19 Jan, 2026
Welcome! Guest
[ Login ]
Home News & Events About Us Services FAQ Knowledge Base Affiliate Program Signup Contact Us
The ONE STOP SOLUTION to all your eBusiness Needs!
Overview
Knowledge Base

Our new knowledge base is a valuable collection of technical information, web site marketing tips, tutorial, glossary, and documentation.

If you feel anything is missing, or still have questions, please contact us. Looking for something specific? Can't see it here? Try our "Knowledge Base Search".


Domain Names Knowledge

  • How do I change DNS records if my domain is registered with Directnic?

    How do I change DNS records if my domain is registered with Directnic?


    If your domain is registered with Directnic and you want to use Focus Network Company web hosting or E-Store service, you'll just need to follow these simple steps in order to point the domain to our name servers.

    1. Log in to your Directnic account and click on the Domain Manager link. http://www.directnic.com

    2. Click on the Change Nameserver Information icon located to the right of your domain name, under the Options heading.
    3. Replace the nameserver information listed with the below.
      ns1.powersx.com
      ns2.powersx.com
    4. Click on the Modify button at the bottom of the page and you're done.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Required Documents of Hong Kong Domain Name

    Required Documents of Hong Kong Domain Name


    Domain CategoryEligible Applicant
    Examples of Document
    .hkLocal or overseas individuals or entities
    • (Organization Registration) A copy of the Business Registration Certificate (BR) issued by the Inland Revenue Department (IRD) of HKSARG (NOT registered as a Branch) i.e. name of the organization shall be that of the head office, not branch office, or
    • (Individual Registration) A copy of HKID card or other document proofing that you are a resident of HKSAR.
    .com.hk / .公司.hkCommercial entities registered in HKSAR
    • A copy of the Business Registration Certificate (BR) issued by the Inland Revenue Department (IRD) of HKSARG (NOT registered as a Branch) i.e. name of the organization shall be that of the head office, not branch office, or
    • A copy of the Certificate of Registration of Overseas Company issued by the Company Registry (CR) of HKSARG, or
    • Other documentary proof required for the application of .org.hk, .edu.hk, .net.hk or .gov.hk with a letter stating the reason of selecting .com.hk.
    .org.hk / .組織.hkRegistered or approved not-for-profit organizations in HKSARG
    • A copy of the tax exemption letter issued by Inland Revenue Department (IRD) that shows your organization is a charity or non-profit making organization (under Section 88 or 87), or
    • A copy of the Certificate of a Society issued by Hong Kong Police, or
    • A copy of the proof showing exemption from Registration of a Society issued by Hong Kong Police, or
    • A copy of the Certificate of Registration for trade unions or other unions, or
    • A copy of Certificate of Owners' Corporation under Building Ordinance, or
    • A copy of Registration of a Hospital / Nursing Home (under Section 88 of the Inland Revenue Ordinance), or
    • A copy of the Certificate of Registration of a Child Care Centre, or
    • Application letter issued by Government Department, or
    • Gazatte / Ordinance mentioned the establishment of your organization together with an application letter issed by your organization if you are a statutory body, or
    • A copy of the Memorandum of Association shows that no dividend per share to shareholders plus copy of the Business Registration Certificate or Certificate of Incoporation, or
    • Other valid document proofing the non-profit making nature of your organization.
    .edu.hk / .教育.hkRegistered schools, tertiary institutions and other approved educational institutions in Hong Kong
    • A copy of the Certificate of a School issed by Education and Manpower Bureau of HKSARG, or
    • A copy of the Ordinance showing that your institute is established by law together with an application letter issued by your institute, or
    • A copy of the Certificate of Registration of a course issued by Education and Manpower Bureau of HKSARG, or
    • A copy of the Certificate of Registration of a Child Care Centre (for Nurseries Running Educare Services or Pre-Primary Curriculum for Children between 2 to 6 years old), or
    • A copy of the Certificate of Education (for Nurseries Running Educare Services or Pre-Primary Curriculum for Children between 2 to 6 years old)
    .net.hk / .網絡.hkEntities managing network infrastructure, machines and services with a license from the Office of Telecommunications Authority of the HKSARG
    • A copy of the PNETS (IVANS / ISP) license issued by the Office of the Telecommunications Authority of the Government HKSAR, or
    • Fixed Telecommunication Network Services (FTNS) / Fixed Carrier License.
    .gov.hk / .政府.hkBureaux or Departments of the HKSARG
    • Subject to the endorsement by the Office of Government Chief Information Officer
    .idv.hk / .個人.hkResidents of HKSAR
    • A copy of HKID card or other document proofing that you are a resident of HKSAR.
      (For the registration of .個人.hk, the domain name you selected shall be your legal name)


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do I change DNS records if my domain is registered with GoDaddy?

    How do I change DNS records if my domain is registered with GoDaddy?


    If you recently purchased Focus Network Company web hosting or E-Store, but your domain name was previously hosted somewhere else, you will need to change your DNS information to the follow these simple steps:

    1. Log in to the GoDaddy Account Manager. http://www.godaddy.com
    2. Select Manage Domains from the Domain Names dropdown menu or the Manage Your Account list.
    3. Select the domain name you wish to modify using the checkboxes and then click Set Nameservers Icon.
    4. Select Custom nameservers (I host my domains elsewhere.).
    5. Enter our name server information to Nameserver 1 and Nameserver2 from below.
      ns1.powersx.com
      ns2.powersx.com
    6. Click OK at the bottom.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Who can register a .CN domain name?

