Archive

Posts Tagged ‘Website Hosting Hyderabad’

PHPMyAdmin

July 29th, 2009 Comments off

As we know that the PHP is the most common and loved web language lamp-logo world wide. PHPMyAdmin is also written in PHP as the name itself suggests. It is an open source tool which is used for administer MySQL over the web. It can perform all the tasks on the database such as creating, modifying or deleting the tables, databases, columns, rows and a single field also. It executes the SQL statements and manages the user permissions.

logo_pma_med Currently this tool is available in 57 language and is maintained by the The PHPMyAdmin. There are more similar products available which include PostgreSQL, PHPMSAdmin also. Although the variety of the tools are available PHPMyAdmin is widely used and appreciated by the people. It has won several awards. It was chosen as the best PHP application in many of the awards.

Take a look at the features:

1. spontaneous Web Interface

2. It supports almost all MySQL features.

Browse and drop the databases, fields, views, indexes.

Create the databases, copy, rename.

Alter the databases, fields, views, tables, indexes

Maintain the server databases and tables

Executing the SQL statements and bookmark it, edit and even batch     queries

Manage the Users and the permissions.

It also manages the stored procedures and the triggers.

It has a support to import the data from SQL and CSV.

3. Support for exporting data to various formats i.e. SQL,CSV,XML, OpenDocument Text and Spreadsheet.

4. It export the data in normal Word, Excel also.

5. Ability to Administer multiple servers.

6. The database layout can be transformed into PDF graphics.

7. Complex Queries are created by the use of Query by Example(QBE)

8. Ability to search globally or a subset of the database.

9. It can transform the stored data into any format using the predefined functions.

10. Taking back ups of the databases.

The features listed above are just the key of them, you can explore more of them by using PHPmyAdmin

Understand cPanel’s Spam Assassin functionality.

July 29th, 2009 Comments off

A Spam Assassin is a software, that analyzes messages in the form of Spam-Assassin E-mails. It differentiates and determines other E-mails from spams. You are required to set rules inorder to compare the different parts of an E-mail. Every rule adds or removes points from a message’s spam score. This spam score helps to determine the difference between spam and business E-mails. Its an E-mail spam filtering system that is deployed with the account to help block or mark the spam mail.

cPanel logo To get access to the Spam Assassin, you need to first of all login to your cPanel control panel provided by your Web Hosting provider. Here in the Mail section you can find the tab of Spam Assassin. If you click on the tab, you can check if the filter is enabled or disabled. From there you can enable the filter. Inorder to configure the settings you need to hit the Configure Spam Assassin tab.

Below is a pictoral description of Spam Assassin

Spam-Assassin-Tab

Enable/Disable Spam Assassin

Configure Spam Assassin

Steps to Configure Spam Assassin

Here you can find number of boxes to be populated :

The first one here is the blacklist_from here you need to specify the e-mail address/es you wish to be marked as spam.

Then is the required_score tab, here you need to set the number of hits required before a mail is considered spam. “n.nn” can be an integer or a real number. 5.0 is the default setting, and is quite aggressive, it would be suitable for a single-user setup. Below you would find ‘score’, here you need to Assign scores (the number of points for a hit) to a given test. Scores can be positive or negative real numbers or integers. “SYM-BOLIC_TEST_NAME” is the symbolic name used by SpamAssassin for that test; for example, ‘FROM_ENDS_IN_NU’. If only one valid score is listed, then that score is always used for a test. If four valid scores are listed, then the score that is used depends on how SpamAssassin is being used. The first score is used when both Bayes and network tests are disabled. The second score is used when Bayes is disabled, but network tests are enabled. The third score is used when Bayes is enabled and network tests are disabled. The fourth score is used when Bayes is enabled and net-work tests are enabled. Setting a rule’s score to 0 will disable that rule from running. Then comes ‘whitelist_from’ here you need to specify addresses which send mail that is often tagged (incorrectly) as spam; it also helps if they are addresses of big companies with lots of lawyers. This way, if spammers impersonate them, they’ll get into big trouble, so it doesn’t provide a shortcut around SpamAssassin. Whitelist and blacklist addresses are now file-glob-style patterns, so [email protected], [email protected], or *.domain.net will all work. Specifically, * and ? are allowed, but all other metacharacters are not. Regular expressions are not used for security reasons.

