Knowledgebase

WebHostSG Knowledgebase

Account Related

Logging into the Client Portal

Login from the WebHostSG's Website

  1. Visit https://webhostsg.net.

  2. On the top-right of the page, click the Account Login button.

    Login Step 1

  3. You will be re-directed to the Client Area. Enter your Email Address and Password.

  4. Click the Login button to continue. From here you can manage or buy new products and services from WebHostSG.

Login from the Control Panel Login Area

  1. Visit: https://webhostsg.net

  2. On the top right corner of the page, click on the Login button.

  3. Enter your Email Address and Password and click the Login button.

Accessing your Products/Services

  1. Once you have logged in to the Client Portal, click on Services
    Client Portal Services

  2. You will now see the Products/Services you have purchased from us.
    product and services

Accessing your Domains

  1. In Client Portal, click on Domains
    client portal domain

  2. You will be brought to the list of Domains that you have purchased.
    my domain page

Author: Admin
Last update: 2018-07-09 04:38


Reset Account Password

In the event that you do not remember your current Password, you can have your Account Password reset.

  1. Go to https://webhostsg.net/pwreset.php

  2. Enter your Email Address and click the Submit button.

  3. This would send an email to your email address, containing a link through which you can reset your Client Portal Password.

Important Note:
When you reset your password on the Client Portal, it will also change your cPanel password.

Author: Admin
Last update: 2018-05-30 14:04


Domain Names

Changing Name Servers of a Domain Name

 

In order to host a website on your domain name, you will need to obtain the Name Servers from the Web Hosting company with whom you wish to host your website and point your domain name to these Name Servers.

To Modify Name Servers of your Domain Name

  1. Contact your Web Hosting Company and find out from them the Name Servers you need to use.

    If you have purchased Web Hosting for your domain name through WebHostSG, then you need to set the Name Servers as specified by WebHostSG.

  2. Login to your Client Portal. Learn How

  3. On the Client Area page go click on Domains.
    client portal domain

    About Lock / Suspension
    Note

    If the domain name is Locked/Suspended by WebHostSG, you will have to first unlock/unsuspend it before proceeding further.

  4. To the right of the domain you wish to make changes click Manage.
    client portal manage services

  5. Click Name Servers.
    client portal overview

  6. Enter upto 5 Name Servers and click Change Nameservers.
    client portal dns

Note

Upon modifying your domain name's Name Servers, your website would begin appearing in a web browser, after about 24 to 48 hours (provided your Web Hosting package is properly setup and you have uploaded the content of your website). This is a standard time-frame required for a process called as DNS Propagation to complete Worldwide. This process is not controlled by any one ISP/company and therefore it can not be hastened.

 

Author: Admin
Last update: 2018-07-09 04:46


Modifying the Whois (Contact Details) of Domain Names

Typically, Domain Name Contacts are of the following types:

  • Registrant Contact

  • Administrative Contact

  • Technical Contact

  • Billing Contact

In the system, Contacts are independent of a domain name. All contact information that you have used for registering any domain name, is maintained separately in a Contact database. This allows you to re-use the contact information for any other domain name registration without having to fill in all the values again. Think of this as linking Contacts from your Contact database to the domain names you register. Whenever you change any contact information in any Contact, it will automatically change that information in every domain name which uses that contact information and reflect the same immediately in the Whois lookup results of your domain name.

To Modify Contact Details for a Domain Name

Exceptions
Note

The following instructions are not meant for modifying the Contact Details of:

  • .RU domain names

  • .UK domain name

  1. Login to your Client Portal. Learn How

    About Lock / Suspension
    Note
    • If the domain name is Locked/Suspended, you will have to first get it Unlocked/Unsuspended it before proceeding further. Contact us at support@webhostsg.net

  2. In the Client Area, click Domains. Choose the Domain you wish to modify and click the Manage icon.
    client portal manage

  3. Click the Contact Information on the left menu to proceed to the Contact Information view.

    About Contact Information View
    Note
    • .CA domain names only have Registrant, Administrative and Technical Contacts. There is no Billing Contact.

    • In case of a .EU domain name, only the Registrant Contact information needs to be provided and hence, the Contact Details view will display only the Registrant Contact. However, the Whois Lookup results of a .EU domain name will also display an Onsite Contact and a Billing Contact. 2

    • .NL domain names only have Registrant, Administrative and Technical Contacts. There is no Billing Contact.

    • In case of a .NZ domain name, only the Registrant Contact information needs to be provided and hence, the Contact Details view will display only the Registrant Contact. However, the Whois Lookup results of a .NZ domain name will also display an Administrative Contact and a Technical Contact, which displays the same Contact Details as those of the Registrant Contact.

  4. Modify the details and click the Save Changes button to save the changes.

    • You may choose to use the the Registrant Contact Details for the Administrative, Billing & Technical Contact Details by selecting the Use existing account contact and choosing which contact info to use.

Note
  • The Modify Contact form supports the following, except for the Phone Number, Fax Number and Email Address fields:

    • Accented characters in case of the below Contact Types:

      • General Contact

        • Thin Registry - All characters

        • Thick Registry - A set of characters and this set varies from Registry to Registry

      • .CA Contact

      • .CO Contact

      • .DE Contact: This supports the following Latin-1 characters:

        ¡¢£¤¥¦§¨©ª«¬-®¯°±²³´?¶- ¸¹º»¼½¾¿ÀÁÂÃÄÅÆÇÈÉÊËÌÍÎÏÐÑÒÓÔÕÖ

        ×ØÙÚÛÜÝÞßàáâãäåæçèéêëìíîïðñòóôõö÷øùúûüýþÿ

      • .ES Contact: This supports all UTF-8 characters.

        Additional Information

        List of UTF-8 Accented Characters

      • .EU Contact

    • Chinese characters in case of .CN Contact (Contact Type).

    • A Registrant Contact can be either an Individual or a Company.

      In case the Registrant Contact is a Company, the Company name itself should be mentioned in the Name field of the Contact. The Company Name field can be filled in as N/A.

      Administrative and Technical Contacts can only be Individuals.

      There is no Billing Contact for a .CA domain name.

    • You can not modify the Registrant Contact's Name of a .CA domain name. If you wish to modify the Registrant Contact Details of your .CA domain name, you need to instead create a new Contact and assign it as the Registrant Contact.

      In case of a .CA domain name, the following is relevant:

  • The following list displays the various types of .DE Contacts listed in our system and how they are displayed in the Whois of .DE domain names:

    .DE Contact Type displayed in the System

    .DE Contact Type displayed in the Whois

    Registrant

    Domain Holder

    Admin

    Administrative or admin-c

    Technical

    Technical or tech-c

    Billing

    Zone administrator or zone-c

    The Registrant or the Administrative Contact of a .DE domain name needs to be from Germany. This implies that the country of either of these Contacts needs to be Germany.

    The Name field of any .DE Contact can not be modified. If you wish to modify the Name, create another Contact and associate the same with your .DE domain name.

    While modifying the Contact Details of a .DE domain name, the .DE Registry checks if the Name Servers used by the domain name contain a Zone for this domain name and the correct NS Records.

    If the Name Servers fail to display the Zone file of your .DE domain name and/or display NS Records for the Name Servers, you will not be able to modify the Contact details of your .DE domain name. Moreover, you will be provided 30 days to correct this issue or else your domain name would get Deleted by DENIC.

    Once you have setup your .DE domain name's Zone correctly, you may click the Recheck Nameserver Status button in the Order Information view to confirm the same with the .DE Registry.

  • .ES domain names use an independent Contact database in the system. Contacts for .ES domain names are listed under .ES Contact.

    The following list displays the various types of .ES Contacts listed in our system and how they are displayed in the Whois of .ES domain names:

    .ES Contact Type displayed in the System

    .ES Contact Type displayed in the Whois

    Registrant

    Registrant

    Admin

    Admin

    Technical

    Tech

    Billing

    Billing

    Contact Details addition is restricted in the following ways:

    • For Registrant Contact:

      • The Registrant Contact of a .ES domain name may either be a natural person/individual or a company.

      • You may not modify through our system any Contact Details of the Registrant Contact, of a registered .ES domain name.

        Note

        If you wish to transfer the ownership of a .ES domain name to another entity, the transfer procedure needs to be followed. Once a request has been submitted at the Registry, you need to inform our Support Team at support@webhostsg.net. This will enable us to track the request and update our database accordingly

    • For Other Contacts:

      • The Admin, Technical and Billing Contacts must be natural persons/individuals only.

      • You may not modify any Contact Details. However, you may add another .ES Contact and select the same as either the Admin, Technical or Billing Contact.

  • In case of a .JOBS domain name, the following is relevant:

    • Modifying the Registrant Contact Organization for a .JOBS domain name will necessitate re-verification.

      A fee might apply depending on the situation; instances are handled on a case by case basis by the Registry Operator for .JOBS (Employ Media LLC). Registry Operator may be contacted directly at the time of the Registrant change to find out if there is going to be any fee.

    • You may modify the additional information associated with a .JOBS domain name, from this interface.

  • In case of a .NL domain name, the following is relevant:

    • There is no Billing Contact for a .NL domain name.

    • You can not modify the Registrant Contact's Name, Company Name or Legal Form. If you wish to modify the Registrant Contact Details of your .NL domain name, you need to instead create a new Contact and assign it as the Registrant Contact.

  • Modifying any information of the Registrant Contact for a .NZ domain name will result in the change(s) being applied to all .NZ domain names using this Contact. This will also result in a new Unique Domain Authentication ID (UDAI) being generated for each affected domain name.

Author: Effendy Abdullah
Last update: 2018-07-09 04:49


Free Email Service

Using the Free Email Service

WebHostSG provides you with 2 Email Account(s) free with every domain purchase, along with POP/IMAP access. Each account comes with 100 MB space.

