Breaking News
You are here: Home / Hosting

Category Archives: Hosting

Feed Subscription


Email Connection Settings for Aditya Hosting Webmail

Email Connection Settings for Aditya Hosting Webmail Email Connection Settings When setting up your email, it is important that your settings match. This article covers a complete set of matching settings to use for each desired email configuration for our servers. For mail hosted on cPanel you may use the following options for each protocol: Secure Connection Settings Secure SMTP: ... Read More »

Creating a Forwarder in cPanel:

Creating a Forwarder in cPanel Log into the c Panel. Click Forwarders in the Mail On the Forwarders  page, click Add Forwarder. On the Add a New Forwarder page, fill in the following sections. Below is a brief Description of the options: Option Description Address Type the email address username in the Address to Forward: field, and select the domain from the drop-down box. Destination Type the full email address ... Read More »

What is an Email Forwarder?

Email forwarders allow you to send a copy of an email from one email address to another email address automatically. If you have multiple email addresses for you business one good use for email forwarders to to have all the messages forward to one account. So if you have a,, and email addresses all of them can ... Read More »

Securing Websites

After you receive an SSL certificate for your website, secure the website with this certificate. To secure a website with an SSL certificate: Log in to the Control Panel and select the subscription that contains the website you want to secure in the Subscriptions menu at the top of the screen. Go to the Websites & Domains and select the ... Read More »

HotLink Protection

What is HotLink Protection? HotLink protection prevents other web sites from directly linking to files (as specified below) on your web site. Other sites will still be able to link to any file type that you don’t specify below (ie. html files). An example of hotlinking is using a <img> tag to display an image from your site from somewhere ... Read More »

What is SSH?

SSH allows secure file transfer and remote logins over the internet. Your connection via SSH is encrypted for a secure connection. You can manage your SSH keys to allow automation when logging in via SSH. Using public key authentication is an alternative to password authentication. Since the private key must be held to authenticate, it is virtually impossible to brute ... Read More »

Setting Up Email Verification Per Email Account

When the page loads you will see a list of all email accounts that have previously been created. Email accounts will be listed in a three-column table containing the following information: Account – This entry contains the email address. Status – There are two status options available (DISABLED and ENABLED). One of these options will be shown depending on the ... Read More »

What is a mailing list?

A mailing list can simplify sending messages to a large group of people. You can add a group of email addresses to a mailing list to avoid typing in those addresses each time a mailing is sent. This can be very useful when sending newsletters or other updates to large groups of people. Read More »

Add An Auto Responder

What is an Auto Responder? Auto Responders allow you to send an automatic response to anyone who sends an email your email account. When an email is sent to your account, the response that you have created will be sent back to the person who send you the email. This feature will not prevent your email from being delivered. This ... Read More »

What is Awstats?

Awstats is a web site analysis tool you can use to view the number of visitors to your web site, their activity including page view, reports on keywords used to reach your web site, and many other available reports that can help you monitor your web site’s overall activity. Read More »

How to Backup a Database – Plesk 10

The Plesk Backup Manager does not have an option for exporting database backups. Follow the steps below to use phpMyAdmin for database-only exports in Plesk. Step 1: Access phpMyAdmin VPS and Dedicated Server Log into the Plesk control panel. Click theDomains link in the navigation bar (in the upper, left-hand portion of the page). Find the domain containing the database you ... Read More »

What are the benefits of VPS Hosting?

VPS hosting gives you the affordability of shared hosting while at the same time giving you more power and control like a dedicated server. Privacy As you don’t share your OS with anyone else, there are no other websites on your server that potentially have access to your files. Customization With a VPS Server, you have your own Operating System. ... Read More »

What is VPS Hosting?

VPS hosting is a Virtual Private Server, and is a virtualized server. A VPS hosting environment mimics a dedicated server within a shared hosting environment. It is technically both shared hosting and dedicated hosting. VPS Hosting is one of several types of web hosting accounts you can choose from to host your website online. To have a website on the internet, you need to ... Read More »

How do I create and remove an Addon Domain?

Login to your cPanel and click Addon Domains, under Domains. There are three fields cPanel asks for when creating an Addon Domain. New Domain Name: Enter the new, but do not put http or www in the name. Username/directory/subdomain Name: This will be the folder cPanel creates in your public_html folder. Normally, you want to ensure the name you provide doesn’t ... Read More »

Create a subdomain

Create a subdomain To create a subdomain, perform the following steps: Enter the desired prefix in the Subdomain text box. Select the desired main domain from the menu. Enter the home directory for the subdomain in the Document Root text box. This directory will be where files that pertain to the subdomain will be placed. Click Create. Warning: Due to the order in which Apache ... Read More »

What is web disk?

The Web Disk application allows you to manage and manipulate files on your server in multiple types of interfaces, such as your PC, mobile device, or certain types of software. You can choose a more familiar interface that will make file management tasks easier to complete.  For example, if you access Web Disk from your computer, it will open in a window with which ... Read More »

Extracting and Creating Archive Files via SSH

Sometimes you would need to extract or create an archive file (i.e to install a script, you would usually download an archive and extract it to continue the installation). The very first step in the process would be to identify the exact archive type by looking at the file extension. The most common archive types are zip (ending with .zip), ... Read More »

Changing The MX Entry

1. First choose the email domain you want to modify in the “Change MX for” drop down menu. 2. Set the priority of the domain you are modifying in the “Priority” text box. To learn about MX Priority, view the MX Priority section above. Note: Please be aware 0 is the highest priority and 10 is the lowest priority. 3. Next, enter the ... Read More »

What is IMAP and which are the default IMAP ports

The Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a remote web server from a local client. IMAP and POP3 are the two most commonly used Internet mail protocols forretrieving emails. Both protocols are supported by all modern email clients and web servers. While the POP3 protocol assumes that your email is being accessed ... Read More »

What is Email Authentication

Email authentication helps to prevent spam. The options below attempt to equip email messages with verifiable information so that your server can automatically detect the nature of incoming and outgoing messages. Enable these features to reduce the number of failed delivery notifications you receive when spammers forge messages from your domain(s). These features also stop spammers who forge messages that ... Read More »

Scroll To Top
shared on