit?
-2010-07-20 14:31:09– http://cachefly.cachefly.net/100mb.test
Resolving cachefly.cachefly.net… 140.99.94.175
Connecting to cachefly.cachefly.net|140.99.94.175|:80… connected.
HTTP request sent, awaiting response… 200 OK
Length: 104857600 (100M) [application/octet-stream]
Saving to: `/dev/null’
100%[=======================================================================================================>] 104,857,600 9.74M/s in 11s
2010-07-20 14:31:20 (9.48 MB/s) – `/dev/null’ saved [104857600/104857600]
So atleast mine is working as 100Mbps.
What about upload?
Never mind. Just noticed that they don’t allow “IRC”.
Why are all VPS providers prejudice against this poor protocol? :(
@minh
sure. no problem. Please contact me via email info at syscentral.de because i dont want to post real ip here. Is that ok for you ?
@A.
I know how you feel, though Hetzner block port 6667 outgoing if I recall correctly.
@benjy
no they dont. This doesnt exsist for colocation and ded server anymore.
how is this service?
anyone can share experience?
hardware spec? CPU spec?
disc IO ?
They don’t allow irc? Hmm… I would swear that it wasn’t like that in their tos when I ordered it 4 months or so ago otherwise I would skip their offer as I do always with “no irc allowed” hosts.
@Spirit
this was in the tos. Four month ago also.
I don’t even want to use IRC. But when I see that it’s not allowed in the ToS, it’s almost always a bad sign.
You see, competitors will do whatever they can to take the competition down. So, if they know a VPS provider will succumb to a couple of faux DMCA takedown notifications, well, that’s just what they’ll do.
Problem is that most hosts have no clue what IRC (internet rely chat) is. Most of the bad things related to irc are things of the past. Also they have no clue what’s the difference between irc shell hosting and personal irc usage. I don’t want to be limited in.. as example harmless hanging at freenode (http://freenode.net/) IRC network with bouncher installed on my vps, etc.. The most clueless regarding this hosts show when they “no irc” tos rule stick in ABUSE section, which is of course nonsense – just another copy/paste of same tos which mostly even they don’t understand. I prefer hosts with own, unique tos.
Well i do have a clue what the difference is between irc use. Irc is irc your ip is still
available in a network if you connect to an irc server with a bouncer or a bot.
The attacks in irc have not been changed. I allowed irc access at the beginning of the project this is approximilaty 3
years ago. And only the art of the attacks changed during the 90’s not the attacke itself.
And i cant let go down all of my customers vps even with protection of the network.
As someone who’s on main IRC networks more than 10 years I must desagree with you. IRC nowaday is barely copy of old IRC. Most internet relay chat networks are empty, abuse teams left them long time ago and almost no one care for them except ordinary “chatters”. As a operater of some bigger IRC channels on one of main IRC networks I haven’t been disturbed or saw ddos, etc… atleast 3 years. The attacks in irc have not been changed? The attacks on irc are reduced on lets say 1% of old attacks. And this isn’t change from lets say 5 years ago?
While I admit that IRC shell providing still bring some risk because masses of users which don’t pay for bandwidth, which don’t have dedicated IPs, etc…, ordinary personal usage brings noone. Sometimes I see very inteligent TOS with some companies, as example.. they don’t allow irc shell hosting, but allow personal usage, or theay don’t allow IRCd servers linking but they allow IRC clients, or they don’t allow as example more risky connections to some Undernet but allow them to other low risk networks, or they allow IRC on request, etc.. while some clueless hosts still use default c/p “no IRC allowed” tos under ABUSE section. Internet relay chat is not abuse but it can be abused same as any part of hosting business. Question now is how big this particual risk is. IMHO very low nowaday for host which know what they are doing and those hosts which realized this, have advantage above “no irc allowed” hosts. I have atleast 6 “irc allowed” lowendbox featured hosts for some long term without any incident. I never saw as example some rapidswitch DC down because IRC related issues…
“And only the art of the attacks changed during the 90′s not the attacke itself.”