Activate the Email Service

  1. Login to your Client Portal. Learn How .
  2. Click on Domains.
    Client Area Domain

  3. On the right of the domain you wish to activate the Free Email, click on Manage.
    Client Area Manage Domain

  4. Click on Manage Mail Hosting.
    Manage Email Hosting

  5. Your FREE email service has now been activated. Now you can procced to add an email account. Learn How

Author: Admin
Last update: 2018-07-09 04:53


Adding an Email Account

Note

Free Email Service needs to be activated before you can manage it.

  1. Proceed to Manage Mail Hosting. Learn How
  2. Click on Create Email Accounts.
    Manage Mail Hosting Step 2
  3. Provide the following information and click Create Email Accounts:
    • Name: Provide a First Name and Last Name for the User.
    • Desired Email Address: Provide an email address you wish to assign to this user

      Example:

      For John, you may set the email address as john@yourdomainname.com.

    • Password: Provide desired password, this is optional, you can leave it blank and let the system generate.
    • Alternate Email Address: Provide an alternate email address, where the system can send important communication, such as Password reminders.
    • Language of User: This will be the language used by the system for all communications with the user.
    • Country of User: Choose the geographical location of this user.

      Manage Mail Hosting Step 3

      Once the account is created, a success page will be displayed. This page will provide details of the account that you have added, including a password that is generated for the user and server details for configuring the account in a desktop email client such as Microsoft Outlook, Mozilla Thunderbird, etc.. This information will also be automatically emailed to the Alternate Email Address you have provided.

Author: Admin
Last update: 2018-07-09 04:54


Adding an Email Forward

Note

Free Email Service needs to be activated before you can manage it.

  1. Proceed to Manage Mail Hosting. Learn How
  2. Click on Create Forwarder.
    Manage Mail Forward
  3. Provide the following details and click Create Forwarder:

    • When a mail arrives at: Provide any user such as sales, support, YourName, etc..

    • Forward to: Provide one or more destination email addresses, each on a separate line.


    Examples

    • You may have yourname@yourdomain.com forwarded to yourname@gmail.com.
    • Similarly you could have a copy of emails received at sales@yourdomain.com forwarded to several people by specifying their email addresses on separate lines.
Note

If you want to forward all emails coming to any user on your domain name, you can create a Catch-All Account by following the instructions on Adding a Catch-All Account.

Author: Admin
Last update: 2018-07-09 04:56


Adding a Catch-All Account

  1. Proceed to Manage Mail Hosting. Learn How
  2. Under the Catchall Account click the Activate button.
    Activate catchall
  3. Here you have 2 options:

    • Bounce back to the sender: Select this radio button if you do not wish to receive email on any other email address on your domain name except the ones already created and simply want to return such mails to the email sender.

    • Forward to the following User/Account: Select this radio button if you wish to forward all emails except the ones already created to another email address on this domain name itself. Mention the destination email address in the box provided.

  4. Click Apply to submit your settings.

    Examples

    • If you have set individual Email Forwards for sales and support users on yourdomain.com and want emails being sent to all other users on yourdomain.com to be bounced back to the sender, simply select the Bounce back to the sender radio button.

    • If you do not wish to create individual Forwards for each user on yourdomain.com and simply want all emails forwarded to some email address on yourdomain.com, simply select the Forward to the following User/Account radio button and specify the destination email address on yourdomain.com.

Author: Admin
Last update: 2018-07-09 04:57


SiteLock

SiteLock FAQs

Listed below are some Frequently Asked Questions for SiteLock.

What is SiteLock?

SiteLock is a cloud-based, website security solution for small businesses. It works as an early detection alarm for common online threats like malware injections, bot attacks etc. It not only protects websites from potential online threats, but also fixes vulnerabilities. Features include:

  • website scans to check for the presence of malicious code or vulnerabilities

  • automatic removal of any identified malicious code / malware

  • basic firewall

  • website reputation monitoring (check if the website is blacklisted in search engines and spam blacklists)

  • CDN to boost site speed, and hence rankings on search engines

Note

SiteLock is only meant for websites and not for a personal computer or laptop.

Why will an SSL certificate not suffice?

An SSL certificate is used only to encrypt a connection between the browser and server to safely transmit sensitive information. However, SiteLock actually protects the database where this information is stored, scans your website files and applications, protects from data breaches and spreading of viruses/malware. These functionalities are not provided by an SSL certificate.

How do I configure SiteLock for my website?

SiteLock is a cloud-based service and does not require any installation. Once provisioned for your website, it automatically starts scanning your website using the basic scans.

To use the advance features, some amount of configuration is required:

  • TrustSeal - requires minimal installation

  • SMART Scan - requires user to input FTP details in the SiteLock Panel

  • Firewall - requires addition of an A record

  • CDN - requires addition of a CNAME record

What is SiteLock badge or TrustSeal?

SiteLock badge or TrustSeal is a image that can be displayed on your website to assure users that your website is secure and malware-free. Since SiteLock performs all scans daily, the TrustSeal is update everyday to indicate that all scans have passed.

sitelock seal

Note

The badge is displayed only when no issues are found during the website scan.

What is Deep 360-Degree Site Scan?

Deep 360-Degree Site Scan checks all files susceptible to threats, including .css files, .js files, .jpg, .png and other image files and others. It performs a deep scan checking for anything that could turn into a security issue.

What different types of scan are available?

Available types of scan include:

  • Daily Malware Scan

  • Daily FTP Scanning

  • Website Application Scan

  • SQL Injection Scan

  • Cross Site Scripting (XSS) Scan

All these scans are part of the Deep 360-Degree Site Scan. The availability and frequency (daily or one-time) of these scans differ from Plan to Plan. 1

In case a site is infected, will the TrustSeal display threat notification to the visitors on site?

If a scan fails, site visitors will not be alerted to any problem. The TrustSeal will simply continue to display the last date when all scans were passed. If the site owner fails to rectify the problem, within a few days SiteLock will remove the TrustSeal from the site. The TrustSeal will never indicate that a website has failed a scan.

What is SMART?

Secure Malware Alert and Removal Tool (SMART), if enabled, performs an in-depth site scan and automatically removes malicious code from files on the site. SiteLock makes calls to the web server and replicates the website files on their secure servers and scans the contents thoroughly to identify malicious code or vulnerabilities. In the course of doing this, it can also remove the malicious code from the files, to prevent further damage.

You can choose to not allow SMART to remove any code. In that case, you will only be notified of the vulnerability identified, and you will need to manually check / remove it.

Note
  • To use this tool, you need to provide your FTP information in the SiteLock panel, along with the port number. This port number will be 21 for WebHostSG.net's Linux and Windows servers.

  • This tool uses the FTP protocol.

How will I know what changes SMART made to the website / What happens if the website breaks after SMART removed some code?

SiteLock provides a month's worth of change logs for your website. You can always restore the previous version of the page / website. You then need to manually check the highlighted code for any malicious components and remove them yourself.

What if SiteLock has incorrectly highlighted legitimate code as vulnerable / malicious?

It might be happen that certain code on the website looks vulnerable but it is still doing what you intended it to do. If so, you can use the Report a False Positive option in the SiteLock Panel and SiteLock will ignore that vulnerability moving forward.

What is the purpose of Domain Verification?

The purpose of this verification is to ensure that the user indeed owns and controls the website.

  • Domain names registered under WebHostSG.net will be automatically verified.

  • For other domain names, the verification process can be completed in one of the following ways:

    • Add DNS Records for the TrueShield setup

    • Add a meta tag to your website page

    • Upload a file to your website

    Instructions for these options are available in the SiteLock Dashboard.

What is the purpose of Business Verification?

Business verification is a service offered by SiteLock where it verifies the phone number and physical presence of a business. This is typically conducted to assure online users that a business actually exists and it is not a fly-by-night setup. This consists of:

  • Phone Verification - You need to enter your phone number in the SiteLock Panel and request a verification. Within an hour, you will receive an automated call from SiteLock and you will be provided with a 4 digit code. You then need to submit that code in the SiteLock Panel to verify your phone number.

  • Postal Address Verification - After providing your postal address in the SiteLock Panel, you will receive a letter at your postal address within 7-10 days of requesting verification. This letter will contain a 4 digit code that needs to be submitted in the SiteLock Panel to verify the physical address.

Note

If you want to display your contact information on the TrustSeal, it is necessary to verify your business details.

What is Reputation Monitoring?

SiteLock's Reputation Monitoring consists of the following components:

  • Search Engine Blacklists: SiteLock monitors if any page or link on the website is listed in the blacklists maintained by search engines or matches with their database of over 7000 known malware sites.

  • Spam Blacklists: SiteLock checks if the email server is listed as a spammer on leading blacklists so as to prevent emails from being marked as spam.

  • SSL Verification: SiteLock examines the site's SSL certificate to verify

    • Encryption strength

    • Certification Authority

    • Certificate expiry

    • Validity of name / domain name

What type of a Firewall is offered by SiteLock and how to set it up?

SiteLock offers a basic firewall to help block bot traffic which may harm the website. On logging into the SiteLock Dashboard, you can see a graph of your website's traffic which reports human visits and bot visits.

To use SiteLock's Firewall, you need to add an A record to your domain name in order to point to SiteLock's servers where the Firewall is installed. This way, all traffic coming to the website is routed through the Firewall.

How is traffic routed back to the website after going through the Firewall?

You are required to specify the IP address of your website in the SiteLock Panel so that after routing your traffic through the Firewall, SiteLock can divert it back to your website.

Can I configure the Firewall?

The Firewall is pre-configured, and no options are available within the SiteLock Panel to manage it. However, in the higher end Plans, users can configure certain aspects of the Firewall.

Will SiteLock's Firewall block bots of search engines also?

Search engines use spiders to crawl and index websites. SiteLock's Firewall can distinguish good bots from bad bots and hence will not block search engines from indexing the site.

What is a Content Delivery Network (CDN) ?

A Content Delivery Network is a set of servers, spread across the world that cache your website. When a user requests your website, the server closest to the user's location will serve those requests. This in turn serves the website faster, thus speeding up its performance.

