4:08 PM

(0) Comments

Web Hosting Technologies

Unknown

Windows Hosting

Windows hosting means hosting of web services that runs on the Windows operating system.
You should choose Windows hosting if you plan to use ASP (Active Server Pages) as server scripting, or if you plan to use a database like Microsoft Access or Microsoft SQL Server. Windows hosting is also the best choice if you plan to develop your web site using Microsoft Front Page.

Unix Hosting

Unix hosting means hosting of web services that runs on the Unix operating system.
Unix was the first (original) web server operating system, and it is known for being reliable and stable. Often less expensive than Windows.

Linux Hosting

Linux hosting means hosting of web services that runs on the Linux operating system.

CGI

CGI scripts are executables that will execute on the server to produce dynamic and interactive web pages.
Most ISPs offer some kind of CGI capabilities. ISPs often offer preinstalled, ready to run, guest-books, page-counters, and chat-forums solutions in CGI.
CGI is most common on Unix or Linux servers.

ASP - Active Server Pages

ASP is a server-side scripting technology developed by Microsoft.
With ASP you can create dynamic web pages by putting script code inside your HTML pages. The code is executed by the web server before the page is returned to the browser. Both VBScript and JavaScript can be used.
ASP is a standard component in Windows 95,98, 2000, and XP. It can be activated on all computers running Windows.
If you want to learn more about ASP, please visit our ASP tutorial.

PHP

PHP is the widely-used, free, and efficient alternative to competitors such as Microsoft's ASP.
PHP is perfectly suited for Web development, and can be embedded directly into the HTML code.
The PHP syntax is very similar to Perl and C.
PHP is often used together with Apache (web server) on various operating systems. It also supports ISAPI and can be used with Microsoft's IIS on Windows.
PHP supports many databases, such as MySQL, Informix, Oracle, Sybase, Solid, PostgreSQL, Generic ODBC, etc.
If you want to learn more about PHP, please visit our PHP tutorial.

JSP

JSP is a server-side technology much like ASP, developed by Sun.
With JSP you can create dynamic web pages by putting Java code inside your HTML pages. The code is executed by the web server before the page is returned to the browser.
Since JSP uses Java, the technology is not restricted to any server-specific platform.

Cold Fusion

Cold Fusion is another server-side scripting language used to develop dynamic web pages.
Cold Fusion is developed by Adobe.

Chili!Soft ASP

Microsoft's ASP technology runs only on Windows platforms.
However, Chili!Soft ASP is a software product that allows ASP to run on UNIX and some other platforms.

Microsoft FrontPage

FrontPage is a website design tool developed by Microsoft.
FrontPage allows users to develop a web site without any deep knowledge of web development.
Most Windows hosting solutions support FrontPage server extensions for users that use FrontPage to develop their web site.
If you plan to use FrontPage, you should look for a Windows hosting solution.

Adobe Dreamweaver

Dreamweaver is a website design tool owned by Adobe Systems.
Dreamweaver allow users to develop a web site without any deep knowledge of web development.
Dreamweaver has support for web technologies such as CSS, JavaScript, ASP.NET, ColdFusion, JavaServer Pages, and PHP.
Dreamweaver is available for both Mac and Windows operating systems.

Secure Server

A secure server can transmit data encrypted.
If you plan to do online creditcard transactions, or other types of web communication that needs to be protected against unauthorized access, your ISP must provide a secure server.

4:06 PM

(0) Comments

Web Hosting E-mail Services

Unknown

E-mail Accounts

Hosting solutions should include e-mail accounts for each person in your company.
E-mail addresses should appear something like this:
john@mycompany.com
john.doe@mycompany.com
jdoe@mycompany.com

POP E-mail

POP stands for Post Office Protocol. POP is a standard client/server protocol for sending and receiving e-mail.
The e-mails are received and held on your internet server until you pick it up with a client e-mail program, like Microsoft Outlook or Mozilla Thunderbird.

IMAP Email

IMAP stands for Internet Message Access Protocol. IMAP is another standard protocol for sending and receiving e-mail.
The e-mails are received, and held on your internet server, until you pick it up with a client e-mail program, like Microsoft Outlook or Mozilla Thunderbird.
IMAP represents an improvement over POP because e-mail stored on an IMAP server can be manipulated from several computers (a computer at home, a workstation at the office, etc.), without having to transfer messages back and forth between computers. POP was designed to support e-mail access on one single computer.

Web-based E-mail

Web-based e-mail services enable you to access your e-mail via a web browser. You log into your e-mail account via the Web to send and retrieve e-mail. Being able to access your e-mail from any browser anywhere in the world is a very attractive option.
Examples of web-based e-mail services are Gmail and Hotmail.

