Category Archives: customer support
Customer Support
Acess to Shell
Hi,
Is cpwebhosting, can provide me acess to Shell ?
Hi,
Get logged in to the control panel, On the left side menu, find FTP/User account link, and click on it.
In a new form that will appear, find Shell Access section, and click on OFF button. After you have clicked on the OFF button, it will change to the Request Status link, and you have to click on that link to ask administrator to allow you Shell Access. After administrator enables Shell Access for your account, you will see that there is ON button in Shell Access section, and you can proceed.
WebShell allows you to copy, move, delete, and rename files and directories in your home directory on the server. Also, you can use it to upload, download, compress and decompress files as well as preview them in the browser.
Starting from H-Sphere version 2.3, htProtect utility is integrated into WebShell. Protect utility allows you to password-protect any directory on your site so only authorized visitors can open its content with their browsers.
To launch WebShell, click the File Manager icon on the Quick Access page in the Account menu.
WebShell and Protect manuals are available from the WebShell interface, Help button.
Reseller Control Panel
Hi,
With my Reseller Acccount, I do have 2 Control Panels, one is Reseller Control Panel with which I can send Support requests to the server admins and see my billing profile and online invoices and another one is Adiministrative A/c Control panel which allow me to manage Plans, Customers and entire Reseller Account.
Perl Providing capability of sending mails
Sendmail is an open source program used on most unix computers. With sendmail, perl has the ability to send information out.
Sendmail will send the email, with its headers and content, to the mail server and then to the recipient(s).
There are many standard headers but the ones you will most commonly encounter are:
* To:
A comma separated list of recipient addresses.
*From:
The email address of the sender.
*Reply-to:
The email address to which replies should be sent.
*Subject:
The subject of the message.
SSI command in .html files
Hi Support,
Can I place the SSI command in .html files?
Hi,
You cannot place, SSI command in .html or .htm files, for this, you need the .shtml extension files.
If you are trying to include a file make sure it is in the same directory as the main file. Also make sure you have spelled the filename correctly in your SSI command.
Account Settings and Main Control Panel Views
If you are using the new Xpressia interface, you will see a menu bar similar to this:

You can select the same navigation from the new top menu:

Below is an explanation for each item once you enter into the account settings area.