Note

Faster load times not only improve user experience but also contribute to better website ranking, as search engines take load time into account while ranking a website.

How can I set up CDN for my website?

You need to add a CNAME record to a sub-domain (www.mysite.com) to redirect to SiteLock's CDN.

Note

A CNAME record should always be added to a sub-domain and not the primary domain, as it might clash with an MX record set up on the primary domain, thus hampering the email.

Does SiteLock send any alerts to the Customer or the domain name owner?

No. All notifications are sent from our system with your branding.

What products is SiteLock compatible with?

SiteLock is compatible with all types of hosting purchased either from WebHostSG.net or elsewhere.

Can I use a single SiteLock Order for multiple domain names?

No. A single SiteLock Order can be used for only a single domain name. Hence, separate SiteLock Orders need to purchased for domain names individually. However, all SiteLock Orders belonging to the same user can be managed from a single SiteLock Panel.

Can the SiteLock Panel be accessed directly through a URL?

There is no way to access the SiteLock Panel directly through any URL. It can only be accessed from the SiteLock Management page from within the Reseller / Customer Control Panel.

Is there a Money Back Guarantee for SiteLock Orders?

We are not offering any Money Back Guarantee for SiteLock Orders.

How can the SiteLock Order be upgraded or downgraded?

You can upgrade or downgrade your SiteLock in WebHostSG Client Portal

What steps need to taken on receiving a threat alert?

On receiving a threat alert, login to the SiteLock Panel and view the details of the threat. Then, you may:

    • contact the website developer to fix the affected code;

    • use SMART for auto-removal of the malware;

    • check if all the applications and scripts are up to date. Judiciously use the third-party plug-ins and disable them, wherever possible.

I recently signed up for SiteLock and noticed that I am getting some empty submissions from some of the forms on my web site (Contact us, etc.)

SiteLock probes your site to determine if fields and forms on your site are vulnerable to attempts by hackers looking to exploit these forms to gain access to your data. This will result in attempts to submit forms on your website with encoded data.

If you wish to stop receiving these e-mails or entries, you may want to do some validation on the fields within your form to ensure that data is being submitted in the correct formats before triggering e-mails or database inputs. Since SiteLock inserts data that would not likely be valid for any fields on your site, these validation measures should stop you from getting these empty e- mails or entries. It is also a good coding and security practice to make sure your website visitors are providing the correct data in the expected formats.

Author: Admin
Last update: 2018-07-09 04:58


Accessing your SiteLock

SiteLock Panel is an interface that allows you to access and manage your SiteLock Package (manage websites, initiate scans, view reports, etc.). You can access the SiteLock Panel as below:

  1. Login to your Client Portal. Learn How

  2. If you have subscribed to SiteLock, you will see the SiteLock Service on the Client Area Homepage. Click on Manage.
    Manage SiteLock

  3. A new window will open and you will presented with the SiteLock Website.
    SiteLock Main Page

Author: Admin
Last update: 2018-07-09 05:09


CodeGuard

Accessing your CodeGuard

 

From the CodeGuard dashboard, you can access and manage your CodeGuard account (view backups of your website/database, restore from older backups, etc.). You can access the CodeGuard dashboard as explained below:

  1. Login to your Client Portal. Learn How

  2. Click on Services.
    Client Area Services
  3. Under the CodeGuard Management Dashboard, click Manage CodeGuard

    CodeGuard Management

Author: Admin
Last update: 2018-07-09 05:11


CodeGuard Getting Started Guide

This article explains how to get started using CodeGuard to backup and restore your website / database data.

Adding a website to your CodeGuard account

  1. Access CodeGuard from your Client Portal. Learn How

  2. Under the CodeGuard Management Dashboard, click Manage CodeGuard to visit the CodeGuard dashboard

  3. You will be required to add your website FTP details, if you are logging in to the CodeGuard dashboard for the first time. If you have the FTP details, proceed to step 4 directly.

    If the FTP details are not available, you can fetch them for an existing FTP user. This process is explained below for a couple of commonly used hosting control panels:

    • cPanel:

      1. In the cPanel control panel, click the FTP Accounts link under the Files section.

        cpanel ftp

      2. Under the FTP Accounts section, click the Change Password link for an existing FTP user.

        In case of WebHostSG.net's Linux servers, you must use the default FTP user that comes with your cPanel account. You cannot connect to CodeGuard using any other FTP user.

        Create FTP Step 2

      3. Modify the password for the FTP user.

        Change FTP Password

      4. In the cPanel control panel, look out for the IP address under the Stats section.

        cpanel IP address

    • Plesk:

      1. In the Plesk control panel, click the FTP Access link.

        Plesk FTP

      2. Under the FTP accounts section, click the FTP user link for an existing FTP user.

        Plesk FTP user

      3. Modify the password for the FTP user.

        Plesk Change FTP Password

        Here, note down the IP address of the server listed in the IP Addresses field.

    Note

    The process of FTP user management varies for different hosting providers. You need to consult their support team or documentation for more specific instructions.

  4. Provide your website FTP details.

    If your website is hosted on WebHostSG.net's Linux servers use the SFTP option and for WebHostSG.net's Windows servers, use the FTP option.

    CodeGuard Home Page

    Note

    In case of other hosting providers, you can choose either the FTP or SFTP option, based on your service provider's settings.

    If the FTP port for your website is different, you can specify it using the Using a different port? link.

    Click the TEST WEBSITE CONNECTION button to check server connectivity.

  5. On a successful connection, you will see the screen shown below.

    CodeGuard Page2

    Click the CONNECT YOUR WEBSITE button to proceed.

  6. Select the files you want to backup and click the CAPTURE CODE button.

    CodeGuard Page 3

  7. Once the backup process starts, you can view its progress. You will see the screen displayed below, once the backup process is completed.

    CodeGuard Page 4

Adding a database to your CodeGuard account

  1. Visit the CodeGuard dashboard, as explained above in the process for adding a website. Click on any website link to view the website specific details.

    CodeGuard Page 5

  2. Click on the DATABASES tab.

    CodeGuard Page 6

  3. In the next screen shown below, click the ADD DATABASE button.

    CodeGuard Page 7

  4. During the initial addition of a database to CodeGuard, you can test the server connectivity by providing the database hostname or the IP address.

    You can locate the IP address of the database server as mentioned below:

    • cPanel: In the cPanel control panel, look out for the IP address under the Stats section.

      cPanel Ip Address

    • Plesk: In the Plesk control panel, click on the Databases link.

      In the next screen, locate the IP address under the Database server column.

      Plesk Database

    Note

    The process of database management varies for different hosting providers. You need to consult their support team or documentation for more specific instructions.

  5. Click on the TEST CONNECTION button.

  6. You will be required to add your database details. If you have them, proceed to step 7 directly.

    If the database details are not available, you can fetch them for an existing database.

    This process is explained below for a couple of commonly used hosting control panels:

    • cPanel:

      1. In the cPanel control panel, click the MySQL Databases link under the Databases section.

        cPanel mysql

      2. Under the Current Users section, click the database user link for an existing user.

        cpanel mysql user

      3. Modify the password for the database user.

        database password change

    • Plesk:

      1. In the Plesk control panel, click the Databases link.

        Plesk panel

      2. Here, you can view a list of existing databases. Click the Users tab.

        plesk database

      3. You can now view a list of existing databases users. Click on the user link.

        plesk database user

      4. Modify the password for the database user.

        plesk modify db password

  7. On a successful connection, you will see the screen shown below. Enter your database details.

    codeguard add db

    Before you proceed, for direct MySQL connection, ensure that the IP addresses listed below are whitelisted in your hosting control panel:

    • 184.72.217.230

    • 184.72.217.227

    • 184.72.219.00

    • 54.236.233.28

    • 54.236.233.46

    • 54.235.150.113

    Listed below is the process for whitelisting IP addresses in cPanel:

    1. In the cPanel control panel, click the Remote MySQL link under the Databases section.

      cpanel remote mysql

    2. Add the IP addresses to the Access Hosts list individually.

      remote access host

    If SSH has been enabled for your hosting account, you can connect to the database over SSH. Here, choose the Tunnel over SSH option.

    In case of WebHostSG.net's servers, only the Connect to MySQL directly option is supported.

    codeguard database

    Click on the NEXT STEP button to proceed.

  8. Select the database to be added and click on the ADD DATABASE button. CodeGuard will then start an initial backup process.

    codeguard add new db

  9. Once the backup process starts, you can view its progress. You will see the screen displayed below, once the backup process is completed.

    codeguard backing up

This completes the process of adding a website and a database to your CodeGuard account. CodeGuard will now regularly check your website and database and will take a backup if any changes are detected.

View backups taken by CodeGuard

  1. In the CodeGuard dashboard, click on the website or the database link under MY SITES.

    codeguard summary

  2. In the website / database specifc view that follows, click on the VIEW ALL link to view the backup history interface:

    codeguard stats

    cg database page

    Note
    • The automatic backup schedule depends on the CodeGuard plan that you have purchased.

    • If your plan supports it, you can initiate an instant backup process by clicking the RUN BACKUP NOW button.

  3. Click on the VIEW DETAILS link corresponding to any backup to view the backup details:

    cg view details

    cg db details

    cg backup time

  4. If required, you can delete a website or database through the Delete option under the ACTION menu, corresponding to the website or database.

    cg daily backup

    cg summary

Restore your data from a backup

  1. In the CodeGuard dashboard, click on the RESTORE tab to bring up the Restore interface:

    codeguard restore

  2. You can perform an automated test restore on your website to find out if CodeGuard can successfully write to your website, by clicking the START TEST RESTORE button.

    cg restore 2

    The automated test restore is optional. If you want, you can skip it and move to the 5th step.