You can Enable or Disable the Spam Assassin whenever you wish to. This simple tool simplifies your task of filtering out spam E-mails reach your mail box. With the ever increasing number of spam E-mails reaching your mailbox, tools such as cPanel Spam Assassin have gained popularity at a fast pace.

Fully Managed Virtual Private Server Hosting or VPS Hosting

July 29th, 2009 Comments off

One of the types of Web Hosting is Virtual Server Hosting also termed as VPS Hosting. VPS Hosting shares the similarity with a Dedicated Server Hosting. Many medium sized businesses prefer a VPS Hosting  as it is highly affordable and cheaper than a Dedicated Server. Though there is a difference in the resources offered. Many reputed web hosting service providers offer their services for both the platforms ie. Windows VPS Hosting as well as Linux VPS Hosting. They also offer flexible upgrade or downgrade options. packages offered by almost all the web hosting providers now-a-days. A VPS is created using one of the different virtualization applications. Virtuozzo is one such application that is widely used and preferred. With a VPS hosting solution, you can get to Control Panel Logo experience a dedicated like environment. It ,means with a VPS you get complete root/admin. access to the server with a control panel to manage the account. Usually, a DotNet panel or Plesk is more preferred to manage a Windows Hosting account whereas to manage a Linux Hosting account, cPanel control panel is widely preferred. The root or admin access allows you to install, create, uninstall, etc, any application or software onto your server similar to a Dedicated Server. In short you have the privilege to maintain and manage the server on your own. In such scenario, the web hosting provider takes care of the security of the node.
Limited number of VPS accounts are created on a physical server, using any of the virtualization softwares.

Benefits of using a Virtual Private Server Hosting

Any package lower than a VPS such as shared hosting or Reseller Hosting, do not offer privileges such as root/admin access. You get limited VPS Host.co.in resources and there are multiple accounts set-up on a physical server, this gives the chance of overselling, which gradually hampers the performance of the website/s. On the other hand a dedicated server is bit more expensive than a VPS. A dedicated server is suitable for large businesses and enterprises. With a VPS you can get almost the same privileges as that of a Dedicated Server. You would get similar reliability with a VPS as that of a Dedicated Server but with a cheaper price. You get guaranteed resources with a VPS with better security than that of the other lower hosting packages. You can even apply your own security measures to the VPS as you have complete control over the server. To sum it up, benefits of a VPS are Dedicated Server like hosting environment, Reliability and Security.

Security: In comparison to other lower hosting packages a VPS is more secure. Most of the users upgrade their plans to a VPS due to security factor. A VPS is pretty much secure and impossible for hackers and attackers to breach in.
Dedicated Server Like Environment: Similar to a dedicated server hosting environment, you get complete admin access to the server. This privilege allows you to use maximum resources of the server.
Reliability: Reliability is one of the most important factor, that needs to be HyperV-VPS-Hosting considered while choosing a web hosting package. VPS proves itself to be worthy of fulfilling this requirement. A VPS has its own dedicated resources. With the addition of all new technology called the Hyper V Hosting , Windows users get more reliability with a VPS.
The VPS Server Hosting also has some demerits of its own. This is because VPS’s are created on a physical server. You share its resources with other user accounts, hence limiting you to use certain applications such as Java components. It is similar to a shared hosting, which can hamper the server stability. It is always suggested that when your website/s become popular, you must upgrade from a VPS hosting package to a Dedicated Server to get the utmost hosting experience.

Dedicated Server Hosting Perfect For Maximum Uptime And Web Security.

July 29th, 2009 Comments off

Any Linux Dedicated Server Hosting or Windows Dedicated Server Hosting you choose, you are assured to get maximum uptime and high level of security. A dedicated server hosting plan can be the most appropriate web hosting option to gain success in your online business. But, as a matter of fact, it may be more expensive than the rest of the hosting solutions. But, you would get much greater advantages and  server resources to use than any other hosting solutions. There are two web hosting options available in the category of Dedicated Server Hosting ie. Linux Dedicated Server Hosting can be by the one’s who wish to use the technologies other than Microsoft, whereas if you wish to use Microsoft technology, a Windows Dedicated Server can be available at affordable prices.

