27 Apr, 2024
Welcome! Guest
[ Login ]
Home News & Events About Us Services FAQ Knowledge Base Affiliate Program Signup Contact Us
The ONE STOP SOLUTION to all your eBusiness Needs!
Overview
Knowledge Base

Our new knowledge base is a valuable collection of technical information, web site marketing tips, tutorial, glossary, and documentation.

If you feel anything is missing, or still have questions, please contact us. Looking for something specific? Can't see it here? Try our "Knowledge Base Search".


Domain Names Knowledge

  • How do I change DNS records if my domain is registered with GoDaddy?

    How do I change DNS records if my domain is registered with GoDaddy?


    If you recently purchased Focus Network Company web hosting or E-Store, but your domain name was previously hosted somewhere else, you will need to change your DNS information to the follow these simple steps:

    1. Log in to the GoDaddy Account Manager. http://www.godaddy.com
    2. Select Manage Domains from the Domain Names dropdown menu or the Manage Your Account list.
    3. Select the domain name you wish to modify using the checkboxes and then click Set Nameservers Icon.
    4. Select Custom nameservers (I host my domains elsewhere.).
    5. Enter our name server information to Nameserver 1 and Nameserver2 from below.
      ns1.powersx.com
      ns2.powersx.com
    6. Click OK at the bottom.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Who can register a .CN domain name?

    Who can register a .CN domain name?


    Regarding to CNNIC request for document submission.

    For new .CN / .COM.CN / .NET.CN / .ORG.CN / GOV.CN domain registration, only organization application is accepted and below documents are required:

    • Copy of a valid China Business Registration Certificate, and
    • Copy of applicant's China Citizen Identity Card, and
    • Copy of a valid ICP license


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do I change DNS records if my domain is registered with Directnic?

    How do I change DNS records if my domain is registered with Directnic?


    If your domain is registered with Directnic and you want to use Focus Network Company web hosting or E-Store service, you'll just need to follow these simple steps in order to point the domain to our name servers.

    1. Log in to your Directnic account and click on the Domain Manager link. http://www.directnic.com

    2. Click on the Change Nameserver Information icon located to the right of your domain name, under the Options heading.
    3. Replace the nameserver information listed with the below.
      ns1.powersx.com
      ns2.powersx.com
    4. Click on the Modify button at the bottom of the page and you're done.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do I change DNS records if my HK domain is registered with HKDNR?

    How do I change DNS records if my HK domain is registered with HKDNR?


    If your Hong Kong domain is registered with HKDNR and you want to use Focus Network Company web hosting or E-Store service, you'll just need to follow these simple steps in order to point the domain to our name servers.

    1. Log in to the HKDNR account http://www.hkdnr.hk
    2. Select your domain name from the Manage Domain Name.

    3. Click the Modify DNS (MNS) link on Domain Information Manager.
    4. Enter our name server information to Name Server(1) and Name Server(2) to below.
      ns1.powersx.com
      ns2.powersx.com
    5. Click Submit at the bottom.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to transfer my existing domain name to "Focus Network Company"?

    How to transfer my existing domain name to "Focus Network Company"?


    When you start using your new hosting account or E-Store with us, it may be quite inconvenient to leave your domain name to be managed by your old host. If you do that you will have to communicate with two different organizations: one will be providing the hosting services or E-Store for your website and the other will be providing domain registration services for your website.

    In order to move your existing domain and manage it together with your "Focus Network Company" hosting account with you just need to order the "Domain Transfer Service".

    Requirements for successful domain name transfer

    • The domain name to be transferred is not in 'Locked' Status.
    • The customer has access to the administrative contact email for the domain.
    • The customer can provide "Focus Network Company" with the domain EPP key code, applying to domains for which there is such a code.
    • There are more than 15 days till the domain name expiration date.
    • The domain name was registered for the first time more than 60 day ago.
    • The domain name has one of the following extensions: .com .net .org .us .biz .info .name.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

General Information

  • Xaraya

    Xaraya


    Xaraya delivers the requisite infrastructure and tools to create custom web applications that include fully dynamic multi-platform Content Management Solutions (CMS).