  3. You will see the message shown below once the test restore process is completed. Click on the VIEW TEST RESTORE RESULTS button to view the result.

    cg restore complete

  4. Click on the Close Window button to proceed.

    cg complete page

  5. Click on the RESTORE OPTIONS button to view the restore options:

    cg restore page

  6. Here, you may choose one of the following restore options:

    cg download zip

    cg restore db

    • Manual Restore: Perform a manual restore yourself by requesting a zip file of a backup & manually replacing files on your site

       

    • Full website restore: CodeGuard will automatically restore your website by replacing all of your current content with content from a backup

       

    • Individual File Restore (applicable only for website restore): Specify a file to be restored and CodeGuard will restore that file from a backup

       

  7. Select one of the last two restore options to initiate the restore process. Once the backup process starts, you can view its progress. You will see the screen displayed below, once the backup process is completed.

    progress tracker

Backup Issues

  1. In the CodeGuard dashboard, click on the ISSUES tab to bring up the Backup Issues interface:

    cg issues

  2. Click on the issue link to view the details:

    cg backup issues

Author: Admin
Last update: 2018-07-09 05:28


CodeGuard FAQs

 

Listed below are some Frequently Asked Questions for CodeGuard.

What is CodeGuard?

CodeGuard is a service that provides an automatic website / database backup solution. It monitors your website / database regularly. If any changes are detected, it will notify you about the changes and backup your website / database. It also allows you to restore your website / database to a previous version.

How does CodeGuard connect to my website?

If your website is hosted on WebHostSG.net's Linux servers, use the SFTP option. Also, you must use the default FTP user that comes with your cPanel account. You cannot connect to CodeGuard using any other FTP user. For WebHostSG.net's Windows servers, use the FTP option.

In case of other hosting providers, you can choose either the FTP or SFTP option, based on your service provider's settings.

Wouldn't the hosting provider's backup suffice?

Hosting companies tend to keep your backups in the same place as your primary files. In case of any eventuality, along with your primary files, your backups too will be affected. CodeGuard provides safe, offsite backup that is 100% independent from your hosting provider.

Moreover, hosting companies provide you only the latest backup. CodeGuard follows a versioning system and allows you to restore a backup of an earlier date as well.

After I add a website, how do I change what files are backed up?

After you add a website, any new files or directories that you add to your site will automatically backed up. CodeGuard will only exclude files and directories that you don't select when adding your website. If you need to change how your website is backed up, you need to delete and re-add your website. However, this should be handled with care as you will lose your backups. This option is only recommended if you have just added your website.

What types of database are supported for backup?

CodeGuard only supports MySQL database.

What database user permissions are needed to backup and restore?

The database user that you specify in CodeGuard must have the appropriate permissions granted. It is recommended that the user has the permissions for both backup and restore actions:

  • Backup

    • Select

    • Show View

    • Show Databases

  • Restore

    • Select

    • Update

    • Insert

    • Delete

    • Drop

    • Create

    • Alter

    • Index

How does CodeGuard store data? Is it encrypted?

CodeGuard uses Amazon Web Service’s Simple Storage Service (S3) to house website and database backup data. All customer backup data is encrypted using an AES-256 bit key.

What is the privacy policy with regards to data captured by CodeGuard?

CodeGuard's privacy policy can be located here.

How long are the backups stored in the CodeGuard account?

By default, only 90 days of backups are stored. You can choose to retain all backups, from the Backup Retention Settings section in the ACCOUNT SETTINGS view. You can navigate to this view through the SETTINGS -> ACCOUNT menu, within your CodeGuard account.

Author: Admin
Last update: 2018-05-30 14:20


SSL Certificates

What is an SSL Certificate?

SSL, which stands for Secure Sockets Layer, is a cyber-security protocol that digitally encrypts information sent from a browser to a server. SSL certificates are used to protect sensitive information like credit card numbers, usernames, passwords, email addresses, and more.

A website with an SSL certificate is identified using a number of trust indicators, like "https" and the padlock icon in the browser bar, a site seal from a reputable Certificate Authority (CA), and a green bar that wraps around the URL on more premium certificates.

You can view a website's SSL Certificate by clicking on the lock icon in the address bar of a browser.

Types of SSL Certificates.

WebHostSG.net offers the following types of certificates:

  • Domain Validated (DV) SSL Certificate
  • Organization Validated (OV) SSL Certificate
  • Extended Validation (EV) SSL Certificate

Author: Admin
Last update: 2018-05-30 14:22


How do I apply for an SSL Certificate?

After you purchase an SSL Certificate order, you will need to first complete a verification process with the Certificate Authority in order to get your final Certificate. Follow the steps below to apply for your certificate.

Apply for an SSL Certificate

Step 1: Access your Products/Services. Learn How

Step 2: Click on the SSL Cert that you purchased

Step 3: In the Product Details page click Generate Now.

Step 4: Submit your certificate application.

  • In the Configure SSL Page, under Select Your Web Server select cPanel/WHM.
  • Enter your CSR, under Input Your CSR: . (If you don't know what a CSR is, instructions to generate a CSR can be found here)
  • Scroll down and check through your Technical Contact Information and Administrative Contact Information are correct
  • Once you have verified the contact infos, click Click to Continue.

 

On the next page, a list of approved email addresses will be displayed. Select one and click on Send application to Certificate Authority.

 

Once done, you should soon receive a verification email from the Certificate Authority. Follow the instructions in the email to get your SSL Certificate issued.

Important

  • Ensure that Privacy Protection is disabled for the Domain Name.
  • An SSL Certificate will not be issued to a national or resident of the following countries:
    • Afghanistan
    • Belarus
    • Côte d'Ivoire
    • Eritrea
    • Guinea
    • Iraq
    • Liberia
    • Myanmar
    • Rwanda
    • Sierra Leone
    • South Sudan
    • Zimbabwe
    • Iran
    • Sudan
    • North Korea
    • Syria
    • or any other country where such use is prohibited under United States export regulations.
  • An SSL Certificate will also not be issued to anyone on the United States Treasury Department's list of Specially Designated Nationals or the United States Commerce Department's Table of Denial Orders.

Author: Admin
Last update: 2018-05-30 15:04


How do I generate a Certificate Signing Request (CSR)?

CSR Generation: cPanel 11


cPanel's SSL/TLS functions are handled by the SSL/TLS Manager module. This area will allow you to generate: SSL certificates, signing requests, and keys. These are all critical parts of using SSL to secure your website.

The first step in generating an SSL certificate is to create a Private Key. Start by reading the instructions in the Private Keys (KEY) section below.


Step 1: Private Keys (KEY)

    1. Click on the Generate, view, upload, or delete your private keys

 

    1. When the page loads, scroll to the bottom and you will see the Generate a New Key section. Enter the domain you want to create an SSL Certificate in the Host text box or you can select the domain from the Select a Domain drop down menu. Select the key bit-length. We recommend 2048 (2048 is required for EV certificates)

 

    1. Click on the Generate button.

 

    1. Click on Return to SSL Manager.

 

    1. When the page loads, click on the Go Back link. This will take you to the main SSL/TLS Manager page.



Step 2: Certificate Signing Requests (CSR)

    1. Click on Generate, view, or delete SSL certificate signing requests

 

    1. When the page loads, set the following:

      • Host - Select the domain name from the drop down menu.
      • Country - Enter your two-digit country code.
      • State - Enter your two-digit state abbreviation.
      • City - Enter your city's name.
      • Company Division - Enter your company's division.
      • Email - Enter your email address.
      • Pass Phrase - Enter any phrase you want to use for the pass phrase.

 

    1. Click on the Generate button. (You will now be e-mailed a copy of your CSR.)

 

    1. Click on Go Back


Congratulations you now have a CSR and Private Key ready to use.

Author: Admin
Last update: 2018-05-30 15:06


G Suite (formerly Google Apps for Work)

Getting Started with G Suite

G Suite is a suite of business collaboration tools that include Email, Google Docs, Google Calendar, Google Hangouts and more.

Once you purchase G Suite, everyone in your organization will get:

  • A custom email address at your domain name (user@yourdomain.com)

  • Tools for word processing

  • Spreadsheets and presentations

  • A shared calendaring system

  • Video calling and conferencing

  • Group chats

  • Group emails

  • Cloud Storage space

  • And much more!

In order to get started with G Suite you will need to follow the steps below:

Step 1: Create an admin account.

An admin account allows you to perform administrative tasks, such as add new users, manage security settings, and turn on Google services you want your team to access. You can create an admin account by following the steps below:

  1. Login to your Client Portal. Learn How

  2. Click on Services.

  3. Locate and click G Suite. Next under the Service Management Dashboard, click on Google Apps Admin Console.

  4. Fill in the required fields and click on Setup Admin Account.

Step 2: Verify your Domain Name.

Before your organization can use Google services like Gmail with your company's domain, you'll need to verify that you own it. This ensures that no one else can use services or send email that appears to come from your company.

In order to verify your domain you need to log in to your G Suite account and click on the Verify button as shown in the figure below:

Verify_google-apps.png

Once clicked, you will be presented with the following methods to verify your Domain Name.

If you have configured your DNS with us then you can follow the instructions in our DNS guide to add your TXT records. Similarly to upload or edit your files on our hosting servers you can use the an FTP client as documented in the guide.

Step 3: Create user accounts.

Before people in your organization can begin using Google services, you will need to create an account for them. You have a number of options for adding users, which you can learn about from the guide here.

Author: Admin
Last update: 2018-05-30 15:08


Hosting » Linux Shared Hosting

Accessing your cPanel on Singapore Web Hosting

There are 3 methods by which you can manage your cPanel Singapore Web Hosting package with WebHostSG:

Managing through Client Portal

Note

This method is recommended if you yourself are managing your Hosting package.

  1. Login to your Client Portal. Learn How

  2. Click the Services.


  3. Click on the service you wish to manage.


  4. Click on Login to cPanel.

Modifying the Password of your cPanel Interface.

  1. Follow Steps 1-3 as shown above.

  2. Next click on Change Password

  3. Enter a New Password of your choice and re-enter again in the Confirm New Password to confirm and click Save Changes.

Note

Please note that changing your password here will also change your Client Portal Password

Managing your Hosting Package through an IP Address

Note

This method is typically recommended if you wish to delegate managing your Hosting package to a Web Designer and have not yet modified your domain name's Name Servers to the ones recommended by WebHostSG.net.