    Who can register a .CN domain name?


    Regarding to CNNIC request for document submission.

    For new .CN / .COM.CN / .NET.CN / .ORG.CN / GOV.CN domain registration, only organization application is accepted and below documents are required:

    • Copy of a valid China Business Registration Certificate, and
    • Copy of applicant's China Citizen Identity Card, and
    • Copy of a valid ICP license


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to transfer my existing domain name to "Focus Network Company"?

    How to transfer my existing domain name to "Focus Network Company"?


    When you start using your new hosting account or E-Store with us, it may be quite inconvenient to leave your domain name to be managed by your old host. If you do that you will have to communicate with two different organizations: one will be providing the hosting services or E-Store for your website and the other will be providing domain registration services for your website.

    In order to move your existing domain and manage it together with your "Focus Network Company" hosting account with you just need to order the "Domain Transfer Service".

    Requirements for successful domain name transfer

    • The domain name to be transferred is not in 'Locked' Status.
    • The customer has access to the administrative contact email for the domain.
    • The customer can provide "Focus Network Company" with the domain EPP key code, applying to domains for which there is such a code.
    • There are more than 15 days till the domain name expiration date.
    • The domain name was registered for the first time more than 60 day ago.
    • The domain name has one of the following extensions: .com .net .org .us .biz .info .name.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Email Tutorial

  • Windows Mail Setup Tutorial

    Windows Mail Setup Tutorial


    Windows Mail in Windows Vista addresses today's serious concerns about junk mail, e-mail, and phishing attacks, while adding new features that help you search and manage the increasing volume of e-mail messages that you receive.

    In this tutorial we will learn how to setup Outlook Express for use with your new hosting email account.

    What you will Need:

    • A valid email account, if you haven't created an email account yet please log into your Control Panel and set up an email account.
    • An email client. This tutorial uses Windows Mail, which is a pre-installed component of Windows Vista.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • What is the maximum email size I can send and receive ?

    What is the maximum email size I can send and receive ?


    The maximum email size you can send and receive through our mail servers is 50 MByte. Anything bigger then that will be automatically bounced.

    For bigger files you have to use your FTP!

    And the maximum amount of emails which can be send out per hour is 30 emails from one account or 300 emails per domain and 700 emails per day, Focus Network Company reserves the violation of any of the foregoing may result in immediate deactivate or termination upon any indication of such activity without notice.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • POP3, IMAP4 and SMTP settings information

    POP3, IMAP4 and SMTP settings information


    Below you can find common setting for Windows Outlook, Windows Outlook Express, Windows Mail and Mozilla Thunderbird.

    TypeNameInformationPort
    UsernameLogin Nameuser@yourdomain.com (example)--
    PasswordPasswordX0CeFt6EMGfOMm5Q (example)--
    POP3Incoming Servermail.yourdomain.com (example)110
    POP3S (SSL/TLS)Incoming Secure Servermail.yourdomain.com (example)995
    IMAP4Incoming Servermail.yourdomain.com (example)143
    IMAP4S (SSL/TLS)Incoming Secure Servermail.yourdomain.com (example)993
    SMTPOutgoing Servermail.yourdomain.com (example)25
    SMTP SubmissionOutgoing Servermail.yourdomain.com (example)587
    SMTPS (SSL/TLS)Outgoing Secure Servermail.yourdomain.com (example)465


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to setup your email account on iPhone & iPad Mobile Device

    How to setup your email account on iPhone & iPad Mobile Device


    Configuring your iPhone device to receive mail from your hosted email accounts is a very easy process.

    This tutorial will give you a simple guide on the steps you need to perform to easily access your domain email accounts on the go with your iPhone device.

    Currently tested devices are:
    • Apple iPhone 3
    • Apple iPhone 3GS
    • Apple iPhone 4
    • Apple iPhone 4S
    • Apple iPhone 5
    • Apple iPhone 5S
    • Apple iPhone 5C
    • Apple iPad
    • Apple iPad2
    • Apple iPad Air
    • Apple iPad mini
    • Apple The New iPad
    • Apple iPod touch
    • Apple iOS 3
    • Apple iOS 4
    • Apple iOS 5
    • Apple iOS 6
    • Apple iOS 7


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to configure Outlook Express With POP Before SMTP Relay

    How to configure Outlook Express With POP Before SMTP Relay


    Our use different SMTP relays for sending mail - POP before SMTP. In POP before SMTP, the relay system collects your IP address when you authenticate yourself with the POP server, and then permits SMTP relaying from that IP address for 5 minute.

    In other words, you need to check your mail first, only then you can send your messages.

    To configure your Outlook Express or any other e-mail client, you need to know your POP3 and SMTP servers address.