Dedicated Server

In this category of Dedicated Server Hosting, you would find two more sub-options viz. Managed Dedicated Server and Unmanaged Dedicated Server. Once you decide to opt for a Dedicated Server it is important for you to choose one of the sub-options as stated above. Most of the Web Hosting providers offer Managed Web Hosting solutions which means that the web host is responsible for the upgrading the security patches, back-ups etc. But, if you are a Web master or have an experience on server management you can choose to have an Unmanaged Dedicated Server. A Managed Web Hosting service provider is the widely preferred by users. Most of the reputed and well established Web Hosting providers offer customized Dedicated Servers, this helps you to get the configuration as per your requirements and get a good value for money. If you face a problem with your Managed Dedicated Server, the web host would take care of the issue. Most of the time, issue is resolved within an hour unless there is a major flaw or hardware failure. But there are technologies available that can cope up with this problem too and such failures does not affect the performance of your website.

There are incomparable benefits of having your website/s hosted on a Dedicated Server. The biggest benefit is that you have the privilege to use the server as you want. You can install, uninstall, deploy etc. software`s and applications of your choice. The only account on the server would be yours. That means the server resources are not shared between any other user/s. With this type of Web Hosting, you get maximum amount of reliability. You are free to use all the resources allocated to the server.
Security, which is a major concern these days can be easily achieved with a Dedicated Server. It is necessary to know the server restrictions when choosing  an application to  install, which you can know from the Web Hosting provider.

Security: Security is one of the major factors that is being taken very seriously these days due to the ever increasing online threat. People usually upgrade from a Shared Hosting or VPS Hosting to a Dedicated Server for this purpose. The reason being , there are multiple hosting accounts created on a single physical server when you choose a VPS or a Shared Hosting solution. This increases the risk of threats and intrusions. But, with the dedicated server you need to worry about such issues as yours is the only account hosted on the server, plus you are free to deploy additional security measures.

Reliability: This is the most important factor that is considered when choosing a server. Hence, people prefer to opt for a Dedicated Sever as Shared and VPS hosting solutions cannot meet the level of reliability offered by this server. The better the configuration the better is the reliability obtained.

Freedom: With a Dedicated Sever you have the freedom to install almost any application and software required for your mission critical online business. You cannot find such option available with any other type of hosting. Ofcourse, you must check for whats not allowed on the Dedicated Sever offered by Web Hosting providers. This is another reason why people upgrade to a dedicated server.

With the benefits, there are also some disadvantages of having your site hosted on a Dedicated Server. The biggest reason why most people are bit reluctant to use this is the cost. Dedicated servers are costly in comparison to the other hosting solutions. But, if used correctly, it can be the only server options that can give you the best value for money. Server management can be a tough job people who choose an Unmanaged Dedicated Server Hosting plans. It’s a 24×7 task and require dedicated and technically sound people to carry out the crucial tasks.

A Dedicated Server Hosting can offer you a Good Value for Money. It can add to the success of your online business.

What are error codes?

July 28th, 2009 Comments off

Different error codes relates to different family of error and it is has some meaning related with it. These are also called as HTTP Status code. Usually you get a error while connecting with the server. The error code is displayed instead of the whole description. These error codes tells the user about the status of the server and the what type of error has encountered.

Given below is the main family of this error codes with its description. Each family of the codes contains the actual codes that are displayed while interacting with the server.

Family 1xx : Informational.

This means that the Request Received, Continuing process. This family indicates a provisional response, which consists of the status line and the headers. It is terminated by the empty line. HTTP/1.0 does not define any of the codes for this category (1xx status codes), servers also must not send the 1xx response to an HTTP/1.0 client. There are some exceptions where this codes are utilized (usually under experimental conditions)

Family 2xx : Success

It means The Action was successfully Received, understand and accepted. The status codes from this family indicates that the client’s request was received, understood, accepted successfully.

Family 3xx : Redirection

Further action must be taken in order to complete the request. Some times the user agent has to take some actions in order to complete the request. This acti0on can be carried out without the interaction of the user iff the method used in the second request is GET or HEAD. The user agent should never automatically redirect a request more than 5 times. Mostly this type of redirections indicate an infinite loop.

Given below is the example of the error code for family 4xx. Error 404 Page not Found. Although the error code for this type of error remains the same you can configure your personalized error message for the codes.

404

Family 4xx: The request contains bad syntax or cannot be fulfilled. This type of codes means that the client seems to be errored there are some exceptions when responding to a HEAD request, the server explains the error by keeping the entity in the response. These status codes are applicable to any request method.