Alternatively, you may only provide FTP access to your Web Designer by creating another FTP User for them.

Retrieving the IP Address and Login Credentials of your Hosting Package

  1. Refer to the New Account Information email sent to you when you signed up for the package.

  2. The Login Details, and IP Address are indicated as shown below:


  3. Alternatively you could retrieve your IP from your Client Portal under Product Details.

Managing your Hosting Package through your Domain Name

Note

This method of accessing the Linux Hosting package is very similar to the one above and is also recommended when providing access to your Web Designer. The only difference between the two methods is that, for this to work you should have already modified your domain name's Name Servers to WebHostSG.net's.

Alternatively, you may only provide FTP access to your Web Designer by creating another FTP User for them.

Retrieving the Login Credentials of your Hosting Package

  1. Refer to the New Account Information email sent to you when you signed up for the package. Note the URL under cPanel Login for SSL, as shown below.

Author: Admin
Last update: 2018-05-30 15:09


SSL Certificates » General SSL Knowledge

What is a Domain Validated (DV) SSL Certificate?

A Domain Validated (DV) SSL certificate is a quick and easy way to secure a domain, as the Certificate Authority (CA) issuing the certificate only requires verification that the recipient actually owns the domain they wish to cover.

This verification process can typically be completed in a matter of minutes. However, these certificates offer little in the way of SSL recognition, so they are recommended for websites where visitor trust is not of high importance and information like usernames, passwords, or credit card information is not required.

Author: Admin
Last update: 2018-05-30 15:11


What is an Organization Validated (OV) SSL Certificate?

An Organization Validated (OV) SSL certificate requires that a business complete a light vetting process by the Certificate Authority before being issued.

These certificates are a nice middle-ground between DV and EV certificates, as they aren't as expensive as EV options but still offer more SSL and trust indications than basic DV options. These certificates typically take between 2-3 days to be issued.

Author: Admin
Last update: 2018-05-30 15:11


What is an Extended Validation (EV) SSL Certificate?

EV stands for Extended Validation and is the most premium type of SSL certificate available. These certificates are identified on websites mainly by the green address bar, the most universally recognized symbol of trust on the web.

EV certificates are becoming more and more commonplace in the industry, especially amongst ecommerce sites, as they are used by some of the most trusted sites in the world like Bank of America, Twitter, Paypal, and more. These certificates require that a company complete a thorough vetting process before being issued.

Author: Admin
Last update: 2018-05-30 15:12


How can I get a Green Address Bar for my website?

The only way to get the green address bar on your website is with an Extended Validation (EV) certificate. These are the only type of SSL certificate that come with the green address bar.

Author: Admin
Last update: 2018-05-30 15:13


Can I qualify for an EV certificate?

The main criteria for qualifier for an EV certificate would be that your business is an official company registered with a government authority. Also, if you're a Sole Proprietor or a Partnership registered in the U.K., you cannot qualify for any EV SSL certificate.

Author: Admin
Last update: 2018-05-30 15:14


What certificates offer www and non-www coverage?

GeoTrust and RapidSSL both offer coverage for www and non-www. As long as the certificate is generated with www as the common name, the non-www version will automatically be covered.

This is not the case, however, for Symantec and Thawte certificates. You will to purchase separate certificates to cover both the www and non-www common name for either of those brands. Comodo certificates also automatically cover www and non-www.

Author: Admin
Last update: 2018-05-30 15:19


What is a Wildcard SSL certificate?

Wildcard SSL certificates can cover one main domain name (www.domain.com) and an unlimited amount of subdomains (mail.domain.com, login.domain.com, test.domain.com, etc.).

Author: Admin
Last update: 2018-05-30 15:20


What is a Multi-domain or SAN certificate?

Multi-domain or SAN (Secure Alternate Name) SSL certificates can cover multiple domain names on just one certificate. For example, Symantec and Thawte multi-domain certificates can cover up to 25 domains, whereas Comodo certificates can cover up to 100 domains with just a single SSL certificate. GeoTrust multi-domain certificates can cover anywhere from 25 to 100 domains, depending on the type of certificate you order.

Author: Admin
Last update: 2018-05-30 15:21


What is the difference between Wildcard and SAN/Multi-Domain functionality?

Wildcard SSL certificates can cover one main domain (www.domain.com) and an unlimited amount of subdomains (mail.domain.com, login.domain.com, test.domain.com, etc.). Multi-domain (SAN) SSL certificates can cover multiple domains on just one certificate.

For example, Symantec and Thawte multi-domain certificates can cover up to 25 domains, whereas Comodo certificates can cover up to 100 domains with just a single SSL certificate. GeoTrust multi-domain certificates can cover anywhere from 25 to 100 domains, depending on the type of certificate you order.

Author: Admin
Last update: 2017-07-23 14:32


What is the difference between 1024- and 2048-bit key lengths?

These key lengths refer to the strength of the private key. You can think of it as the size of the cypher being used to encode your messages. Obviously, 2048-bit private keys are exponentially more secure than 1024-bit ones and are the new standard across the industry and are required during the generation process.

Author: Admin
Last update: 2017-07-23 14:34


What is the difference between SHA-1 and SHA-2?

SHA stands for Signature Hashing Algorithm. It's a mathematical hash that proves the authenticity of the certificate. SHA-1 is an older version of the algorithm that is no longer seen as secure by industry experts and major browsers and is not allowed to be used during the generation process any longer by the industry.

SHA-2 is the latest version that is widely accepted and viewed as secure by all major browsers and industry experts. The hashing algorithm of your CSR has no relevance to what hashing algorithm is used on the certificate.

Author: Admin
Last update: 2017-07-23 14:35


I'm a Sole Proprietor, can I still qualify for an OV/EV certificate?

Sole Proprietors outside of the U.K. can qualify for both OV and EV certificates. However, Sole Proprietors located in the United Kingdom or UK Partnerships cannot qualify for EV certificates, but are eligible for OV certificates, with additional documentation required.

Author: Admin
Last update: 2017-07-23 14:35


Which SSL brands are most trusted & secure?

All of the Certificate Authorities (CAs) that we carry are leaders in the industry and trusted across the world. Symantec is the largest CA in the world, and their Norton Trust Seal is the most recognized symbol of trust across the web. Their name definitely adds the most value of any CA in the industry. Additionally, GeoTrust, Thawte, RapidSSL, Certum, and Comodo are all trusted and secure CAs.

Author: Admin
Last update: 2017-07-23 14:36


What is the SSL certificate warranty?

An SSL certificate warranty covers any damages that you may incur as a result of a data breach or hack that was caused due to a flaw in the certificate. The warranties range in value, which means that the higher value certificates come with more extensive warranties.

Author: Admin
Last update: 2017-07-23 14:37


How many domains can I secure with a Multi-Domain SSL Certificate?

This largely depends on the type of Multi-Domain SSL certificate that you purchase. Comodo Multi-Domain certificates can cover up to 100 additional domains. Symantec and Thawte certificates can cover up to 25 additional domains. GeoTrust Multi-Domain certificates can cover anywhere between 25-100 additional domains, depending on the certificate.

Author: Admin
Last update: 2017-07-23 14:39


What is a UC Certificate (UCC)?

UC stands for Unified Communications and is a newer type of SSL certificate that is designed and primarily used for securing Microsoft Exchange 2007 and Microsoft Office Communications Server 2007 products. The main difference between a UCC SSL and a standard Multi-Domain certificate is that a UCC can secure both internal network names and external domain names as well.

Author: Admin
Last update: 2017-07-23 14:39


What is Multi Domain Wildcard SSL?

A Multi-Domain Wildcard SSL certificate can secure multiple domains and all of their associated subdomains. Basically, this certificate combines multiple wildcard domains into one certificate.

Author: Admin
Last update: 2017-07-23 14:40


SSL Certificates » CSR Generation for SSL Certificates

Amazon Web Services (AWS)

How to Generate a CSR for AWS Services

To learn more about CSRs and the importance of your private key, reference our Certificate Signing Request (CSR) Overview article. If you already generated the CSR and received your trusted SSL certificate and need help with installation, reference our SSL Installation Instructions.

1. OpenSSL

For Amazon Web Services, we recommend generating your CSR via OpenSSL, which is a widely used software for SSL services. Please view our CSR Generation Instructions in OpenSSL support article for detailed instructions on how to complete this step.

2. Reference Amazon’s Documentation

Because Amazon Web Services involves a variety of web hosting services, we recommend consulting Amazon’s documentation to fully understand generating/uploading/configuring SSL on their various platforms. Because every AWS user takes advantage of different services and configurations, there will be no one-size-fits-all solution.

3. Validate & install

After you have received your CSR, and have enrolled your order, your certificate will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed to the next step using our SSL Installation Instructions for Amazon Web Services.

Author: Admin
Last update: 2018-06-12 14:04


Apache Open SSL

How to Generate a CSR for Apache Web Server Using OpenSSL

The following instructions will guide you through the CSR generation process on Apache OpenSSL. To learn more about CSRs and the importance of your private key, reference our Overview of Certificate Signing Request article. If you already generated the CSR and received your trusted SSL certificate, reference our SSL Installation Instructions and disregard the steps below.

1. Log In

Log in to your server’s terminal via Secure Shell (SSH).

2. Run CSR Generation Command

Generate a private key and CSR by running the following command:
Here is the plain text version to copy and paste into your terminal:

openssl req -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr

Note: Replace “server” with the domain name you intend to secure.

3. Enter your Information

Enter the following CSR details when prompted:

  1. Common Name: The FQDN (fully-qualified domain name) you want to secure with the certificate such as www.google.com, secure.website.org, *.domain.net, etc.
  2. Organization: The full legal name of your organization including the corporate identifier.
  3. Organization Unit (OU): Your department such as ‘Information Technology’ or ‘Website Security.’
  4. City or Locality: The locality or city where your organization is legally incorporated. Do not abbreviate.
  5. State or Province: The state or province where your organization is legally incorporated. Do not abbreviate.
  6. Country: The official two-letter country code (i.e. US, CH) where your organization is legally incorporated.

