HOME | ABOUT US | CONTACT


 


 

 

control panel   

File Manager

The files in your site are stored in directories.  Directories can hold other sub-directories. The result is a directory structure that can have many sub-levels. Any of those directories can contain files.  How you organize your directory structure is up to you.

Similar to Microsoft Windows Explorer in function, the File Manager Option allows you to perform file management tasks such as creating files and directories, setting the read, write or execute permissions on the files and directories in your site, renaming or deleting files or directories, and changing the password for directories that are password-protected.

  • From the Control Panel, select the File Manager icon.

  • Once the File Manager window has opened, you will see a listing of directories and files located in your Current Directory, the path of which is displayed in the listing above (File Manager does not display hidden files, i.e., files whose names begin with a period such as “.htaccess”).

  • Each directory and file will appear as a hypertext link. Simply click on any link to drill down into that directory or to open the file (if it can be opened by the browser).

  • When in a directory that has a large number of files, the files are listed alphabetically by file name. The alphabetical sorting option is case-sensitive. File names beginning with upper-case letters come before file names beginning with lower-case letters.  The sort order is A-Z, then a-z.  This means, for example, you could have a file named "WORDS.TXT" listed before a file named "a-plus.htm".

Changing File and Directory Permissions:

Permissions can be set for your directories and files. These permissions determine who can view, write to, and/or use the directories and folders in your site.

The permission settings are each comprised of nine letters (or characters) in a row that appear to the far left of the listing for each directory or file.  Each letter represents a type of access, while the position in the nine-digit string dictates who has that type of access.

The characters displayed in these settings can be r, w, x or -.

  • r stands for read access; whoever has this level of access can view the file or directory.

  • w stands for write access; whoever has this level of access can overwrite existing files or write new files in the specified directory.

  • x stands for execute access; whoever has this level of access can run executable files.

  • - (the dash) indicates that no permission is given.

The first three positions in the nine-digit string are the permission settings for the owner.  The second three digits are for any groups (if any groups are created), while the last three digits are the permission settings for others (anyone who is not the owner, or is not a part of a previously declared group).

How To Change Permission Settings on Files and Directories:

  • From within the File Manager screen, click on any of the Permission Setting links for the desired file or directory.  The Change Permission screen displays.

  • The Change Permission of file or directory name message indicates which file or directory permissions you are changing.  Once a directory's permissions are set, you can access specific sub-directories and files within the directory to alter the settings on an individual basis.

  • Notice in the Change Permission screen the nine-digit setting is split up into the groups that were discussed earlier: Owner, Group and Others.

  • As the owner of the file or directory, typically you should have full access, so all three settings r, w, x (read, write, execute) should be selected.

  • If you have set up groups (which involves the creation of a group and the addition of usernames into the group) select the appropriate permission settings.

    If this group is a collection of people to which you are giving the ability to see and use files which you are otherwise denying to other people, then select the read and execute settings.

  • If this group is more of a workgroup, containing members who will be working with files and directories on your site, then it would be appropriate to select the write setting also.

  • The Other settings depend on how much access you want to give provide globally.

  • Typically, both read and execute access are given to everyone while write access is denied.  This allows people to view and use your site without being able to change it. However, there may be items that you wish to keep hidden globally, in which case you would disable the read and, depending on the file or directory, execute permissions.


Mail Manager

The Mail Manager option provides several ways of managing the mail accounts you set up on your account.  Additionally, if you have set up Mailing Lists for your account, you can manage them using this tool. 

Within your Mail Manager you are able to create new POP3 email accounts, change passwords for your email accounts, delete a POP3 account, forward email, and create autoresponders.

Getting Started
You will initially see two email accounts, one named your username and one named default, these were created by the system—DO NOT DELETE either of these or your email will cease to function and simply recreating them will not fix the problem.

Creating New POP3 Accounts
To create a new POP3 Email account simply click on the "New Address" link located under your default accounts and you will be taken to the following screen.