Family 5xx: Server Error

The server Failed to fulfill an apparently valid request. All the response status codes beginning with the digit “5” indicates that the server knows the error or it can’t fulfill the request. Here also if the server is responding to the HEAD request it should include an entity explaining the error.

Overview of Ruby on Rails.

July 27th, 2009 Comments off

Ruby on Rails is an application framework for Web development which is written in Ruby, it is a dynamically written programming language just like Python, Smalltalk, and perl. It is often referred as RoR. It is an Open source for ruby language ruby-on-rails

Rails uses MVC Framework. MVC is Model-View-Controller architecture which organizes the application programming. It makes several tasks easier. It provides scaffolding which is useful in constructing some of the models and views automatically, which are needed for basic websites. It highly relies on Web server to get executed

Structure:

Ruby on Rails is separated into various different packages viz ActiveRecord (It is an Object Oriented mapping system), ActionPack, ActiveSupport and ActionMailer

RoR si designed to mainly focus on Convention over Configuration (CoC), and the rapid development of Don’t Repeat yourself (DRY). CoC reduces the developers work, developer  only needs to specify the aspects which are not conventional. DRY states that the information located at a single and unambiguous place.

Lets see the basis of the Ruby on Rails. RoR is based on the MVC Architecture.

MVC organizes the code to mask the complexity. It separates the web application into three sections

The Model

The Controller:

The View:

Rails_architecture

The Model: It is responsible to take care of the database interactions. It abstracts the database objects in your applications. This section also handles the ‘data integrity’ issue in the databases.

The controller: It is an intermediate between  model and View. It handles the interaction of the Server. It fetches the objects from the database using the model and it hands them over to the View. It has a direct access to the Web Server, Cookies and session variable.

The View: It generates the HTML code that is displayed in the browser. It takes the data from the Controller and produces the HTML equivalent for the same. The formatting and styling is handles by the view. View is combination of Ruby code and HTML.

Ruby on Rail works on all this concepts and integrates them to a single pack which is used by the web developers. Every component of the MVC is implemented by the Rails

What is IMAP?

July 27th, 2009 Comments off

IMAP is a shorthand for Internet Message Access Protocol. It is a very popular method of accessing the mails(Electronic) and Bulletin Board from the mail server (may be shared). We can say that it enables the clients to access the mail from remote locations  as if they are local.

Its ability to access mails from more than one computer has very important as the use of emails and that t use of multiple computers has increased.

Goals of IMAP.

Completely compatible with Internet message Standards.

Allow to access the messages from more than computers.

Use of reliable File access protocols.

Support for all the three modes, i.e. Online, Offline and Disconnected.

Supports concurrent Access to shared mailboxes.

Client software can be innocent about the server File store format.

IMAP includes the operations for all creating, deleting and renaming mail boxes, reading new mails, permanent delete, setting and resetting of flag,  parsing(MIME and RFC-2822), etc.

If you think for using its not a bad idea, its free for gmail.

working-of-imap

POP3 is other mailing protocol which is also widely used although it is less capable from IMAP.Lets see which are advantages over POP that makes IMAP a better protocol for mailing.

  • Connected and Disconnected modes of operations.
  • Multiple client can simultaneously connect to the same mail box.
  • Acces to the MIME message parts and fetching.
  • Message State information.
  • Multiple Mailboxes on the same server.
  • It allows Server Side searches.
  • It includes built in extension mechanism

Allowing so many of the facilities and features IMAP inherits some additional complexity and overhead. but we can that it is the best protocol used for the purpose it is intended for.

Who can register a .CA domain name?

July 25th, 2009 Comments off

How to change the registrant owner for a registered .CA domain?

When a .CA domain is registered, a Registrant Account is created at CIRA – The domain registry for .CA domains. The registrant contact that is submitted and approved by CIRA at the time of domain registration cannot be changed as accepted their terms and policies during registration process of the domain name. The administrative contact can be changed, the techical & billing contacts can be updated by raising a Ticket [Email] at their HelpDesk.

The Registrant Contact can be changed by creating a New Registrant Account at the CIRA and the domain must be transferred to this New Account, the applicable fees have to be PAID before the domain is transferred to the New Account. The domain transfer for .CA domains is actually know as REGISTRY TRANSFER.