Note: You are not required to enter a password or passphrase. This optional field is for applying additional security to your key pair.

4. Copy the CSR text from the file

Locate and open the newly created CSR in a text editor such as Notepad and copy all the text including:

-----BEGIN CERTIFICATE REQUEST-----
And
-----END CERTIFICATE REQUEST-----


Note 1: Your CSR should be saved in the same user directory that you SSH into unless otherwise specified by you. Note 2: We recommend saving or backing up your newly generate “.key” file as this will be required later during the installation process.

5. Generate the order

Return to the Generation Form on our website and paste the entire CSR into the blank text box and continue with completing the generation process.

Upon generating your CSR, your order will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation depending on the certificate purchased. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed with the next step using our SSL Installation Instructions for Apache OpenSSL.

Author: Admin
Last update: 2018-05-29 19:52


Citrix Secure Gateway

How to Generate a CSR for Citrix Secure Gateway

The following instructions will guide you through the CSR generation process on Citrix Secure Gateway. To learn more about CSRs and the importance of your private key, reference our Overview of Certificate Signing Request article. If you already generated the CSR and received your trusted SSL certificate, reference our SSL Installation Instructions and disregard the steps below.

1. Determine what version of Microsoft IIS you are running

This is where the CSR generation process will take place. Please reference the table below if you do not know what version of IIS you are running.

Your Operating System IIS Version
Windows Server 2003 6
Windows Vista and Windows Server 2008 7
Windows 7 and Windows Server 2008 R2 7.5
Windows 8 and Windows Server 2012 8

Source: https://support.microsoft.com/en-us/kb/224609

2. Select IIS CSR Generation Instructions

Upon determining what version of IIS you are running, select the appropriate set of CSR Generation instructions below:

Microsoft IIS 6.x

Microsoft IIS 7.x

Microsoft IIS 8.x

Upon generating the CSR, your order will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation depending on the certificate purchased. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed with the next step using our SSL Installation Instructions for Citrix Secure Gateway.

Author: Admin
Last update: 2018-06-11 22:01


cPanel 11.x

How to Generate a CSR for cPanel 11.x

The following instructions will guide you through the CSR generation process on cPanel (Paper-Lantern Theme Modern). To learn more about CSRs and the importance of your private key, reference our Overview of Certificate Signing Request article. If you already generated the CSR and received your trusted SSL certificate, reference our SSL Installation Instructions and disregard the steps below.

1. Log In

Log in to cPanel, this can typically be accessed by going to https://domain.com:2083.

Note: You may encounter error message “Your connection is not private” or something similar when attempting to visit your cPanel login page. This is caused du

Enter your Username/Password and click Log in.

2. Navigate to cPanel Home

View your cPanel Home page.

Note: Older versions such as X3 Theme-Classic may not look like the image above, but should still contain the same concept and category structure.

3. Navigate to the SSL/TLS Manager

Navigate to the SSL/TLS Manager page by scrolling down to the Security section and select the SSL/TLS button.

Note: You can also navigate to the SSL/TLS Manager page by utilizing the Search Feature at the top right of the cPanel home page and searching “SSL”.

Your SSL/TLS Manager page will allow you to manage everything related to SSL/TLS configuration for cPanel.

4. Select Generate view, upload, or delete SSL certificate signing requests.

Fill out the Request Form and click Create.

Note 1: By default, cPanel will automatically generate the corresponding private key if “Generate a new 2,048 bit key” is selected as the Key option. If you already have a private key created that you wish to use, select the Key dropdown and select the appropriate option.

Note 2: cPanel does not require a passphrase for your CSR, but does recommend inputting a description such as “CSR for www.google.com 9/13/2016” that helps distinguish this CSR going forward.

Note 3: To avoid common mistakes when filling out your CSR details, reference our Overview of Certificate Signing Request article.

5. Generate the order

Congratulations, you have created a CSR and automatically saved it in your user directory.

Click into the Encoded Certificate Signing Request text box that’s presented after generation, and copy all of the text including:

-----BEGIN CERTIFICATE REQUEST-----
And
-----END CERTIFICATE REQUEST-----

Return to the Generation Form back on our website and paste the entire CSR into the blank text box and continue with completing the generation process.

Upon generating your CSR, your order will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation depending on the certificate purchased. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed with the next step using our SSL Installation Instructions for cPanel (Paper-Lantern Theme Modern).

Author: Admin
Last update: 2018-06-11 22:02


Microsoft IIS 5 & 6

How to Generate a CSR for Microsoft IIS 5 & 6

The following instructions will guide you through the CSR generation process on Microsoft IIS 5 & 6. To learn more about CSRs and the importance of your private key, reference our Overview of Certificate Signing Request article. If you already generated the CSR and received your trusted SSL certificate, reference our SSL Installation Instructions and disregard the steps below.

1. Open Internet Information Services (IIS) Manager

Click Start, Control Panel, Administrative Tools, and then select Internet Information Services (IIS) Manager.

2. Navigate to Website Properties

In the left menu, click + next to your local computer and then Web Sites.

Right-click the website (i.e. Default Web Site) that you want to protect and click Properties.

3. In Directory Security, select Server Certificates

In the Default Web Site Properties window, select the Directory Security tab, click Server Certificate…, and then Next.

4. Select Create a New Certificate

Then click Next.

Note: For renewing an existing SSL Certificate, select “Renew, Remove, or Replace your certificate” and skip to Step 7.

5. Select Prepare request now, but send it later

Then click Next.

6. Enter a Friendly Name

Enter a friendly name for your certificate, select a Bit Length of 2048, and click Next, without checking the boxes.

Note: Please name the certificate something you can easily recognize in the future. This will only be an internal reference name and will not be part of your SSL certificate.

7. Follow the wizard to enter in your organization and website information

Enter your legally incorporated Organization Name and Organizational Unit such as “IT Security” and click Next.

Enter your Common Name which will be the FQDN (fully qualified domain name) on your SSL certificate.

Note: For Wildcard Certificates, you must add the asterisk symbol in the left furthest sub-domain (i.e. *.domainname.com) which is what enables an unlimited number of coverage at that specific level.

Select the Geographic Location for your company and click Next.

8. Save the CSR

Click Browse to specify the location where you want to save the CSR as a “.txt” file and click Next.

9. Finish

Review the Request File Summary and if changes are required, click Finish.

10. Generate the Order

Locate and open the newly created CSR from the specified location you choose in a text editor such as Notepad and copy all the text including:

-----BEGIN CERTIFICATE REQUEST-----
And
-----END CERTIFICATE REQUEST-----

Return to the Generation Form on our website and paste the entire CSR into the blank text box and continue with completing the generation process.

Upon generating your CSR, your order will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation depending on the certificate purchased. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed with the next step using our SSL Installation Instructions for Microsoft IIS 5 & 6.

Author: Admin
Last update: 2018-06-11 22:03


Microsoft IIS 7

How to Generate a CSR for Microsoft IIS 7

The following instructions will guide you through the CSR generation process on Microsoft IIS 7. To learn more about CSRs and the importance of your private key, reference our Overview of Certificate Signing Request article. If you already generated the CSR and received your trusted SSL certificate, reference our SSL Installation Instructions and disregard the steps below.

1. Open Internet Information Services (IIS) Manager

Click Start, Control Panel, Administrative Tools, and then select Internet Information Services (IIS) Manager.

2. Select the server where you want to generate the certificate

In the left Connections menu, select the server name (host) where you want to generate the request.

3. Navigate to Server Certificates

In the center menu, click the Server Certificates icon under the Security section near the bottom.

4. Select Create a New Certificate

In the right Actions menu, click Create Certificate Request.

5. Enter your CSR details

In the Distinguished Name Properties window, enter in the required CSR details and then click Next.

Note: To avoid common mistakes when filling out your CSR details, reference our Overview of Certificate Signing Request article.

6. Select a cryptographic service provider and bit length

In the Cryptographic Service Provider Properties window, select Microsoft RSA SChannel Cryptographic Provider and Bit Length of 2048, then click Next.

Note: Bit Length: 2048 is the current industry standard. You may choose a larger key size, but only if you have a requirement to do so, as longer key lengths increase latency and may reduce compatibility.

7. Save the CSR

Click Browse to specify the location where you want to save the CSR as a “.txt” file and click Finish.

8. Generate the order

Locate and open the newly created CSR from the specified location you choose in a text editor such as Notepad and copy all the text including:

-----BEGIN CERTIFICATE REQUEST-----
And
-----END CERTIFICATE REQUEST-----

Return to the Generation Form on our website and paste the entire CSR into the blank text box and continue with completing the generation process.

Upon generating your CSR, your order will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation depending on the certificate purchased. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed with the next step using our SSL Installation Instructions for Microsoft IIS 7.

Author: Admin
Last update: 2018-06-11 22:04


Microsoft IIS 8

How to Generate a CSR for Microsoft IIS 8

The following instructions will guide you through the CSR generation process on Microsoft IIS 8. To learn more about CSRs and the importance of your private key, reference our Overview of Certificate Signing Request article. If you already generated the CSR and received your trusted SSL certificate, reference our SSL Installation Instructions and disregard the steps below.

1. Open Internet Information Services (IIS) Manager

Click Start, Control Panel, System and Security, Administrative Tools, and then select Internet Information Services (IIS) Manager.

2. Select the server where you want to generate the certificate

In the left Connections menu, select the server name (host) where you want to generate the request.

3. Navigate to Server Certificates

In the center menu, click the Server Certificates icon under the Security section near the bottom.

4. Select Create a New Certificate

In the right Actions menu, click Create Certificate Request.

5. Enter your CSR details

In the Distinguished Name Properties window, enter in the required CSR details and then click Next.

Note: To avoid common mistakes when filling out your CSR details, reference our Overview of Certificate Signing Request article.