Forwarding Email
You can forward email coming to any of your POP3 accounts that you have created within your account to another account you have created or to an account outside of your domain by simply clicking on the email account that you want to forward. You will be taken to the the same screen where you change the password and delete the account.

Below those areas you will see a list of the email accounts that you have created. Simply click on the account where you want to forward the email to or you can move further down the screen and type in the email address located outside of your domain where you would like the email to be forwarded to.

Once you've made your choices, just be sure to scroll to the bottom of the screen and click the save button to save your changes.

Create Autoresponders
You can create an autoresponder for any POP3 email account that you have listed in your Mail Manager. Simply click the email account that you want to create an autoresponder for and you will be taken to the same screen that you Change Password, Delete, or choose Forwarding Options for that email account.

Scroll to the bottom section of that screen and you will see same screen as displayed above. Click the box to indicate you are including an autoresponse when this email address receives email and then type in your response for the autoresponder, you then click save to save your changes.

About Email Aliases
You never have to create email aliases. Your default email account is setup as a "Catch All" account, meaning that any email coming to anything@yourdomain.com is delivered to your default account.

Notes:

  • Autoresponders only work for email sent to that address. If a particular address is being forwarded to any other address (either internally or externally), the autoresponder will not get sent.
  • If one address is being forwarded to another internal mailbox, and that address is being forwarded elsewhere (either internally or externally), the mail will not make it thru to the final destination... it will only go to the mailbox in the middle and won't be sent from there. For example: yourname@yourdomain.com is being forwarded to yourname@aol.com. And you want your default mail set up so that anythingdefault@yourdomain.com goes to your AOL account as well, you will have to set up separate forwards for each one. If you set it up so anythingdefault@yourdomain.com goes to yourname@yourdomain.com, even though yourname@yourdomain.com points to AOL, it will not go...it will remain in yourname@yourdomain.com. So set up a separate forward and you will be all set.

Mailing Lists
The Mailing List option, once installed, allows you to create and manage your own mailing lists, which is an efficient way of communicating with many people at one time. You create and manage your mailing lists using the Mail Manager option.  But you first need to install Mailing List on your site. You do this by using the Mailing List option.

How To Manage a Mailing List Using Mail Manager:

  • From the Edit Mailing List page, select the Mailing List Manager link.  A page titled X Command displays and the name of the mailing list you are editing appears near the top of the screen.
  • Many of the fields on this screen are actually commands that you can perform on your mailing list.  You simply select the command you would like to use, fill in the appropriate information and then select the Execute Xcommand button to make the change occur.
  • If you have not already set up the Maintainer email and password on the Edit Mailing List page, enter that information in the appropriate fields on this page.
  • If you would like to have either the list of subscribers or the list log emailed to you (as the maintainer), enter the email address in the Maintainer email field and the maintainer password in the password field, then select either Show List of Subscribers or Show List Log.  If you would like to clear out the list log, complete the Maintainer email and password fields and select the Wipe List Log. Once your selections have been made, select the Execute Xcommand button to perform the action.  An email message will be sent to the email address entered in the Maintainer email field including the results of the action you selected.
  • To look up a specific email address in the list of your mailing list subscribers, click on the Select list of subscribers for a near match option, enter the address for which you are searching, and select the Execute Xcommand button to perform the search.  Results will be emailed to the address in the Maintainer email field.
  • If you would like to directly subscribe or unsubscribe a user from the mailing list (rather than having the user do it), select either the Subscribe or Unsubscribe option, enter the desired user’s email address in the email field, and select the Execute Xcommand button.  A confirmation message will be sent to the address listed in the Maintainer email field.

How To Administer a Mailing List Using Mail Manager:

  • From the Edit Mailing List page, select the Administer mailinglist link.  A page titled Administer Mailing list – mailinglistname displays.

  • Enter the Maintainer’s email address in the Maintainer/Moderator Email Address field.