    Xaraya's modular, database independent architecture introduces tools that separate form, function, content, and design with on-the-fly extensions allowing greater control and versatility.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • OpenBiblio

    OpenBiblio


    openBiblio is a high powered, fully scalable, and highly customisable open-source bulletin board package. phpBB has a user-friendly interface, simple and straightforward administration panel, and helpful FAQ. Based on the powerful PHP server language and your choice of MySQL, MS-SQL, PostgreSQL or Access/ODBC database servers, phpBB is the ideal free community solution for all web sites.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Coppermine

    Coppermine


    Coppermine Photo Gallery is a picture gallery script. Users can upload pictures with a web browser (thumbnails are created on the fly), rate pictures, add comments and send e-cards.

    The admins can manage the galleries and batch add pictures that have been uploaded on the server by FTP. Support for multimedia files has been added recently. Images are stored in albums and albums can be grouped by categories.

    The script supports multiple users and each user can possibly have its own set of albums. The script also supports multiple languages and has a theme system.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • WWW Paint Board

    WWW Paint Board


    WWW Paint Board (Wpb) is a tool where users can draw Dynamically on the web with VML (Vector Markup Language) technology.

    It provided with Wpb Galery and Wpb Editor. Also features: online draw editor, a Galery provides voting, sending comments for each VML topic, shout box, top score, top clicks, searching, loading or deleting topic.... And has a simple control panel and safety mode, Wpb can delete oldest topic automatically, no one can flood your Wpb system.

    It requires no SQL database, however requires Internet Explorer 5.x,6.x or any browser that supports VML technology..

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 網絡供應商(ISP)怎樣評價您發出電郵的信譽

    網絡供應商(ISP)怎樣評價您發出電郵的信譽


    現時網絡供應商根據寄件者IP地址的信譽來評價電郵的可信性,即是代表發電郵的域名必須保持良好的紀錄,盡量令收件者不會將自己的域名列為spammer。但有些寄件者並沒有一個獨立的IP地址,若與他人共用一個IP地址,便要多留意對方的行為。而且,假如於自己IP地址同一範圍內已有IP地址被列入spammer,亦會影響自己成為spammer的機會。除了IP地址影響電郵的可信性,以下三點亦是主要考慮的問題:

    1. 垃圾郵件的投訴率太高

      現在有很多網絡供應商如Hotmail、MSN、AOL、Yahoo和Microsoft都提供回饋環服務(Feedback Loop),一旦有收件者將你列為spammer,網絡供應商會向發件公司匯報有關情況,好讓及早檢討及改善電郵營銷方針。通常垃圾郵件投訴率不應多於1%,當超過1%時,網絡供應商就會開始考慮將所有電郵過濾,亦即是您很有可能會失去與另外99%客人的聯繫。
    2. 垃圾郵件陷阱

      網絡供應商為防止spammer活動,會嘗試於網上散佈一些自己的電郵地址,故意讓spammer使用軟件搜尋到,當這些郵箱收到宣傳電郵,網絡供應商便知道此發件人很可能是spammer,這種方法被稱為垃圾郵件的陷阱。有些公司購買電郵地址以擴大database,這些電郵地址很多都是來歷不明,因此很容易跌入垃圾郵件的陷阱。
    3. 不明來歷的電郵地址

      不明來歷電郵地址的定義是網絡供應商不能辨認的電郵地址,任何一間公司的Database List裡有太多不明電郵地址都是不健康的現象,當電郵到達網絡供應商時,若其中有很多不能辨認的電郵地址,網絡供應商會有可能將你標籤為spammer。

    總括而言,除了網絡供應商有自訂的一套機制去偵測垃圾郵件,最重要的還是List的質素,即是permission based的電郵地址。這些未經用家同意的地址,即使寄出再有誠意的電郵,收件者亦會向網絡供應商回報你是spammer,加上垃圾郵件陷阱難以偵測,只好用盡千方百計避免成為spammer。方法如下:
    • 淘汰無效或不活躍的電郵電址;
    • 向網絡供應商登記回饋環服務(Feedback Loop),監測垃圾郵件的情況;
    • 使用double opt-in的方法,向收件人發出確認信以證明該郵箱是正確及屬於使用者的,以避免向一些不明電郵地址發出郵件。