6. Select a cryptographic service provider and bit length

In the Cryptographic Service Provider Properties window, select Microsoft RSA SChannel Cryptographic Provider and Bit Length of 2048, then click Next.

Note: Bit Length: 2048 is the current industry standard. You may choose a larger key size, but only if you have a requirement to do so, as longer key lengths increase latency and may reduce compatibility.

7. Save the CSR

Click Browse to specify the location where you want to save the CSR as a “.txt” file and click Finish.

8. Generate the Order

Locate and open the newly created CSR from the specified location you choose in a text editor such as Notepad and copy all the text including:

-----BEGIN CERTIFICATE REQUEST-----
And
-----END CERTIFICATE REQUEST-----

Return to the Generation Form on our website and paste the entire CSR into the blank text box and continue with completing the generation process.

Upon generating your CSR, your order will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation depending on the certificate purchased. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed with the next step using our SSL Installation Instructions for Microsoft IIS 8.

Author: Admin
Last update: 2018-06-11 22:05


Nginx (OpenSSL)

How to Generate a CSR for Nginx (OpenSSL)

The following instructions will guide you through the CSR generation process on Nginx (OpenSSL). To learn more about CSRs and the importance of your private key, reference our Overview of Certificate Signing Request article. If you already generated the CSR and received your trusted SSL certificate, reference our SSL Installation Instructions and disregard the steps below.

1. Log in to your server’s terminal.

You will want to log in via Secure Shell (SSH).

2. Enter CSR and Private Key command

Generate a private key and CSR by running the following command:

Here is the plain text version to copy and paste into your terminal:

openssl req -new -newkey rsa:2048 -nodes -keyout server.key -out server.csr

Note: Replace “server ” with the domain name you intend to secure.

3. Enter your CSR details

Enter the following CSR details when prompted:

  • Common Name: The FQDN (fully-qualified domain name) you want to secure with the certificate such as www.google.com, secure.website.org, *.domain.net, etc.
  • Organization: The full legal name of your organization including the corporate identifier.
  • Organization Unit (OU): Your department such as ‘Information Technology’ or ‘Website Security.’
  • City or Locality: The locality or city where your organization is legally incorporated. Do not abbreviate.
  • State or Province: The state or province where your organization is legally incorporated. Do not abbreviate.
  • Country: The official two-letter country code (i.e. US, CH) where your organization is legally incorporated.

Note: You are not required to enter a password or passphrase. This optional field is for applying additional security to your key pair.

4. Generate the order

Locate and open the newly created CSR in a text editor such as Notepad and copy all the text including:

-----BEGIN CERTIFICATE REQUEST-----
And
-----END CERTIFICATE REQUEST-----

Note 1: Your CSR should be saved in the same user directory that you SSH into unless otherwise specified by you.

Note 2: We recommend saving or backing up your newly generate “.key ” file as this will be required later during the installation process.

Return to the Generation Form on our website and paste the entire CSR into the blank text box and continue with completing the generation process.

Upon generating your CSR, your order will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation depending on the certificate purchased. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed with the next step using our SSL Installation Instructions for Nginx using OpenSSL.

 

Author: Admin
Last update: 2018-06-11 22:06


OS X El Capitan (v.10.11)

How to Generate a CSR for Mac OS X El Capitan

The following instructions will guide you through the CSR generation process on Mac OS X El Capitan (v.10.11). To learn more about CSRs and the importance of your private key, reference our Overview of Certificate Signing Request article. If you already generated the CSR and received your trusted SSL certificate, reference our SSL Installation Instructions and disregard the steps below.

1. Launch the Mac OS X El Capitan (v.10.11) Server App.

2. Navigate to the server settings

From the Finder window, under Favorites, select Applications and then Server.

3. Determine where Certificate will be installed

From the Server App window, under Choose a Mac, select one of the following options to determine where to create the CSR and install the SSL certificate once issued.

  • To make a CSR on the current server:
    • Click This Mac – YourServerName and click Continue.
    • Enter the Administrator Name and Password and click Allow.
  • To make a CSR on another server:
    • Click Other Mac – YourOtherServerName and click Continue.

4. Enter your Host Name and IP Address.

5. Enter the Administrator Name and Password and click Allow.

6. From the Server App window, under Server, click Certificates.

7. In the Certificates page, click + (at the bottom) and select Get a Trusted Certificate…

8. Click Next on the Get a Trusted Certificate page.

8. Enter CSR Details

Enter your CSR details and click Next.

Note:To avoid common mistakes when filling out your CSR details, reference our Overview of Certificate Signing Request article.

9. Click Save and then Finish.

Note: Make sure you remember the filename and file path where the CSR was saved.

10. Generate the order

Locate and open the newly created CSR from the specified location you choose in a text editor such as Notepad and copy all the text including:

-----BEGIN CERTIFICATE REQUEST-----
And
-----END CERTIFICATE REQUEST-----

Return to the Generation Form on our website and paste the entire CSR into the blank text box and continue with completing the generation process.

Upon generating your CSR, your order will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation depending on the certificate purchased. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed with the next step using our SSL Installation Instructions for Mac OS X El Capitan (v.10.11).

Author: Admin
Last update: 2018-05-29 19:58


Plesk 10

How to Generate a CSR for Plesk 10

The following instructions will guide you through the CSR generation process on Plesk v.10. To learn more about CSRs and the importance of your private key, reference our Overview of Certificate Signing Request article. If you already generated the CSR and received your trusted SSL certificate, reference our SSL Installation Instructions and disregard the steps below.

1. Log in to Parallels Plesk Panel

Select Hosting Services and click Domains.

Click Control Panel next to the domain the request is for.

2. Navigate to “SSL Certificates”

Select Websites & Domains and click SSL Certificates.

Note: For securing multiple domains, click Manage next to the appropriate domains before proceeding to Step 3.

3. Add SSL Certificate and enter friendly name

Enter a Certificate Name which is a friendly name for your internal reference only; it’s not a part of your actual SSL certificate.

Note: A good naming format is “Domain Name (Years of Validity)”, which helps you easily identify the certificate in your control panel and when it expires.

4. Select bit size and country

Select a Bit Size of 2048 (recommend) or higher.

Select your Country.

5. Enter in the following CSR details

  • Country: The official two-letter country code (i.e. US, CH) where your organization is legally incorporated.
  • State or Province: The state or province where your organization is legally incorporated. Do not abbreviate.
  • Location: The locality or city where your organization is legally incorporated. Do not abbreviate.
  • Organization Name: The full legal name of your organization including the corporate identifier.
  • Department: Your department such as ‘Information Technology’ or ‘Website Security.’
  • Domain Name: The FQDN (fully-qualified domain name) you want to secure with the certificate such as www.google.com, secure.website.org, *.domain.net, etc.
  • Email Address: The email address of the certificate requestor or site admin.

6. Click Request to create the CSR

Under SSL Certificates, click the Certificate Name you choose to view the CSR.

7. Generate the Order

Copy all the text including:

-----BEGIN CERTIFICATE REQUEST-----
And
-----END CERTIFICATE REQUEST-----

Return to the Generation Form on our website and paste the entire CSR into the blank text box and continue with completing the generation process.

Upon generating your CSR, your order will enter the validation process with the issuing Certificate Authority (CA) and require the certificate requester to complete some form of validation depending on the certificate purchased. For information regarding the different levels of the validation process and how to satisfy the industry requirements, reference our validation articles.

After you complete the validation process and receive the trusted SSL Certificate from the issuing Certificate Authority (CA), proceed with the next step using our SSL Installation Instructions for Plesk v10.

Author: Admin
Last update: 2018-06-11 22:07


Video Tutorial » cPanel

How to change the primary language in cPanel



How to change the primary language in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to change the primary language.

Click the Change Language icon.

Select the new desired language, then click Change.

That's it! The language has been changed.

Now when you navigate through cPanel, you'll notice that the language used has been translated to the newly selected language.

To change back, simply repeat the process.

This is the end of the tutorial. You now know how to change the primary language in cPanel.

Author: Admin
Last update: 2018-02-22 21:58


How to backup your website in cPanel



How to backup your website in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to backup our website.

Click the Backup Wizard icon.

This is the main backup screen where you can backup, or restore the files in your hosting account.

To backup your website, click the Backup button.

You have the option of only backing up part of your account...

... or generating a full backup, which we'll do now. Click the Full Backup button.

Select the destination, then click Generate Backup.

That's it! We've just created a full backup to the home directory.

To download a copy of the backup to your computer, simply click it's link.

That's all there is to it!

Restoring files is just as easy. Click the Backup Wizard icon again.

Then click the Restore button.

Choose what type of restore you want to do... in this case, let's restore the Home Directory.

Locate the Home Directory backup...

Then click Upload.

The files have been restored!

This is the end of the tutorial. You now know how to create a backup in cPanel, and restore files from a backup.

Author: Admin
Last update: 2018-02-22 22:34


How to add an MX entry in cPanel



How to add an MX entry in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to add an MX entry.

Click the MX Entry icon.

Setting a custom MX entry is useful if you want your email handled by another server, or if you want to setup a backup email server.

Enter a priority number for the new MX record: the lower priority numbers will be tried first, followed by higher numbers.

Then enter the new MX entry.

Click Add New Record.

That's it! The new MX record has been added.

So in this case, the default mybiz1234.com mail server will be tried first because it has a priority of 0...

... followed by the new email server mx1.myexchange.com, because its priority number is 1.

This is the end of the tutorial. You now know how to add an MX entry in cPanel.

Author: Admin
Last update: 2018-02-22 22:36


How to add a record with the DNS Zone Editor in cPanel



How to add a record with the DNS Zone Editor in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to add an A record with the DNS Zone Editor.

Click the Simple Zone Editor icon.

Select the domain you want to edit.

Then enter the A Record, followed by the IP address you want it to point to.

Click Add a Record.

That's it! We've successfully added an A Record to our domain.

