WebNameHost--The Big FAQ

This searchable FAQ has a large number of questions and answers on domains, hosting, web sites, eMail and related topics. This material has been collected through many years of web experience. Some are common questions appearing in a similar form on many host sites. Many are unique to this database. Use the Contact Page to advise of corrections, additional questions or answers we have missed.

Type a portion of the item you are searching for

Show All     OR, browse by first letter
A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  
OR, by category   Account   CGI   Content   ControlPanel   Domains   eMail   Error   FrontPage   FTP   Hosting   IP   Languages   Logs   MailingList   Mime   mySQL   Perl   PHP   Reseller   Scripts   SearchEngine   Security   Site   Software   SSH   Statistics

Results for Security:

Q. Are there any extra costs involved in hosting a secure site?

A. Yes, you'll need to buy a digital certificate from a certificate authority.

Category: Security Secondary Category: Certificate


Q. Can I do secure business with credit cards on my site?

A. Yes, but there is some extra cost. You will need to purchase a dedicated IP number for your account and obtain a security certificate. We can offer good prices on the latter and will set up the certificate for you. All traffic to the secured portion of the web site would then be generated using HTTPS. Contact us for a quote.

Category: Security Secondary Category: Certificate    Contact us


Q. Do you provide password protection to folders?

A. Yes. This is easily set up through your control panel, but may not be used if you are also using FrontPage.

Category: Security Secondary Category: Password


Q. How secure is e-business conducted on your server?

A. We ensure that data sent from your viewer's Internet browser will make it to our servers safely. All cPanel, Webmail, and WHM traffic is encrypted. If someone should intercept the data in-between your browser and our server, it will be encrypted and they won't be able to do anything with it. We conduct monetary transactions off site with reliable and secure third party stores and order fulfillment sites whose staff have years of experience at securing their sites.

Category: Security


Q. How secure is my web site?

A. You should use the secure protocols in FTP and eMail. This will ensure that your data stream is encrypted and no one can intercept it. You should also not use a dictionary word in your password.

Category: Security


Q. How secure is your web server

A. We employ standard methods of safeguarding against any malicious entry to a website on our server. This is done through the usernames and passwords that are assigned to each of our clients. You need to change your password on first using your control panel, and once in a while thereafter, always to something hard to guess (which means among other things, that it does not contain any words that appear in a dictionary.)

Category: Security


Q. I wish to access to my site using https:// how can I do that?

A. You need a unique or static IP address which you may order from us. We need some information about you and your company to create a CSR key, you must provide this key to certificate provider where you may purchase a Secure Certificate. They will provide a key to you, you must forward it to us and we will install it on your account. Alternately, we can do all this for you. Contact us for a quote. Then your visitors can access to all or some parts of your site using https:// i.e. a secure connection.

Category: Security Secondary Category: Https    Contact us


Q. If some one tries to see one of my folders your server shows the contents of that folder in directory structure. How can I protect them?

A. Ensure there is an index file in each folder even if that file is empty.

Category: Security Secondary Category: Index.html


Q. What is .htaccess?

A. Among other things, this file can be used to restrict access to other files and web pages. When a request for a web page is made, the web server first checks for an .htaccess file. The server begins this check by looking for .htaccess in the root of the current web directory, and on down the directory tree until it reaches the directory where the requested file resides. Since the placement of the .htaccess file determines when it is executed, this fact can be used to restrict access only in certain subdirectories. The .htaccess file can be placed in one or more of your /home/$user/$domain-www subdirectories.

Category: Security Secondary Category: htaccess

Notes: Do not edit the .htaccess file if you are using MS FrontPage! FrontPage uses the .htaccess file, and editing it may cause errors in your configuration.



dglofaq script Version 1.1 Copyright 2004-2007 by Rick Sutcliffe and Arjay Enterprises