Required Information for .CA Domain Transfer
=================================

01. Current Registrant Contact Information
02. Reason for Registrant Transfer
03. New Registrant Account Information
04. Domain Name
05. Request from both the New Registrant & Current Registrant
06. Payment for Registrant Transfer Fees

Who can register a .CA domain name?

The Canadian Internet Registration Authority (CIRA) automatically applies private registration to the following legal types:

* Canadian citizen
* Permanent resident
* Legal representative
* Aboriginal person

How to install Frontpage 1.1 extensions for Microsoft IIS server?

July 24th, 2009 Comments off

Installing FrontPage Extensions.

These extensions are very important in order to directly publish site from FrontPage application. This means that the user will not have to use FTP for uploading files or any other method.

How to install Frontpage 1.1 extensions for Microsoft IIS server?

Steps:

1. Log onto Windows NT Server as Administrator.

2. Start Internet Service Manager and select WWW service. Go to the Menu and click on the Services properties

3. Go to the password Authentication section on the Service tab, click on the check box for selecting “Basic (clear text)” check box and then click Apply and OK.

4. The FrontPage server extensions file should be double clicked in order to decompress it.
a. If you have already decompressed while installing the FrontPage ignore this step and perform the nest step. At the end of the decompression process click on Yes when it prompts to start the server. Go to step 5.
b. Start the server Administration for FrontPage

frontpage11-for-iis

5. On the dialogue box check the Ports Section. You have to be make it clear that no extensions are installed on the port where the IIS is running. If there are any such Extensions uninstall them. Once you find the port is totally free then click on install and refer the steps below
a. Select the Internet information Server from the server type list in the Configure Server type dialogue box.
b. In this Server configuration dialogue box type the port no for the server. Until you have bound multiple Ip address for your NT server and this Ip address are assigned to the virtual servers in IIS please do not enter the IP address in the multi hosting section.
c. Click Ok for the confirmation.
d. Type Administrator in the Name box in the Administrator for personal webserver box. Enter ‘x’ the password and confirm password boxes (without quotation marks). Click OK
6. Now, click on the open web file menu to connect to the Microsoft Internet Sever using FrontPage Explorer.
7. Type Hostname / IP Address to the IIS on the Open Web dialogue box in FrontPage Explorer.

8. Use the same login details that you use to login on Windows NT, when prompted for user name and password.

Installation is now complete. Explore IIS with FrontPage

Effects of IP Change in Search Engine Rankings.

July 23rd, 2009 Comments off

This is a question that bothers most of the individuals. People do a lot of research on knowing the answer to this question. Changing the IP assigned to a domain is a scenario that almost everyone might have came across. Below is a description of the effects of an IP change.

Actually it depends on some of the different factors. According to observations and studies, changing the IP has very little impact on the Search Engine rankings. The rankings are seen to marginally decrease, but with a consistent effort, those rankings can be regained in a very short interval of time. With the fast changing search engines ranking algorithm, soon such changes can be neglected by them.

But, prior to changing the IP address of a domain or website, you must follow a check list as stated below:

A) You should make sure that the IP provided by the webhost isn’t the one that has been banned by the search engines. Most of the time it happens that, ex-users of the server, involve in spamming and then discontinue their services from the web hosting service provider, it might be possible that you end up using such an IP for your domain. Such IP’s cause serious damage to the website, in terms of SEO rankings. Despite taking many efforts on SE ranking, your website would not be indexed by the search engines and all the efforts would go in vain.

B) Search Engine Robot The web host must provide maximum uptime of their server. This is one crucial aspect of SEO, your website should be available all the time over the World Wide Web for the search engine robots and spiders to crawl your website. Hence, you should check the uptime offered by the web hosting provider before you sign-up for a hosting package with them. One way to determine is to check if the web site has been indexed by the search engines, or there are many web based available on the internet that can help you determine if the IP is a banned IP.

C) Make sure that the web hosting providers does not prohibit spiders. Some web hosting providers do this to save the bandwidth consumption. If that is the case then your website would never get indexed by the search engines.

This is especially true for servers who’s IP addresses have been blocked or disregarded by Google. If it is something you are truly worried about, ask your Web host for sample Websites hosted from the same server as the one you will be placed on – then, look and see how these other sites rank in Google.