E-mail Forwarding

E-mail forwarding allows you to have multiple e-mail personalities.
With e-mail forwarding, you can setup aliases for other e-mail accounts like:
postmaster@mycompany.com should be forwarded to peter@mycompany.com
sales@mycompany.com should be forwarded to mary@mycompany.com

Mailing Lists

Some service providers offer mailing list capabilities. This is valuable if you plan to send out e-mails to a large number of users.

4:04 PM

(0) Comments

Connection Speed

Unknown

In the early days of the Internet a T1 connection was considered a fast connection. Today connection speeds are much faster. 1 byte equals to 8 bits (and that's the number of bits used to transport one character). Low-speed modems can transport from about 14 000 to 56 000 bits per second (14 to 56 kilobits per second). That is somewhere between 2000 and 7000 characters per second, or about 1 to 5 pages of written text.
One kilobit (Kb) is 1024 bits. One megabit (Mb) is 1024 kilobits. One gigabit (Gb) is 1024 megabits.
These are connection speeds used on the Internet today:

Name Connection Speed per second
Modem Analog 14.4-56Kb
D0 Digital (ISDN) 64Kb
T1 Digital 1.55Mb
T3 Digital 43Mb
OC-1 Optical Carrier 52Mb
OC-3 Optical Carrier 156Mb
OC-12 Optical Carrier 622Mb
OC-24 Optical Carrier 1.244Gb
OC-48 Optical Carrier 2.488Gb
Before you sign up with a host provider, surf some other web sites on their servers, and try to get a good feeling about their network speed. Also compare the other sites against yours, to see if it looks like you have the same needs. Contacting some of the other customers is also a valuable

4:04 PM

(0) Comments

Web Hosting Capacities & Monthly Traffic

Unknown

How Much Disk Space?

A small or medium web site will need between 10 and 100MB of disk space.
If you look at the size of HTML pages, you will see that the average size is very small. But if you look at the size of the images used inside these pages, you will often find the images larger than the page.
Expect each HTML page to take up between 5 and 50KB of disk space on your web server, depending on the use of images or other space-consuming elements.
If you use a lot of images or graphic elements (or sound files or movies), you might need much more disk space.
Make sure you know your needs, before choosing a web host.

A small or medium web site will consume between 1GB and 5GB of data transfer per month.

Calculate the following: average page size * expected page views per month
Example: If your average page size is 30KB and you expect 50,000 page views per month, you will need 0.03MB * 50,000 = 1.5GB.
Larger, commercial sites often consume more than 100GB of monthly traffic.
Before you sign up with a host provider, make sure to check this:
  • What are the restrictions on monthly transfer?
  • Will the web site be closed if it exceeds the volume?
  • Will you be billed a fortune if the web site exceeds the volume?
  • Is upgrading a simple task?

4:03 PM

(0) Comments

What is SSL and what are Certificates?

Unknown

The Secure Socket Layer protocol was created by Netscape to ensure secure transactions between web servers and browsers. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both end of the transactions. This is in short how it works.

  1. A browser requests a secure page (usually https://).
  2. The web server sends its public key with its certificate.
  3. The browser checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the site contacted.
  4. The browser then uses the public key, to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data.
  5. The web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data.
  6. The web server sends back the requested html document and http data encrypted with the symmetric key.
  7. The browser decrypts the http data and html document using the symmetric key and displays the information.
Several concepts have to be understood here.

4:03 PM

(0) Comments

What about S/Mime or other protocols?

Unknown

If SSL was developed for web servers, it can be used to encrypt any protocol. Any protocol can be encapsulated inside SSL. This is used in IMAPS, POPS, SMTPS,... These secure protocols will use a different port than their insecure version. SSL can also be used to encrypt any transaction: there is no need to be in direct (live) contact with the recipient. S/Mime is such protocol, it encapsulates an encrypted message inside a standard e-mail. The message is encrypted using the public key of the recipient. If you are not online with the recipient then you must know its public key. Either you get it from its web site, from a repository, or you request the recipient to e-mail you its public key and certificate (to ensure you are speaking to the right recipient).
In a reverse order, the browser can send its own signed certificate to the web server, as a mean of authentication. But everybody can get the browser certificate on the CA web site. Yes, but the signed certificate has been sent encrypted with the private key, that only the public key can decrypt.