Which is also where you can click to delete the record when it's no longer needed.

You can see the new record listed here at the bottom...

This is the end of the tutorial. You now know how to add and remove records with the DNS Zone Editor.

Author: Admin
Last update: 2018-02-22 22:37


How to setup hotlink protection in cPanel



How to setup hotlink protection in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to setup hotlink protection

Click the Hotlink Protection icon.

Hotlink protection prevents other websites from directly linking to certain files (typically images) on your website.

You'll want to prevent this if you have copyrighted images, or to simply save on bandwidth usage.

You'll first want to make sure your own sites are listed here, so you are able to hotlink to your images.

Enter all the file types you want to protect...

... and check the Allow direct requests box if you want to give the ability to manually enter URLs of a protected file.

Enter the URL you want to redirect to, for anyone who tries to hotlink to your files or images.

Then click Submit.

That's it! You've successfully enabled hotlink protection.

To disable hotlink protection, click the Disable button.

This is the end of the tutorial. You now know how to use hotlink protection to prevent hotlinking to your files.

Author: Admin
Last update: 2018-02-22 22:39


How to setup email forwarding in cPanel



How to setup email forwarding in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's setup an email forwarder.

Click the Forwarders icon.

An email forwarder allows you to send a copy of all email from one address to another. This is handy when you have multiple addresses, but only want to have to check one of them.

Click the Add Forwarder button.

Enter the email address you want to forward...

Then enter the address you want the message forwarded to.

Click Add Forwarder.

That's it! The email forwarder has been setup, and will start working immediately.

You can return to this screen to create additional forwarders, or to delete existing ones.

You can also create domain email forwarders, where all email sent to a specific domain will be forwarded to another.

This is the end of the tutorial. You now know how to setup an email forwarder in cPanel.

Author: Admin
Last update: 2018-02-22 22:40


How to setup email filters in cPanel



How to setup email filters in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's setup an email filter.

Click the User Filters icon.

Then click the Manage Filters link next to the email account you want to create a filter for.

Enter a name for the filter.

Then click Create a New Filter.

Then specify the rule.

Now define an action for the rule.

In this case, the action is to deliver the email to the inbox.

To finish, click the Create button.

That's it! The filter has been created.

You can always return to this screen to create new filters, or edit or delete existing ones.

This is the end of the tutorial. You now know how to setup email filters in cPanel.

Author: Admin
Last update: 2018-02-22 22:41


How to setup domain redirects in cPanel



How to setup domain redirects in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to setup domain redirects.

Click the Redirects icon.

Choose whether you want this redirect to be temporary or permanent.

Then enter the URL you want to redirect.

Then enter the destination URL... where you want visitors to be redirected to.

When ready, click Add.

That's it! The redirect has been created.

This is the end of the tutorial. You now know how to setup domain redirects in cPanel.

Author: Admin
Last update: 2018-02-22 22:43


How to setup an autoresponder in cPanel



How to setup an autoresponder in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's setup an autoresponder.

Click the Autoresponders icon.

This is where you create autoresponders for your email addresses. Autoresponders send messages back automatically, to anyone who sends an email to a specified address.

Enter an interval value, then enter an email address you want to set an autoresponder for.

An interval of 8 hours means the autoresponder cannot send more than 1 email to an address within an 8 hour period.

Now complete the rest of the autoresponder email.

When finished, click Create/Modify.

That's it! The autoresponder has been setup.

This is the end of the tutorial. You now know how to setup an autoresponder in cPanel.

Now when someone sends an email to John, the Out of Office email will automatically be sent to them.

Author: Admin
Last update: 2018-02-22 22:44


How to setup a cron job in cPanel



How to setup a cron job in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to setup a cron job.

Click the Cron Jobs icon.

Enter the email address where you want the cron job results sent after each time it runs.

Now you have to define exactly when and how often you want the cron job to run.

This is made easier by selecting one of the pre-defined common settings.

Notice that by choosing a common setting, all fields are filled in automatically. This also helps you understand what each field means.

Next, enter the command of the script you want to run, including the path (from root).

Then click Add New Cron Job.

That's it! The cron job has been set, and will be listed at the bottom of the screen.

This is the end of the tutorial. You now know how to setup cron jobs in cPanel.

Author: Admin
Last update: 2018-02-22 22:45


How to set your default address in cPanel



How to set your default address in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's set our default email address.

Click the Default Address icon.

This is where you set your default address, so that all unrouted email will have a place to go.

Since we likely won't be using that address, let's set it to an email address we will be using.

Click Forward to email address.

Currently our default address is set to our account name, meaning all unrouted emails will be stored in our main email account.

Then enter the email address you want as your default address.

Click Change.

That's it! The default address has been set.

You can always update your default address setting by returning to this screen.

The new default address setting can be seen here.

This is the end of the tutorial. You now know how to setup your default email address in cPanel.

Author: Admin
Last update: 2018-02-22 22:47


How to password protect a directory in cPanel



How to password protect a directory in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Click the Directory Privacy icon.

Now let's learn how to password protect a directory.

Select the directory you want to password protect by clicking its name.

Check the Password Protect box, then give a name for the directory, and click Save.

The directory is now protected, and requires a password to enter it via a browser.

We must therefore create at least one user, and assign them a password so they can access the directory.

Assign a username and password in the Create User section.

The protected directory now has one user who has access to it. Repeat this process for each additional user you want to grant access for.

This is the end of the tutorial. You now know how to password protect directories, and assign users to them.

You can see the new user we just added in the Authorized Users section.

Author: Admin
Last update: 2018-02-22 22:48


How to enable spam protection in cPanel



How to enable spam protection in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to enable spam protection.

First click the BoxTrapper icon.

Box Trapper protects your inbox from spam by requiring all email sendors who aren't on your Whitelist, to reply to a verification email before you can receive their mail.

To enable BoxTrapper for an email address, click Manage.

Then click the Enable button.

BoxTrapper has now been enabled for this address. Click Go Back.

Next you'll want to configure your BoxTrapper settings. Click the Configure Settings link.

You can set various options here, including auto-whitelisting for addresses you send email to.

Next click Edit Confirmation Messages.

From here you can edit the standard confirmation messages already setup for you.

Next, click Edit White/Black/Ignore Lists.

From here you can add addresses to your Whitelist, Blacklist, and Ignore list.

Once you have BoxTrapper setup the way you want, you'll notice a huge reduction in spam.

Another option for controlling spam is to use SpamAssassin.

You can use SpammAssassin in conjunction with BoxTrapper for maximum spam control, or you can use BoxTrapper on its own, or SpamAssassin on its own.

Click to Enable SpamAssassin.

Then click Go Back.

You'll now want to configure SpamAssassin, so click the Configure button.

From here you can setup your blacklist with email addresses you KNOW are spam...

... and can add email addresses to your whitelist... addresses you KNOW are NOT spam.

This is the end of the tutorial. You now know how to enable spam protection in cPanel, using BoxTrapper and SpamAssassin.

Author: Admin
Last update: 2018-02-22 22:49


How to create custom error pages in cPanel



How to create custom error pages in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to create custom error pages.

Click the Error Pages icon.

This is where you create your custom error page... and you can include one or more tags to further customize the page.

When finished, click Save.

That's it! The custom 404 error page has been created.

You can customize the other error pages as well... but you don't have to... all accounts come preset with standard error pages.

There are several different error pages you can customize. Let's customize the 404 error page.

This is the end of the tutorial. You now know how to create custom error pages in cPanel.

Author: Admin
Last update: 2018-02-22 23:19


How to create an email account in cPanel



How to create an email account in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's create a new email account.

Click the Email Accounts icon.

Enter the email address you want to create, and assign it a password.

Set a mailbox quota for the account if you wish.

Then click Create Account.

That's it! The new email account has been successfully created.

From the Email Accounts screen you can access webmail for the account, change its password, change the quota, or even delete the account.

You can also create additional email accounts.

This is the end of the tutorial. You now know how to create email accounts in cPanel.

Author: Admin
Last update: 2018-02-22 23:21


How to create an addon domain in cPanel



How to create an addon domain in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to create an addon domain.

Click the Addon Domains icon.

This is the addon domains page, where you can setup additional domain names that point to subdomains of your account.

Enter the new domain name...

Then enter a username.

Enter and confirm a password, then click Add Domain.

That's it! The addon domain has been created.

This is the end of the tutorial. You now know how to create addon domains in cPanel.

Author: Admin
Last update: 2018-02-22 23:22


How to use the IP Blocker in cPanel



How to use the IP Blocker in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to use the IP Blocker.

Click the IP Blocker icon.

Enter an IP address or range you would like to block, then click Add.

That's it! We've now blocked anyone using the IP address from accessing our website.

You can see which IP addresses are currently being blocked.

... and you can remove IP blocks by clicking here.

This is the end of the tutorial. You now know how to block IP addresses from accessing your website.

Author: Admin
Last update: 2018-02-22 23:23


How to use the Index Manager in cPanel



How to use the Index Manager in cPanel

This demo assumes you've already logged in to cPanel, and are starting on the home screen.

Now let's learn how to use the Index Manager.

Click the Indexes icon.

The Index Manager enables you to control how directories on your website are displayed.

If there is no index.html file in a given directory, the contents of that directory will be listed in a browser. This can cause security issues.

With Index Manager, you can set your account up to not allow your directory contents to be shown.

Let's setup Index Manager for the clients directory.

There are four settings to choose from.

Since we do not want the contents of this directory shown, we'll choose the No Indexing option.

That's it! The index settings have been updated, and visitors can no longer view the contents of the clients directory.

It's just as easy to switch back to the default setting.

The Default System Setting allows the directory contents to be shown.

No Indexing does not allow directory contents to be shown.

Standard Indexing prevents browsers from viewing contents of directories that do not contain image files.

... and Fancy Indexing prevents browsers from viewing contents of directories that do contain image files.

This is the end of the tutorial. You now know how to setup index directory protection for any of your directories.

Author: Admin
Last update: 2018-02-22 23:24