Kateqoriyalar

IP Deny Manager 4

This feature is capable of blocking a single IP address or a range of IP addresses from accessing your site. Fully qualified domain names (FQDNs) can also be banned

Password Protect Directories 6

Password protecting a directory restricts access to certain parts of your website by requiring visitors to enter a username and a password. This password process is also referred to as a type of “authentication” process. While using this feature, navigate the directories by clicking the folder icon located next to the name of the directory. Clicking on the name of the directory will select the directory for password protection. Note: Any subdirectories inside the selected directory will also be password protected.

SSH/Shell Access 10

SSH (secure shell) and Telnet are examples of network protocols that make remote server management possible by allowing you to control another computer (ie, your web server) over the Internet through a command line interface (CLI). This can be used, for instance, when configuring CGI scripts. SSH is included with many modern operating systems including Mac® OS X and Linux distributions

SSL/TLS Manager 8

The SSL and TLS features are intended to make your website more secure. These features generate and manage SSL certificates, signing requests, and keys. This is useful for websites that will use logins and credit card numbers, since information will be sent to and from your website over the Internet as encrypted data versus plain text. This makes it difficult for malicious users to intercept communications between visitors and your website.

Məqalələr

 Add a GnuPG Key

GnuPG keys use the “public key approach” to encryption. Messages are sent once they...

 Add a GnuPG Key

GnuPG keys use the “public key approach” to encryption. Messages are sent once they...

 HotLink Protection

A hotlink occurs when content from your site is embedded on another site, using your bandwidth to...

 HotLink Protection

A hotlink occurs when content from your site is embedded on another site, using your bandwidth to...

 Leech Protect

Leeching occurs when users publicly post their username and password to a restricted area of your...

 Leech Protect

Leeching occurs when users publicly post their username and password to a restricted area of your...