4:02 PM

(0) Comments

private Key/Public Key

Unknown

The encryption using a private key/public key pair ensures that the data can be encrypted by one key but can only be decrypted by the other key pair. This is sometime hard to understand, but believe me it works. The keys are similar in nature and can be used alternatively: what one key emcrypts, the other key pair can decrypt. The key pair is based on prime numbers and their length in terms of bits ensures the difficulty of being able to decrypt the message without the key pairs. The trick in a key pair is to keep one key secret (the private key) and to distribute the other key (the public key) to everybody. Anybody can send you an encrypted message, that only you will be able to decrypt. You are the only one to have the other key pair, right? In the opposite , you can certify that a message is only coming from you, because you have encrypted it with you private key, and only the associated public key will decrypt it correctly. Beware, in this case the message is not secured you have only signed it. Everybody has the public key, remember!
One of the problem left is to know the public key of your correspondent. Usually you will ask him to send you a non confidential signed message that will contains his publick key as well as a certificate.

4:02 PM

(0) Comments

What is SSL and what are Certificates?

Unknown

The Secure Socket Layer protocol was created by Netscape to ensure secure transactions between web servers and browsers. The protocol uses a third party, a Certificate Authority (CA), to identify one end or both end of the transactions. This is in short how it works.

  1. A browser requests a secure page (usually https://).
  2. The web server sends its public key with its certificate.
  3. The browser checks that the certificate was issued by a trusted party (usually a trusted root CA), that the certificate is still valid and that the certificate is related to the site contacted.
  4. The browser then uses the public key, to encrypt a random symmetric encryption key and sends it to the server with the encrypted URL required as well as other encrypted http data.
  5. The web server decrypts the symmetric encryption key using its private key and uses the symmetric key to decrypt the URL and http data.
  6. The web server sends back the requested html document and http data encrypted with the symmetric key.
  7. The browser decrypts the http data and html document using the symmetric key and displays the information.
Several concepts have to be understood here.

4:01 PM

(0) Comments

Expired Domains

Unknown

 Another source for domain registrations is expired domains.

When you register a domain, think of it as a rental, assuming there are no legal or trademark issues with the domain name, you are free to use it as long as you continue to pay the yearly fee (you can now register in advance as many as 10 years). Some people register domains as speculators, hoping that they can later sell them, while others may have planned to use a domain and never had the time. The result is that domains that were previously registered, become

Use Your Domain Name

After you have chosen and registered your own domain name, make sure you use it on all your web pages, and on all your correspondence, like e-mail and traditional mail.
It is important to let other people be aware of your domain name, and to inform your partners and customers about your web site.

4:00 PM

(0) Comments

Sub Domains

Unknown

Most people are unaware that they use sub domains daily. The famous "www" of the World Wide Web is an example of a sub domain. Sub domains can be created on a DNS server, and they don't need to be registered with a domain name registrar, of course, the original domain name needs to be registered before a sub domain could be created.
Examples of sub domains used on the internet are http://store.apple.com and http://support.microsoft.com.
Sub domains can be requested from your web hosting provider.

False Domain Names - Directory Listings

Some providers will offer you a name under their own name, like:  www.theircompany.com/yourcompany/
This is not a real domain name, it is a directory - and you should try to avoid it.
Directory domains are not desirable, especially for companies.
Typically, directory domains are used for personal web sites and free web sites provided by an ISP, you may have seen www.theircompany.com/~username as an address.
Competition in domain name registration has resulted in a dramatic decrease in pricing, so domain sharing is not common, since it is possible to register a domain name for only $15 per year 

3:59 PM

(0) Comments

Choosing a Domain Name

Unknown

Choosing a domain name is a major step for any individual or organization.
New domain name extensions and creative thinking still offer thousands of excellent domain names!
When choosing a name, it is important to consider the purpose of a domain name, which is to provide an easy way to reach your web site.
The best domains have the following characteristics:
Short - People don't like to type! A short domain name is easier to type, read, and remember.
Meaningful - A short domain is nothing without meaning, 34i4nh.com is not easy to enter or to remember. Select a domain that relates to your site in a way that people will understand.
Clear - Clarity is important when selecting a domain name. Avoid a name that is difficult to spell or pronounce.
Exposure - Names that are short and easy to remember are an asset. In addition to visitors, also consider search engines. Search engines index your site and rank it for relevance against terms people search for. In order to maximize your sites exposure, consider including a relevant search term in your domain. Of course, only consider this if it still maintains a short, clear and meaningful domain name.

3:58 PM

(0) Comments

Web Hosting Domain Names

Unknown

A domain name is a unique name for a web site, like w3schools.com.
Domain names must be registered. When domain names are registered, they are added to a large domain name register. In addition, information about the web site, including the IP address, is stored on a DNS server.
DNS stands for Domain Name System. A DNS server is responsible for informing all other computers on the Internet about the domain name and the web site address.

Registering a Domain

 Domains can be registered from domain name registration companies.These companies provide interfaces to search for available domain names, and they offer a variety of domain name extensions that can be registered at the same time.