    In this tutorial we will learn how to setup Outlook Express with POP Before SMTP Relay.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

General Information

  • Protecting Against Phishing Attacks

    Protecting Against Phishing Attacks


    • Preventive Measures
      1. Do not visit suspicious websites or follow the links provided in those websites.
      2. Do not follow URL links from untrusted sources or emails such as spam emails to avoid being re-directed to malicious websites by malicious links looking seemingly legitimate.
      3. Do not follow links to log on banking or financial organisations from search engines result.
      4. Open email attachment with extreme care. Always check the attachment's extension. Never open attachment with "vbs", "pif", "bat", "exe", "scr" extension.
      5. Avoid conducting online banking or financial enquiries/transactions from a public terminal or unsecured terminals such as those terminals in libraries or in cafe shops. Trojan or Hacking programs may be installed to these public terminals.
      6. Type the URL manually or follow the bookmarks or favorites you have made previously when visit websites.
      7. Do not open other Internet browser sessions and access other websites while you are performing online financial transactions/enquiry through the Internet. Remember to keep or print the copy of transaction record or confirmation notice for checking.
      8. Always be wary when giving off sensitive personal or account information. Banks and financial institutions seldom ask for your personal or account information through email. Consult the relevant organisation if in doubt.
      9. Consider installing RoboForm Password Manager, Form Filler, Password Generator, Fill & Save Forms and other security software.
      10. Consider using desktop computer spam-filtering products and antivirus software to help detecting and blocking fraudulent emails but beware of false alarms. Recommend to learn the technical abilities that are essential for deploying these products in an effective manner.
      11. Always ensure that your computer is applied with the latest security patches and virus signature to reduce the chance of being affected by fraudulent emails or websites riding on software vulnerabilities. This also helps to protect your computer from virus attacks or other security.
    • Detective Measures
      1. Log into your accounts regularly to check for the account status and last login time to determine whether there is any suspicious activity.
      2. Review your credit card or bank account statements as soon as you receive them to check for any unauthorized transactions or payments.
      3. Verify the legitimacy of the website of an organisation such as banks by contacting the organisation through its address or telephone number.
    • Responsive Measures
      1. Send the phishing email to the relevant organisation and/or the police for their investigation.

      2. Change the password immediately if you suspect that your have already been defrauded (e.g. responded to phishing email or supplied your personal/financial information to the fraudulent websites). Check your account status and contact the relevant organisation and/or report to the police immediately.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Pivot

    Pivot


    Pivot is a web-based tool to help you maintain dynamic sites, like weblogs or online journals.

    Pivot is released under the GPL so it is completely free to use.

    It is written in PHP, and does not require additional libraries or databases to function.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 網絡供應商(ISP)怎樣評價您發出電郵的信譽

    網絡供應商(ISP)怎樣評價您發出電郵的信譽


    現時網絡供應商根據寄件者IP地址的信譽來評價電郵的可信性,即是代表發電郵的域名必須保持良好的紀錄,盡量令收件者不會將自己的域名列為spammer。但有些寄件者並沒有一個獨立的IP地址,若與他人共用一個IP地址,便要多留意對方的行為。而且,假如於自己IP地址同一範圍內已有IP地址被列入spammer,亦會影響自己成為spammer的機會。除了IP地址影響電郵的可信性,以下三點亦是主要考慮的問題:

    1. 垃圾郵件的投訴率太高

      現在有很多網絡供應商如Hotmail、MSN、AOL、Yahoo和Microsoft都提供回饋環服務(Feedback Loop),一旦有收件者將你列為spammer,網絡供應商會向發件公司匯報有關情況,好讓及早檢討及改善電郵營銷方針。通常垃圾郵件投訴率不應多於1%,當超過1%時,網絡供應商就會開始考慮將所有電郵過濾,亦即是您很有可能會失去與另外99%客人的聯繫。
    2. 垃圾郵件陷阱

      網絡供應商為防止spammer活動,會嘗試於網上散佈一些自己的電郵地址,故意讓spammer使用軟件搜尋到,當這些郵箱收到宣傳電郵,網絡供應商便知道此發件人很可能是spammer,這種方法被稱為垃圾郵件的陷阱。有些公司購買電郵地址以擴大database,這些電郵地址很多都是來歷不明,因此很容易跌入垃圾郵件的陷阱。
    3. 不明來歷的電郵地址

      不明來歷電郵地址的定義是網絡供應商不能辨認的電郵地址,任何一間公司的Database List裡有太多不明電郵地址都是不健康的現象,當電郵到達網絡供應商時,若其中有很多不能辨認的電郵地址,網絡供應商會有可能將你標籤為spammer。

    總括而言,除了網絡供應商有自訂的一套機制去偵測垃圾郵件,最重要的還是List的質素,即是permission based的電郵地址。這些未經用家同意的地址,即使寄出再有誠意的電郵,收件者亦會向網絡供應商回報你是spammer,加上垃圾郵件陷阱難以偵測,只好用盡千方百計避免成為spammer。方法如下:
    • 淘汰無效或不活躍的電郵電址;
    • 向網絡供應商登記回饋環服務(Feedback Loop),監測垃圾郵件的情況;
    • 使用double opt-in的方法,向收件人發出確認信以證明該郵箱是正確及屬於使用者的,以避免向一些不明電郵地址發出郵件。


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • LinkPoint

    LinkPoint


    LinkPoint API is comprehensive payment processing software for the merchant who requires a more sophisticated payment solution.

    LinkPoint API gives merchants complete control over how their payments are processed, and allows them to build transaction processing applications that can process payments from a Web site or from multiple Point of Sale terminals. Ideal for either e-commerce or large-scale retail situations, LinkPoint API uses Secure Sockets Layer (SSL) technology to encrypt and pass confidential transaction and order information directly to the LinkPoint Secure Payment Gateway.