  • Select the option that accurately describes the purpose of your list.  The choices are: 

    • Newsletter: A Mailing List created as a Newsletter will only be usable by you as the Moderator.  Others will not be able to send mail to be distributed by the list. This is a good way to distribute one message to many of your mailing list subscribers.

    • Subscriber-Only List:  Only people who deliberately subscribe to the mailing list can send mail to or receive mail from the list.

    • Moderated List:  The mail from the list is screened and if appropriate, edited or deleted before being allowed to be sent to all subscribers to the list.

There are many more advanced options that can be configured in Mailing Lists. Click here for details.


Site Statistics:

Many statistics about the usage of your web site are available through the Site Statistics option in the Control Panel (the statistics are generated by the http-analyze program, by Rent-A-Guru).

The main statistics displayed are:

  • Hits: The number of times your site is given a request for information from a web browser (note: a web page with two images would generate three “hits”, one each for the images, and one for the page itself.)

  • Files: The number of times a web browser requests a file and the server on which your site resides delivers that file.

  • Pageviews: The number of times a web browser requests a text or html file, which shows a truer reflection of the actual documents requested from your site.

  • Sessions:  The number of unique hosts accessing the server during a given period of time.

  • Kbytes Sent:  The amount of data sent during the summary period as reported by the server.


Website Builder:

The Site Creation Tool allows you to create your website quickly and easily. It is an alternative to using other applications, such as Microsoft FrontPage, Macromedia Dreamweaver, or Netscape Composer.  The tool is self-guided and self-explanatory.

This lets you: 

  • Create Your Web site: This option allows you to create and/or edit the web pages on your site.

  • Change Default Pages: This option allows you to set the home page which you create with the Site Creation Tool to be the default page for your site.

  • View Your Site:  This option opens your site’s home page in the current browser window.

  • And more...just follow the links and you'll be on your way! 


Counter:

The Counter tool allows you to set up a page-hit counter on your site, which lets you determine how many times that page has been visited.  This counter is displayed on the webpage and can be viewed in various counter styles.  Additionally, you can start the counter at any number you set, and it will count hits and add them to that number.


Protect Directories:

Using the Protect Directories tool, you can limit the amount of access users have to your site.  You can specify a username and password for the directory you are protecting.  Each protected directory can have multiple users (each with different passwords if you prefer) who have access to it.  Additionally, the Protect Directories option can be used to remove a user’s access from a protected directory.

Example: If you want to grant only select users access to a particular directory on your site, you can set up protection on that directory by using one user name and one password.  Then, if someone requests access to files in that directory, you can give that user the corresponding user name and password.

Alternately, you can set up unique user names and passwords for each user who request access to the protected directory.  Though more time consuming, this method would be more secure.


Redirect URL Tool:

The Redirect URL tool allows you to change the page that appears when a user enters a specific web address. It will let you forward visitors to another URL or to particular pages of another URL.

Example: There are a number of old URLs for your site’s home page that are no longer current, yet people still use them.  You don’t really want people going to those old URLs because either an outdated page will display or they’ll get an error. Set up Redirection for these old URLs, so that when users enter them into their web browsers, the file at your current URL displays instead.


Search Engine:

The Search Engine utility allows you to install a Search Engine on your website. This tool allows users to perform searches for content on your site.

Once the Search Engine is installed, configured and indexed, it will be available on an webpage located on your site. You will need to create links to this Search page.

When you install the Search Engine, it automatically creates an index of your site. If you make changes to your site (like adding pages), or change the configuration (as done in the above procedure) you will need to re-index the site so that all new changes are reflected in the Search index. This helps to ensure that the Search Engine returns accurate, up-to-date search results when users perform searches on your site.


Anonymous FTP:

Anonymous FTP (File Transfer Protocol) is a method by which your guests can upload or download files to your site. The Anonymous FTP option allows you to install Anonymous FTP for your site (if it is not already installed) or to remove it once it has been installed.