1. This lists the name of your plan. If you wish to change the plan, you can do so by selecting the “change” icon.
2. The Account Manager Login identifies the main user, or master account holder assigned for control panel access. The username associated with the account is displayed here.
3. FTP Login signifies the username to login into your web folder with an FTP program or agent you would run at your desktop. The Web Shell program can also act as an ftp agent accessed directly through the control panel.
NOTE* For Xpressia interface users the web shell program is called “File Manager ”
4. The FTP password is required to login to your web folder. You can change the password by selecting the “change” icon. Please try to keep your password a minimum of 6 characters and include both alphanumeric and numeric combinations. TIP
5. Your QUOTA per plan is assigned by the administrator. You can see how much disk space (QUOTA) you are currently using and the amount allocated for the plan. You can also change, or increase the amount of disk space, should you require more.
6. This is the amount of bandwidth you have used and available. You can select to CHANGE or add more bandwidth by clicking the CHANGE icon. To add or request more bandwidth you must have credit on your account to accommodate the amount of the increase.
7. The default user group created for this account.
8. The home directory is where your files for you site are stored on the server. When setting up new users to FTP and access your account, you will be required to set up their accessibility RELATIVE to the HOME directory. This means that the /home/ is the root or base directory and the user you create would have the directory within the home directory. You should enter “/home/newusername/” as a new directory for a user you create for FTP accounts.
9. This host name is where you point your publishing or FTP editor to.
10.Your domain name on file for this user. The domain name in brackets is the temporary url (Unique Resource Locator) assigned by the system so you can view your account while changes in your domain name propagate through the Internet name servers system, which can take anywhere from 24-96 hours.
Changing Your Hosting Plan
Your hosting plan determines the services you receive with the account and the prices for these services. Big sites with high hit rates and special services require more expensive plans; cheaper plans are suitable for simpler sites.
To change to a different plan:
1. Select Quick Access in the Account menu.
2. Click the Change icon next to your plan name.
3. Select your new plan and click Submit
Warning: Switching plans will disable the resources that are unavailable under the plan you are switching to. This is what happens when you switch to a new plan:
• your current billing period is closed;
• your unused recurrent fee is credited to your account;
• you are charged any payable amount, including your usage (overlimit) fees;
• a new billing period under the new plan starts;
• you are charged the recurrent fee for this billing period.
If you do not see the plan of your choice in the list that appears, it means it is incompatible with your current plan. You cannot change to an incompatible plan but you can create a new account under this plan and then you can delete your old account.
Plan Upgrade: If you are switching to a more advanced plan your disk quota does not increase, but free units do. As a result, your disk quota may turn out to be lower than free units, so you can increase your disk quota without being charged. The same is true of other resources.
Plan Downgrade: If you are switching to a ‘lower’ plan, the system reduces your quotas for free units. If you are using more than free units, the system reduces the quota to the amount you are using.
Thinking Outside The Firewall
Ask anyone professionally involved with computers and the Internet and they will readily acknowledge the vital importance of data security. Security experts are also quick to point out that cyber attacks are increasing at an astonishing rate (though somewhat self-serving, their observation is practically an understatement!). However, our biggest concern in the very near future may not be the high number of attacks but rather the sophistication of the intrusions and the increasing points of entry that must defend against. So, it is a time we took a closer look for ourselves at this moving target called Data Security.
Historically, amateur hackers and disgruntled company insiders have posed the biggest threats to computer networks. In fact, more than one-third of all corporate cybercrime is the result of unauthorized access by insiders. From the outside, potent viruses like the Nimda worm and Code Red were merely the notorious products of pesky amateur programmers.
But things can change quickly, especially in the post-9/11 world of network security. Now, in addition to amateurs, hosting industry is facing the specter of attacks from highly motivated expert programmers bent on cyber-terrorism. We just don’t know what new kinds of blended threats we may face. That’s disturbing when you understand that data security is a reactive technology – which means that threats have to become known before developers can defend against them. Unfortunately, this potential new wave of hackers comes at a time when the traditional firewall may soon become obsolete – no matter how good it is. With the proliferation of wireless networks and virtual private networks, intruders will be able to use these connections as well as Web protocols to gain access to sensitive data without the need to breach perimeter defenses such as a firewall.
So what’s the answer? Well, developers have realized that it’s time to start thinking outside the firewall. One approach is the development of early-warning systems that use heuristic analysis, rather than known virus signatures, to detect abnormal behavior. Thus the ability to react to a previously unknown threat in real time. A company called Entercept has a product that uses heuristic analysis to recognize abnormal network activity and immediately block server resources from the attack. This is quite a leap forward from merely generating a log and notifying system administrators who would be hard pressed to react nearly fast enough to avoid serious harm. To deal with guarding multiple points of entry on today’s networks, Internet Security Systems has been developing their RealSecure platform to automatically apply software patches to both servers and clients whenever vulnerabilities identified. In theory, administrators would no longer have to apply patches manually but instead would rely on a self-healing platform that functions similarly to the human immune system in that it identifies threats and fights back in real time.
Still, even these radical measures aren’t much defense against the determined insider attempting to steal company secrets or divert funds or stocks. One company, Savvydata, Inc., is aggressively targeting this type of threat with a security program called RedAlert, which is specifically designed to block crooked or angry insiders from doing harm. RedAlert can protect sensitive data in a variety of applications from being accessed, printed, emailed, copied or saved to a disk by an unauthorized employee on the network and provide a secure audit trail. It can also lock down data in unaccounted for laptops. Although it may not be able to block an executive with high-level access, it will generate an alert and leave a clear audit trail as a deterrent.
With the rapid evolution of today’s hardware and software, it would be naïve to expect that today’s tried-and-true firewall solutions represent the endgame in network security. But rest assured that quantum leaps in applications of safety are rapidly becoming available to deal effectively with tomorrow’s unknown threats hopefully. One thing is for sure – now is always a good time to re-evaluate your security measures and get better informed on new security tools available to protect your sensitive data.
Best Linux Hosting Providers
| Companies | Price | Server Location | Price | Visit Now |
|---|---|---|---|---|
Best Business hosting |
$4.19/mo. | Santa Monica, CA, US | Start @ $4.19/mo. | Visit Now |
| $2.75 /mo | USA/UK/AU/BG/FI | Start @ $2.75 | Visit Site | |
Cloud SSD Hosting |
$1.99 /mo. | WILMINGTON, DE, US | Price @ $1.99 /mo. | Visit Now |
| $2.99 /mo. | LASALLE, CA | Price @ $2.99 /mo. | Visit Now | |
Managed WordPress Hosting |
$89.00/mo. | Lansing, MI, US | Price : $19.00/mo. | Visit Now |
| $2.75/mo. | Burlington, MA, US | Price : $2.75/mo. | Visit Now | |
Lifetime Free Domain |
$3.95/mo. | Panama, PA | Start @ $3.95/mo. | Visit Now |
| $1.99/mo. | Arlington Heights, IL, US | Start @ $1.99/mo. | Visit Now | |
| $4.95/mo. | Orem, UT, US | Start @ $4.95/mo. | Visit Now | |
Cheapest Webhosting |
$1.99/mo. | Burlington, MA, US | Start @ $1.99/mo. | Visit Now |


You must be logged in to post a comment.