    LinkPoint API includes modules that calculate tax and shipping. In addition, LinkPoint API provides sales, returns, real-time authorizations, purchasing cards and real-time reports. You have your choice of several different web development languages for employing the API. The languages supported are: C++, C#, PHP, Macromedia® ColdFusion®, .NET.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • OSCommerce

    OSCommerce


    osCommerce is an online shop solution that offers a wide range of out-of-the-box features that allows online stores to be setup fairly quickly with ease, and is available for free as an open source based solution released under the GNU General Public License.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Pre-Sale Services

  • Why using free email accounts is bad idea?

    Why using free email accounts is bad idea?


    We recommend that you NOT use an email address from a free service (e.g. Yahoo! or Hotmail) with your account information.

    Instead, please enter a traditional address, such as that from your account, or one issued to you by your ISP (Internet Service Provider).

    This gives us better assurance of being able to contact you should we need to, as well as helping us protect your account and prevent fraud.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Newsletter / E-mail Help

    Newsletter / E-mail Help


    As a subscriber of www.ec2biz.com newsletters, you need to add www.ec2biz.com to your address book to continue to receive these emails.

    Please follow the directions at this link: Have you added the www.ec2biz.com addresses to your e-mail address book? for your particular e-mail provider.

    You need to add www.ec2biz.com to your address book:


    Please choose your e-mail provider below for specific instructions on adding www.ec2biz.com to your address book:

    Hotmail
    • Open the e-mail.

    • Click "SAVE ADDRESS" at the top of the message header.

    • Click "OK" on the next screen.

    Yahoo
    • Open the e-mail.

    • Click "ADD TO ADDRESS BOOK" next to the FROM address.

    • Click "ADD TO ADDRESS BOOK" again.

    Outlook Express
    • Open the e-mail.

    • Right-click on the FROM name.

    • Click ADD TO ADDRESS BOOK in the menu.

    • Click OK on the Properties pop-up.

    Netvigator.com (NETMail)
    • Click "ADD ADDRESS" on the screen of book address.

    • Input a new address to field:

    • Click "SAVE" on the bottom.

    i-cable.com
    • Click "ADD ADDRESS" on the screen of book address.

    • Input a new address to field:

    • Click "SAVE".

    You may need to contact your email provider to get more information.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • What are your DNS servers?

    What are your DNS servers?


    Please refer to:

    How to point my existing domain name to "Focus Network Company" server?

    ns1.powersx.com
    ns2.powersx.com

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Specific refund conditions based on method of payment

    Specific refund conditions based on method of payment


    Cash / Bank Deposit / Cheque:
    We will refund your money back to the account you sent payment from, mail a cheque, or via PayPal. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    PayPal:
    For orders paid via PayPal we will refund money to your PayPal account only. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    Credit Card:
    For security reasons the credit card you use to purchase any of Focus Network Company products must be valid when you request a refund. We cannot refund to a credit card that has expired or been cancelled.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to apply special price for international domain

    How to apply special price for international domain


    We are offering domain name registration for the unbelievable low price.

    This offer is for a limited time only. Act fast while quantities last.

    You must purchase following plan offered on our site at the same time you new register your domain name to qualify.

    • E-Store
    • Linux Web Hosting
    • Website Design & Development


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Linux Web Hosting

  • How to use FileZilla to upload your website

    How to use FileZilla to upload your website


    In this tutorial you're about to learn how to upload your website content via FTP client software called FileZilla.

    FileZilla is a freeware, so it means you can download it and use for free. A place to get it is i.e. FileZilla's homepage at http://filezilla-project.org

    Once you downloaded and installed the program you'll be able to launch the program and proceed with uploading or downloading.

    FTP Server:
    • ftp.domainname.com (example)

    User Name:
    • ftp_domainnamecom (example)

    Password:
    • Please see your configuration email

    Host Directory:
    • /httpdocs/ for normal web pages (http)
    • /httpsdocs/ for secure pages (https)

    Home Page File:
    • index.html or index.htm or index.php (lower case)


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plesk 11 Customer’s Guide

    Plesk 11 Customer’s Guide


    With more than 250,000 Windows and Linux servers deployed, Parallels Plesk Panel is the preferred choice for hosting service providers, web designers, and website owners. Parallels Plesk Panel is the first step down your business' growth path - toward faster sites and faster mobile access for website owners and toward a complete product line as your hosting business grows.

    This is a guide helps customers to accomplish hosting-management routines and create sites with Parallels Web Presence Builder.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plesk 9 Reseller's Guide

    Plesk 9 Reseller's Guide


    Parallels Plesk Panel is the only web hosting control panel with integrated web design, SaaS storefront and billing. Parallels Plesk Panel delivers maximum profits for growing service providers.

    Parallels Plesk Panel is the most complete Web hosting control panel available today. In fact, it’s the only Web hosting panel that includes integrated Web design tools, a SaaS storefront, and fully automated billing and provisioning. Plus it delivers maximum profits for growing service providers; provides key tools for Web designers; and includes an easy-to-use server control panel for IT professionals (and small businesses without IT staff).

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Default home page priority

    Default home page priority


    The filename below is the order of priority which the web hosting will read as the website index (default/main) page.

    1. index.php
    2. index.html
    3. index.htm
    4. index.shtml
    5. index.cfm (Option)

    If you need to change a site or directory default page, you can do so see: How do you set a website default page to something other than index.html.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Using FTP with Internet Explorer (IE)

    Using FTP with Internet Explorer (IE)


    Internet Explorer(IE) include built-in FTP functionality. To connect to a website via FTP and transfer files, follow the instructions below.