ANONYMOUS FTP WARNINGS:

Security
Anonymous FTP will grant any and all users the ability to access your "upload" directory, or any directory on your domain that has been set for "public" read/write permissions. Anonymous users will have access to upload or download files to and from your domain. You must set the appropriate permissions for your directories to restrict anonymous FTP access. This is needed to ensure that anonymous users will not be able to access any existing files or directories. You can inhibit access to specific files and directories using the File Manager by disabling public read and/or write access to the files or folders you don't want people to see (i.e.. cgi-local).

Responsibility
As the account owner, you are responsible for any and all files that are stored on your domain. This would include files that were uploaded by you as well as by anonymous FTP users. With the use of anonymous FTP, your site is susceptible of becoming a "warez" site. Typically, these are sites that are used by "hackers" to trade (upload/download) illegally pirated copies of software programs with one another. As the account owner, the complete content of your account is your responsibility. If your site becomes a trading post for "warez" programs, you may face legal action that can be taken against you by the programmers/software companies of the copyrighted software, in addition to your account being deleted from our servers. Please refer to our User Agreement for more information.

Data Transfer
Any and all FTP download transfers, Anonymous FTP included, will be used in the calculation of the total data transfer for your account. If this total data transfer amount exceeds the limit that is set for your plan, you will be responsibility for any and all overage charges that occur. Please Note: There will be NO exceptions made for these overage charges. Once Anonymous FTP has been enabled, it will be your responsibility to monitor the anonymous FTP activity for your account. All Anonymous FTP activity is stored within the "xferlog" file. This file contains entries for each and every anonymous FTP upload/download session. This file is located within the /stats directory of your account. There is also a link provided off the "View your web usage statistics & logs" page of your account Control Panel.

Disk Space
If you are going to allow people to upload files to your site, make sure you keep track of your disk space usage via your Control Panel. Do not allow your disk space usage to get too close to your maximum disk space allocation or you may experience problems accessing your site via FrontPage and/or be unable to upload or modify files.

Your Anonymous FTP site is completely different from your website. When people FTP to your domain anonymously, they will see the following directories:

bin/
dev/
etc/
incoming/
lib/
pub/

"pub" is where you should put all your anonymously accessible files. "incoming" is for the anonymous users to upload files.

You may ignore the other directories.

To access the Anonymous FTP site via the web, use the following address: ftp://yourdomain.com/pub/. Anonymous visitors wishing to access your site via FTP client (e.g. ws_ftp) must use your domain name as the FTP hostname, userid of "anonymous" and password of "guest".

For security reasons:

- Only the incoming directory can be written to anonymously
- Sub-directories are not createable
- The incoming directory is not readable by people dropping files there

You are responsible for any "pirated" software uploaded by the anonymous users. Anonymous FTP sites are periodically monitored for any abuses.


Archive Manager:

The Archive Manager provides a method of backing up files on your site by compressing them.  It is always good practice to back up files in case damage should occur to original files.  Compressing files allows you to reduce the amount of storage space your files take up, thus freeing more space for you to work with on your site.


Mime Types:

Mime Types represent file types as presented to your web browser.  The Mime Type option in the Control Panel allows you to specify which types of files you can open with your web browser.


PGP:

PGP, which stands for Pretty Good Privacy, is a method of encryption you can apply to scripts that run on your web site along with the email you send through it. 

PGP is software that you can download or buy. Using this software, you generate your own PGP encryption “key”.  You must do this before you can make use of the PGP option in the Control Panel.

The PGP option in the Control Panel performs two functions:

  • It provides you with instructions for using PGP on the web server on which your site resides

  • It allows you to add or delete your PGP key from that server.

Formmail:

Formmail allows you to use an online form that will email the results to you. The Formmail option provides step-by-step instructions on how to set this up on your website.


PGPMail:

PGPMail is similar in function to Formmail except that it enables you to encrypt the results of the form. The PGPMail option provides step-by-step instructions on how to set this up on your website.


MySQL:

The MySQL option is available in select hosting plans. It allows the setup of a MySQL database on your site.  Once the database has been installed, there is documentation available within the MySQL Option for managing the database. 

