This article will show you how to use cPanel to create a self-signed SSL certificate for a domain of your choice. Introduction: Self-signed SSL is not the same as an…
Category: Website security
Host.co.in KB is explained in website security category The purpose of website security is to prevent these sorts of attacks.
What Are The Advantages Of A Dedicated IP?
There are various advantages of having a Dedicated IP for your web hosting account, described as following. As there is a single owner of the Dedicated IP, so the web…
What is a Dedicated IP?
A Dedicated IP means an unique Internet Protocol address which is assigned to a single hosting account solely. Ordinarily multiple web hosting accounts use a single server with single IP…
How Does Leech Protection works?
Leeching protection sets maximum number of log-ins which can occur withing a specific time limit (normally 2 hours). If this limit is exceeded then the user is detected as allowing…
What is Leech Protect?
Leech Protection is a great feature for Linux shared hosting consumers, provided in cPanel version 11.30, which allows you to restrict log-ins you want to allow each user within a…
Does Host.co.in Purchase Third Party Softwares?
Host.co.in has designed all its web hosting services and plans with the inclusion of all required software and applications which includes Operating System and Database Licensing Fees, highly reliable and…
How to Transfer Hosting Provider To Another?
There are certain key elements that should be taken into consideration while your move your website from a current web hosting services provider to another. Generally, your website and your…
What is Authorization Code?
When you transfer your website to a new web hosting services provider they ask you for an ‘Authorization Code’. It’s a Unique 6 to 32 character long code that is…
How To Set / Reset MySQL Password?
Changing passwords is quite a regular type of task for many webmasters and the same is also applicable to database administrators also. Here I would like to share the procedure…
What Are The Features Of Cloud Hosting?
Maximum Scalability with Resources This is one of the most important features and also the major reason behind making cloud hosting services different than the other hosting services. A webmaster…
How To Block Malicious Visitor And Websites Using .htaccess
As most of us know the importance of .htaccess file for a web hosting account, here you can know one of the most useful utilities of this file. It’s possible…
How to Manage SSH Keys?
SSH keys are the great utility for Linux shared hosting clients. These SSH keys play an important role while allowing a specific computer system to access your website’s information through…