    If your FTP requires a username and password, you will obviously need these before you begin.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

E-Store

  • Testimonials

    Testimonials


    我們的“線上商店”系統,能讓你的顧客針對某些產品發表用後感或意見,令商店更具互動感,亦可令其他有意購買的顧客獲取更多用家的評論資訊。

    對於大部份的正面產品評論,管理員大可不必操心,但若出現一些負面的產品評論,這時管理員便需要衡量是否把評論修改或甚至刪除它。

    而“顧客心聲”是為已登記的會員而設,不論該名會員是否曾購買產品,都可直接參與發表他/她的評論心聲,而在現階段,管理員若希望為產品增加一些評論,則需要按正常途徑登記為普通會員才能發表評論心聲。

    進入“顧客心聲”管理:
    1. 點擊主選單的“分類目錄/產品管理”

    2. 點擊左選單的“顧客心聲”

    每項“顧客心聲”包含的資料:
    • 商品
      評論針對的產品

    • 評論由
      評論心聲的發表會員

    • 日期
      評論心聲的發表日期

    • 評論內容
      評論心聲的內容,不可使用HTML語法

    • 評等
      由五棵星星組成,並從“壞”至“好”組成參考等級

    針對“顧客心聲”的動作:
    • 編輯
      修改已經發表的顧客心聲資料

    • 刪除
      將該產品的顧客心聲刪除,此刪除動作只針對顧客心聲資料,不會把原有產品刪除

    注意事項:
    • “顧客心聲”必需由已登記的會員從店面發表,管理系統不設新增功能

    • “顧客心聲”的內客和評等,只屬互動性質的額外資訊,不會構成對產品銷售和其他功能的影響

    • 若希望有新的“顧客心聲”被發表時第一時間收到通知,請先在“系統設定”的“聯絡資料”設定“新增顧客心聲通知”的電郵地址


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Customers Approval

    Customers Approval


    我們的“網上開店”系統,可以同時以單一網站實行“B2C”和“B2B”的方案,如果您決定以“B2B”型式營運線上貿易,則可透過向每一位登記的會員進行篩選,確保不會令業務資料外流給競爭對手。

    而這份指南將介紹如何處理登記會員的確認工作。
    設首先確定已經把“系統設定”的“會員設定”裏“新增客戶批核選擇”設成“需批核”。

    若希望商店產品的售價只讓已批核會員觀看,請同時將“系統設定”的“會員設定”裏“非認可批核會員不能觀看售價”設成“啟用”。

    如您的“網上商店”屬零售“B2C”模式,這裏的說明請直接忽略。

    進入“待確認會員”管理:
    1. 點擊主選單的“訂單處理/客戶管理”

    2. 點擊左選單的“待確認會員”

    3. 選擇針對的會員

    “待確認會員”包含的資料:
    • 客戶基本資料
      檢視登記資料,考慮是否批核該名會員

    • 郵件主題及內容
      使用預設郵件範本,寄出確認通知

    • 確認
      直接點擊“確認”按鈕

    針對“待確認會員”的動作:
    • 確認會員
      若檢視資料後認為合適,可進行確認工作

    • 刪除
      若登記者不符合要求,可直接刪除

    • 寄電子郵件
      在正式確認前寄電郵向登記者查詢

    注意事項:
    • 未被確認的登記者,將無法登入網站

    • 如啟用“非認可批核會員不能觀看售價”,則未被確認的登記者將無法登入及觀看售價

    • 可配合“目錄分類”的“專屬客戶目錄”,把產品隱藏,令一般人無法觀看,只對被確認而且亦是“專屬客戶”級別的會員開放瀏覽權

    • 若需要將已經確認的會員轉回“未確認狀態,請往“客戶資料”選出該會員並修改“會員確認”及“專屬客戶狀態”


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 業務管理架構

    業務管理架構


    在貴公司採用我們的系統過程裏,除了初次完善的設定後,往後的管理可能會十分繁重,由於在互聯網上潛在著巨大商機和不分國別界限,所以因由開業初期的零碎訂單及客戶查詢,以至貴公司網站及業務續漸被更多人認識,這時會出現大量的客戶查詢及訂單,所以貴公司必須及早作好安排,提高業務效率。

    因為每間公司的業務均不盡相同,我們實難以一一說明,但以下是一些根據現時我們的客戶提供及經整理的重點安排:
    • 新產品的輸入工作

    • 售清產品的刪除或補貨工作(系統對於存量會有提示)

    • 產品的售價、存量、內容的更新

    • 經常校對輸入了的資料並試驗實際模擬交易,找出錯誤的地方並加以修正

    • 整個網站內容訊息定時更新,會讓顧客保持新鮮感

    • 不斷增加網站文字內容,可令各搜尋引擎收集更多資訊,有利提高知名度

    • 定時提供促銷活動,如節日特價品,送贈小額電子禮券吸引舊會員消費

    • 定時為產品報道新消息

    • 為日常訂單收取的信用咭營業金額記錄及整理

    • 定時按實際需要而更新貨運資料及運費調整

    • 定時利用我們的「電子報管理系統」寄發產品新消息給會員以保持聯係

    • 尋找其他網站商店提出合作商機

    • 定時向我們提出需要改善的地方,以利顧客的訂購過程更簡化無誤

    • 定期觀察我們提供的網站報告,比較瀏覽量高低的地區作出相應的宣傳安排

    • 如網上營商是貴公司的重點業務,需多利用各動宣傳媒體,例如於“Yahoo”、“Google”放置廣告,把產品張貼到知名的拍賣網如“EBay.com”、“雅虎拍賣網”等