After your MySQL database has been installed, accessing the MySQL icon on the Control Panel will open the database.

Main MySQL Screen:

  • The left frame displays the names of the databases available to you.

  • The right frame welcomes you to phpMyAdmin, which is the name of the administrative tool you are now using to manage your MySQL database.

  • The link Show MySQL runtime information displays the following table of statistics about your database.
  • The link Show MySQL system variables displays the following table of statistics about your database.

Setting Up MySQL Databases:

When you initially install MySQL on your site, you essentially create a blank database.  In order to work on your database, you must add tables to it.

Working with existing tables:

After you have added tables to your database, subtle differences to the main database page will appear on subsequent visits.  More options will be available to you, all of them as a result of the fact that your database now has tables with which you can work. For instance, if you single-click on the plus sign in the left frame beside your database name, a listing of all of the tables within your database appears.

Tables can be opened from this listing of tables.  Single-click on the table name in the left frame to open the table in the right frame

Notice that the fields and key of your table are listed along with various commands (appearing as blue text in the image above). These commands allow you to change or drop any field you choose and to perform other actions.

Underneath the Documentation link are tools for working with the fields including Inserting data into the fields.

Run Query and Query by Example:

From the main database page, you can run queries against your database. When you query a database, you specify the criteria or description of that query.  Then you send that information to the database and the database returns results from its data that match the criteria you set.  This query box should only be used if you know how to write queries manually.

The Query By Example link allows you to create a request for information from your database using a form rather than typing the query from scratch.


Secure Server:

The Secure Server option provides you with instructions for setting up a Secure Server through Verisign or Thawte.  Verisign and Thawte are companies that provide digital certificates used for secure transactions. Step-by-step directions are provided within the Secure Server Manager.

Setting up a Secure Server requires that you purchase a secure digital certificate from either Verisign or Thawte.  This is a two-step process.  Follow the steps outlined in the Secure Server Manager to complete the setup.


Telnet/SSH:

Telnet/SSH allows you to manage secure telnet access to your account.  Much of the functionality of Telnet is more easily handled through the File Manager option in the Control Panel. However, there may be instances when using Telnet (outside the operation of the File Manager) is required to get the job done.

The implementation of telnet that we use is called SSH. To use telnet (SSH), we require the user to send us a fax with a copy of their photo ID requesting SSH. Users also need an RSA Key entered in the control panel in order to access it. We also require the user to use SSH software.The only way to gain Telnet access to your account is by using SSH Secure Telnet software that must be loaded on your computer.  The recommended software is Van Dyke Technologies’ Secure CRT

The SSH Option allows you to upload the RSA (Rivest, Shamir, Adleman) key generated on your computer by the SSH software to the server on which your site resides.  Once completed, you will have secure Telnet access to the site.


Network Trouble Shooter:

The Network Trouble Shooter provides you with access to a common network tracing utility named Traceroute.  Traceroute does exactly what its name implies, tracing the route of data from your domain to the server you specify.  The results of performing a Traceroute show you every server your packets of information are going to in order to connect to that server. 


Submit Site to Search Engines:

The Submit Site to Search Engines utility is a powerful tool that allows you to quickly submit your web site to some of the most popular web search indexes.  These include: Infoseek, Webcrawler, AltaVista, Lycos, Excite, HotBot, Infoseek, Yahoo, Netfind, Magellan, What You Seek, Infospace, and more.

This is an effective way of ensuring that the site you create gets optimal audience and web traffic. While you can submit your site to search engines without the aid of this option, it can be a very time consuming process.  The Submit Site to Search Engines option makes the process a quick and easy one.


Click here to view a screenshot of the Control Panel.

Click here to download the complete Control Panel Manual (a 1.89 MB Word Document in a .zip file).

Click here to go back to previous page.

 
     TOP | HOME  | CONTACT

                          © Copyright 1996-2015 Host And Design Services. All rights reserved.