..I hope that you’re awared that IRC lost big part of pupulation from 90′s, that IRC abuse isn’t attractive as before and old irc ddos kiddiots nowaday work as IT consultants, sucessful hosting managers, etc, etc… in some main IT companies while rare newcomers don’t waste their time with abuse on this unattractive old, old… relay chat protocol. As it seems even people at Hetzner realized this and unblocked famous 6667 port…
Thas right. I know people from the old days in the 90’s who are now IT-Manager for companys and they use irc too. I know that hetzner allow irc for there dedicated server, too. Well we can make a deal. My network is protected and we make a test. Send me an email to info at syscentral.de and i will give you a vps micro with irc access for one month for free you can use it with a bouncer. And in the month we will see what happend. If nothing happens i will for the future allow irc access and change my tos so that IRC bouncer are allowed too but no ircd server or bots.
To ne fair… as you noticed in my first post here, I am already your customer and as It seems somehow I overlooked this “no irc allowed” part of your tos (well, honestly I am still not so sure about that, because usually I read tos carefully before I order any service – are you sure that this part of your tos/or whole tos really isn’t changed/revisited in last 5 months or so?) and I run two irc processes whole that time without any incident.
Unless you request from me to kill those two processes or discontinue service because (unintentionall) tos breach it will stay like that – without any incident but please, allow me to give you advice. In case that you decide for compromise and allow irc, make strict “no irc shell service” – only personal usage allowed. It’s not problem with our personal bounchers, friendly bots (quiz, eggdrop..).. but can be with third party users which pay as example 1$ for irc process but don’t feel any obligation to host. We, vps customers, pay for bandwidth, IPs, etc… and we don’t want to be ddosed anymore than you and because that you can expect some responsability and maturity from vps customers, but with potential “irc shell customers”, kids which share IPs, etc… we can’t expect same level of responsability so “no irc shell hosting” tos can drasticly reduce any potential abuse.
In short my suggestion would be to forbid reselling irc shell accounts but allow personal usage.
Maybe even: “personal IRC usage allowed on request” :P
(please take my advice only a friendly suggestion – I don’t try to be smart a$$ here and finally… it’s still your company and only you know what’s the best for your company and decide that way)
Oh, It’s late here and I almost forgot – I will contact you tomorrow to clarify regarding my two irc processes. Maybe just to mention – both are online through HE IPv6 tunnels, not with SysCentral IPs.
Do syscentral have an english cart,i cannot read German.
@Geoffrey – DOesn’t look like it – However if you order using Chrome it will translate the pages for you.
Jack xD
Hi,
wie only have google translator at the moment http://www.syscentral.de/en/
Greets
Well the cart is now in english too.
Seems like they are full, cannot get any order.
by the way, here are some Openssl results. Impressive!!!
# openssl speed aes
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes
aes-128 cbc 130533.37k 138489.94k 140000.96k 143014.18k 138662.70k
aes-192 cbc 115161.49k 118450.10k 123852.63k 121671.13k 123410.71k
aes-256 cbc 103365.13k 103364.62k 107034.36k 108108.89k 107290.62k
waiting to finish unixbench… next comment
Unixbench for 128MB Xen Basic VPS
Impressive results for just a $4 USD vps
System Benchmarks Index Values BASELINE RESULT INDEX
Dhrystone 2 using register variables 116700.0 19557668.4 1675.9
Double-Precision Whetstone 55.0 3152.3 573.1
Execl Throughput 43.0 1689.3 392.9
File Copy 1024 bufsize 2000 maxblocks 3960.0 232940.2 588.2
File Copy 256 bufsize 500 maxblocks 1655.0 61290.8 370.3
File Copy 4096 bufsize 8000 maxblocks 5800.0 726198.4 1252.1
Pipe Throughput 12440.0 338096.7 271.8
Pipe-based Context Switching 4000.0 97405.8 243.5
Process Creation 126.0 3892.0 308.9
Shell Scripts (1 concurrent) 42.4 3165.9 746.7
Shell Scripts (8 concurrent) 6.0 438.8 731.4
System Call Overhead 15000.0 461972.9 308.0
========
System Benchmarks Index Score 515.7