    Please be aware we does not participate in any management and not assume responsibility and support for third party providers.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Send SMS

    Send SMS


    透過“傳送手機短訊”您能夠將訊息以“SMS”傳送到全球任何國家的手機,而且費用相宜,令您的客戶無需特別關注電子郵箱,亦能第一時間得述您的重要訊息。

    使用“傳送手機短訊”前,您需預先購買“短訊額”,當購買後,每次由您發送短訊,或由系統發出短訊後,相應的使用量便會從您的短訊額中扣除。

    這編指南亦適用於其他與“傳送手機短訊”相關功能,例如“購物訂單”、“支援服務記錄”等。

    進入“廣告總管”:
    1. 點擊主選單的“訊息中心/電子報”

    2. 點擊左選單的“傳送手機短訊”

    每項“手機短訊”包含的資料:
    請選擇以下其中一種傳送對像。
    • 發送客戶
      從下拉選單挑選欲傳送短訊的對像,若對像沒有手機號碼,則不能成功發送短訊

    • 其他人仕
      傳送短訊給一位非會員,需正確選擇對像的“國家”,再輸入手機號碼,例如“98765432”(必需輸入)

    • 發送短訊
      必需剔選,短訊才能進行傳送

    • 短訊語言
      “英文短訊”可以包含160個字元的純文字,“Unicode”、“8-bit中文短訊”可以包含69個字元。(包括英文、數字、空格、符號及斷行)

    • 發送者短稱
      發送者短稱 (SENDER ID) 必需為英文或英文加空格,最大長度為11個字元,部份網絡供應商並不支援此格式。

    • 短訊內容
      短訊內容必需為純文字,最大長度按照選擇的語言而訂,部份手機不支援中文短訊,為免出現亂碼,建議使用純英文。

    • 字元數目
      系統將會計算當前輸入“短訊內容”的字元數量,請根據選擇的“短訊語言”字元長度限制,請勿超越可接受的長度,否則訊息將被截掉多餘的字元

    發送短訊的步驟:
    1. 點擊主螢幕的“發送短訊”按鈕

    2. 選擇合適的發送對像,或輸入對像的“國家”、“手機號碼”

    3. 選擇合適的“短訊語言”

    4. 輸入合適字元長度的“短訊內容”

    5. 點擊“預覽”按鈕,或按“返回”放棄傳送動作

    6. 預覽所有資料是否無誤

    7. 點擊“發送”按鈕

    8. 如資料正確將完成傳送短訊,並從系統扣減您的“短訊額”

    查詢手機短訊的覆蓋範圍和短訊額:
    • 點擊主螢幕的“覆蓋範圍”按鈕,系統將列出當時適用的國家範圍,和每個短訊的使用額

    購買“短訊額”:
    • 點擊主螢幕的“買短訊額”按鈕,選擇欲購買的短訊額數量,檢視應付金額無誤後,點擊“確認”按鈕,並利用“PayPal (貝寶)”進行付款交易,完成後,您所購買的短訊額將於數分鐘內自動存入您的帳戶

    注意事項:
    • 每個短訊的傳送,以“短訊額”計算而非金額,請勿混淆

    • 短訊的傳送,一般都是實時送遞,但若干情況下可能受短訊閘道煩忙的影響而出現稍遲送達

    • 每次發送的短訊,如對像的手機號碼確實存在,則訊短將被視為成功傳送,不論該手機號碼是否屬對像擁有

    • 如以英文“短訊語言”發送,則不應包含任何中文字元,否則對方只會看見亂碼

    • 若未能確定對方手機是否支援“中文”,強列建議傳送英文訊息,避免對方只能看見亂碼

    • “短訊額”必需預先購買和備用,一經付款購買的“短訊額”,不設轉讓、退還或退款

    • 每個“短訊額”的價值有可能變化,以當時購買的價值為準


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Administer Manager

    Administer Manager


    我們的“線上商店”系統,允許業務由多個管理員進行維護,而且可設定一些權限,讓指定的管理員只可執行獲受權的區域。

    請先設定下一節指南介紹的“管理員群組”,並且為群組指定權限,再為其他人管理員設定相應郡組。

    進入“管理員設定”:
    1. 點擊主選單的“系統管理員”

    2. 點擊左選單的“管理員設定”

    每項“管理員設定”包含的資料:
    • 姓氏
      最多32個字元(必需輸入)

    • 名字
      最多32個字元(必需輸入)

    • 電子郵件
      有效的電子郵件地址,作為登入的名稱,和忘記密碼的收件地址

    • 密碼
      新增管理員的情況,由系統自動產生並寄到上述的電郵地址,若日後修改,密碼必需由六至十五個“英文”或“數字”組成,英文的大小楷視為不同,其中切勿包含空格和符號,組合亦不能過份簡單

