How to Generate a Self-Signed SSL Certificate Using the cPanel

This article will show you how to use cPanel to create a self-signed SSL certificate for a domain of your choice. Introduction: Self-signed SSL is not the same as an SSL certificate provided by a third-party supplier like Let’s Encrypt or through Comodo’s relationship with cPanel (AutoSSL). Web browsers do not believe these certificates to … Read more

What Are The Advantages Of A Dedicated IP?

There are various advantages of having a Dedicated IP for your web hosting account, described as following. As there is a single owner of the Dedicated IP, so the web hosting account is free from any possible blacklisting related issues which are found in shared IPs. One can view his website by entering his Dedicated … Read more

What is a Dedicated IP?

A Dedicated IP means an unique Internet Protocol address which is assigned to a single hosting account solely. Ordinarily multiple web hosting accounts use a single server with single IP address but is not the case if webmaster have dedicated IP to his web hosting account. If a website receiving heavy loads of traffics, is … Read more

What is Leech Protect?

Leech Protection is a great feature for Linux shared hosting consumers, provided in cPanel version 11.30, which allows you to restrict log-ins you want to allow each user within a particular (generally 2 hour) period. Leeching takes place when multiple users try to submit their username and password multiple times, allowing other visitors to use … Read more

Does Host.co.in Purchase Third Party Softwares?

Host.co.in has designed all its web hosting services and plans with the inclusion of all required software and applications which includes Operating System and Database Licensing Fees, highly reliable and well-trusted Firewall and Anti-virus Applications. Apart from these if the client has any special demand then it solely depends upon how familiar Host.co.in’s support staff … Read more

How to Transfer Hosting Provider To Another?

There are certain key elements that should be taken into consideration while your move your website from a current web hosting services provider to another. Generally, your website and your emails are expected to start resolving in the next 24 hours, if it happens then you need not worry and you have successfully transferred your … Read more

What is Authorization Code?

When you transfer your website to a new web hosting services provider they ask you for an ‘Authorization Code’. It’s a Unique 6 to 32 character long code that is specially created to prevent any unsecured or unauthorized transfers of the website. This ‘Authorization Code’ provides a security feature as it works as a unique … Read more

How To Set / Reset MySQL Password?

Changing passwords is quite a regular type of task for many webmasters and the same is also applicable to database administrators also. Here I would like to share the procedure of changing the password of MySQL. The root user is the admin of a MySQL account. Remember that it is different than login into the … Read more

What Are The Features Of Cloud Hosting?

Maximum Scalability with Resources This is one of the most important features and also the major reason behind making cloud hosting services different than the other hosting services. A webmaster is totally free to scale the resources as per his own requirements. Without any limitation, he can assign the amount of RAM, Bandwidth, Disk-space and … Read more

How To Block Malicious Visitor And Websites Using .htaccess

As most of us know the importance of .htaccess file for a web hosting account, here you can know one of the most useful utilities of this file. It’s possible to block users or websites which are causing any malicious activities on your website. This utility not only makes your website more secured but also … Read more

How to Manage SSH Keys?

SSH keys are the great utility for Linux shared hosting clients. These SSH keys play an important role while allowing a specific computer system to access your website’s information through an SSH session. Find the ‘Generate a new Key and Import Key’ links and follow the following steps.