    • 群組名稱
      選擇所屬郡組

    • 管理員模式
      “實際管理”能進行真實指定區域的操作,而“只限示範”則只可觀看群組指定的區域而不能修改細節

    • 客服部門
      選擇所屬部門

    • 客服職員
      選擇所屬職員

    針對“郵件賬號”的動作:
    • 編輯
      修改已經增加的管理員資料

    • 刪除
      將該管理員資料刪除

    • 資訊
      顯示該名管理員的資料及最近執行過的動作

    注意事項:
    • 切勿刪除我們預先設定的“最高權力”管理員,否則在群組限制下,業務擁有者可能無法再進入一些被限制的區域,如不小心刪除而需我們重設這種管理員,需向我們繳付設定費。

    • 一般情況下,不應設定不同管理員可同時執行相同區域群組。

    • 基於保安理由,請勿向非認可人士透露管理員資料,否則有機會您的商店資料被非法修改和盜取。

    • 除“獨立套裝軟件”及“開發版軟件”外,我們擁有登入您的管理系統任何區域的權力,以便提供技術咨詢和系統升級修正。


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Industry News

  • Plurk

    Plurk


    Plurk is a free social networking and micro-blogging service that allows users to send updates (otherwise known as plurks) through short messages or links, which can be up to 140 text characters in length.

    Updates are then shown on the user's home page using a timeline which lists all the updates received in chronological order, and delivered to other users who have signed up to receive them. Users can respond to other users' updates from their timeline through the Plurk.com website, by instant messaging, or by text messaging.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 微軟證實Hotmail個人資料遭竊取

    微軟證實Hotmail個人資料遭竊取


    根據BBC(英國廣播公司)報導,微軟公司的Windows Live Hotmail遭到網絡黑客入侵,超過萬個hotmail客戶資料遭到竊取,這些資料多數來自歐洲,微軟並證實遭竊取的密碼都是正確的。

    科技網誌neowin.net說,黑客除了盜取帳號密碼之外,又把盜取到的資料全數公布到網路上,超過上萬個hotmail帳戶的細節,2009年10月1日被貼上一個讓人分享密碼的網站pastebin.com。

    Neowin聲稱這些帳戶可能是被黑或是利用網路釣魚搜集而來。網路釣魚攻擊者利用發送釣魚郵件給受害者,受害者點選後,會被導向釣魚網頁,就會洩漏了個人的機密資訊給予攻擊者,如個人的信用卡號碼、密碼、帳號等。

    微軟目前表示,他們已經知悉此事,並正在積極了解及處理中。這件事透露出網路資訊安全的疑慮,若果個人資料遭到竊取,可能會有更多後續麻煩的事端。

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 如何利用異地備份隬補防毒軟件的不足

    如何利用異地備份隬補防毒軟件的不足


    從世衛在2009年4月24號發出的第一個人類豬流感個案開始,至今已有76個國家和超過3萬感染個案而豬流感病毒變種的問題也成為了全球關注的話題。其實在電腦的世界,惡性攻擊病毒每天在不斷的增加、更新和改變,而企業往往就因為病毒入侵而造成數據丟失和摧毀的受害者。如何防範數據丟失帶來的災難性影響,是企業I.T.部門經常要面對的挑戰。

    企業單靠病毒掃描軟件並不足夠

    根據美國FBI 2005的研究指出,約84%的公司會受到惡性病毒的攻擊。另外,美國網絡安全協會(Cyber Secure Institute) 的報告指出,企業為了清除各項病毒的花費高達90億美元!無論您為電腦做再好的隔離措施,例如擁有最新的防病毒軟件和頻密的病毒掃描,病毒也可以找到辦法入侵電腦系統然後摧毀公司重要的檔案,例如客戶清單、合約和訂單等等。公司因為數據丟失和內部電腦系統故障影響而到商譽也絕非金錢能隬補。所以,企業要防範數據丟失帶來的災難性影響,單靠病毒掃描軟件並不足夠。

    設立災難性回復方案才能治本

    其實要解決以上問題就要從根本著手,第一步就是要為企業電腦系統設立有效和快速的災難復原方案 (Disaster Recovery Solution),而當中最重要的一環便是為每台電腦作鏡像備份(Image Backup),這樣,當遇到病毒入侵造成數據丟失,企業便可快速地把事先備份好電腦鏡像直接恢復到電腦上,把受到感染或是有故障的電腦復原到正常狀態,確保企業持續運作,儲存於電腦內的業務數據亦能得以保存。

    有資深企業備份經驗的Ahsay 銷售部經理候健生指出:「如何為企業設立有效和快速的災難復原方案是一個很大的課題,大小企業都需要正視。但對中小企來說,由於資源所限,加上公司內未必有專門負責I.T.方面的人員,所以很多中小企都未有實行。其實坊間都有不少能夠提供鏡像備份(Image Backup)的備份軟件,可以滿足基本備份需要。但這些軟件只能夠作本地備份,一旦公司的電腦受到病毒侵襲,用作儲存備份的電腦或伺服器亦可能已經中毒,導致已備份的鏡像無法還原而不能做到災難復原。所以企業應選擇具備異地鏡像備份的備份軟件,才能確保災難復原能發揮功效,因為就算本地公司內所有電腦和伺服器都已經中毒,儲存於異地的鏡像備份數據亦不會受到感染,企業便可快速地把電腦鏡像直接從異地恢復到電腦上,達至災難復原的目的。而Ahsay Backup Software 是市場上少數可以做到異地鏡像備份的企業備份方案。」

    關於Ahsay

    Ahsay Systems Corporation (亞勢系統有限公司) 建基於香港,目前在世界各地已擁有超過2, 900個服務合作夥伴和經銷商,並有超過90萬用戶安裝了Ahsay Backup Software備份軟件。

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Microsoft recommends against usage of SHA-1

    Microsoft recommends against usage of SHA-1


    Microsoft is advising its customers to stop using the SHA-1 hashing algorithm in cryptographic applications such as SSL/TLS encryption and code signing.

    In a security advisory issued by the company, Microsoft said that it would stop recognising certificates using the algorithm after January 1, 2016. After this date, certificate authorities (CAs) that issue certificates under the Windows Root Certificate Program will only be able to issue SHA-2 certificates.

    According to Microsoft, SHA-1 is used in 98 percent of all certificates issued worldwide. However, it also claims that since 2005 researchers have discovered collision attacks against the algorithm that mean it no longer meets its security standards. Although the announcement to drop SHA-1 comes today, the Australian Signals Directorate (ASD) has been advising government agencies to move to SHA-2 since December 2011.

    The ASD also has a slightly different opinion of when the collision attacks were first known, stating that "theoretically impressive attacks" against SHA-1 were known since 2004, but that they were not practical to implement.

    ASD has already removed the "weakened but not broken" SHA-1 algorithm from use in its Information Security Manual.

    The US National Institute of Standards and Technology, which published the algorithm, also stated in September 2012 that US federal agencies should stop using SHA-1.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Twitter

    Twitter


    Twitter is a free social networking and micro-blogging service that enables its users to send and read each others' updates, known as tweets. Tweets are text-based posts of up to 140 characters, displayed on the author's profile page and delivered to other users - known as followers - who have subscribed to them. Senders can restrict delivery to those in their circle of friends or, by default, allow open access. Users can send and receive tweets via the Twitter website, Short Message Service (SMS) or external applications. The service is free over the Internet, but using SMS may incur phone service provider fees.

    Since its creation in 2006 by Jack Dorsey, Twitter has gained notability and popularity worldwide. It is sometimes described as the "SMS of the Internet", as it provides the functionality—via its application programming interface (API)—for other desktop and web-based applications to send and receive short text messages, often obscuring the Twitter service itself.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Glossary

  • Encryption

    Encryption


    encryption is the process of obscuring information to make it unreadable without special knowledge, sometimes referred to as scrambling. Encryption has been used to protect communications for centuries, but only organizations and individuals with an extraordinary need for secrecy had made use of it. In the mid-1970s, strong encryption emerged from the sole preserve of secretive government agencies into the public domain, and is now used in protecting widely-used systems, such as Internet e-commerce, mobile telephone networks and bank automatic teller machines.

    Encryption can be used to ensure secrecy, but other techniques are still needed to make communications secure, particularly to verify the integrity and authenticity of a message; for example, a message authentication code (MAC) or digital signatures. Another consideration is protection against traffic analysis.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • SPAM

    SPAM


    Spamming is the abuse of electronic messaging systems to send unsolicited bulk messages, which are universally undesired. While the most widely recognized form of spam is email spam, the term is applied to similar abuses in other media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, mobile phone messaging spam, internet forum spam and junk fax transmissions.

    Spamming is economically viable because advertisers have no operating costs beyond the management of their mailing lists, and it is difficult to hold senders accountable for their mass mailings. Because the barrier to entry is so low, spammers are numerous, and the volume of unsolicited mail has become very high. The costs, such as lost productivity and fraud, are borne by the public and by Internet service providers, which have been forced to add extra capacity to cope with the deluge. Spamming is widely reviled, and has been the subject of legislation in many jurisdictions.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • BMP (Bit Mapped)

    BMP (Bit Mapped)


    The BMP (bit mapped) format is used internally in the Microsoft Windows operating system to handle graphics images. These files are typically not compressed resulting in large files.

    The main advantage of BMP files is their wide acceptance, simplicity, and use in Windows programs. However, they may pose problems for users of other operating systems. Commonly, BMP files are used for Microsoft's Paint program. Since most BMP files are uncompressed, and BMP's RLE compression has serious limits[citation needed], the large size of BMP files makes them unsuitable for file transfer. However, Bit Map images are suitable for background images and wallpapers. This is especially true for screen shots. In addition, images from scanners are usually stored in BMP files.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Download

    Download


    download is to receive data from a remote system, such as a HTTP, FTP server, or other similar systems. A download is any file that is offered for downloading or that has been downloaded.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • URL

    URL


    A Uniform Resource Locator(URL), is a compact string of characters used to identify or name a resource. The main purpose of this identification is to enable interaction with representations of the resource over a network, typically the World Wide Web, using specific protocols. URIs are defined in schemes defining a specific syntax and associated protocols.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Knowledge Base Search

Type your question here. If no result are found, try more general search words. For Example: instead of "Email Account" try "Email".

If you did not find the Knowledge Base you were looking for, please try our FAQ

If you would like to know more about our services
please contact us immediately!

Contact Us

News & Events

Business Transformation Notice

2022 Chinese New Year Holiday Notice

2021 Chinese New Year Holiday Notice

2020 Chinese New Year Holiday Notice

2019 Chinese New Year Holiday Notice

New Article

Payment Method

Bank Deposit / ATM
Mailing Cheque
Credit Card

ec2Biz.com Interactive Multimedia Ecommerce Web Hosting Online Shop Domain name Solutions
© Focus Network Company. All Rights Reserved.