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Glossary

  • SSL

    SSL


    Transport Layer Security (TLS) and its predecessor, Secure Sockets Layer (SSL), are cryptographic protocols which provide secure communications on the Internet for such things as web browsing, e-mail, Internet faxing, instant messaging and other data transfers. There are slight differences between SSL 3.0 and TLS 1.0, but the protocol remains substantially the same. The term "TLS" as used here applies to both protocols unless clarified by context.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Cookie

    Cookie


    The term Cookie derives from "magic cookie", a packet of data a program receives but only uses for sending it again, possibly to its origin, unchanged. Magic cookies were already used in computing when Lou Montulli had the idea of using them in Web communications in Mar 1993.

    Purpose
    HTTP cookies are used by Web servers to differentiate users and to maintain data related to the user during navigation, possibly across multiple visits. HTTP cookies were introduced to provide a way for realizing a "shopping cart" (or "shopping basket"), a virtual device into which the user can "place" items to purchase, so that users can navigate a site where items are shown, adding or removing items from the shopping basket at any time.

    Allowing users to log in to a website is another use of cookies. Users typically log in by inserting their credentials into a login page; cookies allow the server to know that the user is already authenticated, and therefore is allowed to access services or perform operations that are restricted to logged-in users.

    Many websites also use cookies for personalization based on users' preferences. Sites that require authentication often use this feature, although it is also present on sites not requiring authentication. Personalization includes presentation and functionality. For example, the Wikipedia Web site allows authenticated users to choose the webpage skin they like best; the Google search engine allows users (even non-registered ones) to decide how many search results per page they want to see.

    Cookies are also used to track users across a website. Third-party cookies and Web bugs, explained below, also allow for tracking across multiple sites. Tracking within a site is typically done with the aim of producing usage statistics, while tracking across sites is typically used by advertising companies to produce anonymous user profiles, which are then used to target advertising (deciding which advertising image to show) based on the user profile.

    Browser Setting
    Described in " How to Enable Cookie " section.

    Cookie Expiration
    Persistent cookies have been criticized by privacy experts for not being set to expire soon enough, and thereby allowing some websites to track users and build up a profile of them over time. This aspect of cookies also compounds the issue of session hijacking, because a stolen persistent cookie can potentially be used to impersonate a user for a considerable period of time.

    Identification
    If more than one browser is used on a computer, each usually has a separate storage area for cookies. Hence cookies do not identify a person, but a combination of a user account, a computer, and a Web browser. Thus, anyone who uses multiple accounts, computers, or browsers has multiple sets of cookies.

    Likewise, cookies do not differentiate between multiple users who share a computer and browser, if they do not use different user accounts.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Browser

    Browser


    Browser is a software application that enables a user to display and interact with text, images, and other information typically located on a web page at a website on the World Wide Web or a local area network. Text and images on a web page can contain hyperlinks to other web pages at the same or different website. Web browsers allow a user to quickly and easily access information provided on many web pages at many websites by traversing these links. Web browsers format HTML information for display, so the appearance of a web page may differ between browsers.

    Some of the web browsers available for personal computers include Internet Explorer, Mozilla Firefox, Safari, Netscape, and Opera in order of descending popularity (as of August 2006). Web browsers are the most commonly used type of HTTP user agent. Although browsers are typically used to access the World Wide Web, they can also be used to access information provided by web servers in private networks or content in file systems.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • HTML

    HTML


    short for HyperText Markup Language, is the predominant markup language for the creation of web pages. It provides a means to describe the structure of text-based information in a document — by denoting certain text as headings, paragraphs, lists, and so on — and to supplement that text with interactive forms, embedded images, and other objects. HTML is written in the form of labels (known as tags), created by greater-than signs (>) and less-than signs (<). HTML can also describe, to some degree, the appearance and semantics of a document, and can include embedded scripting language code which can affect the behavior of web browsers and other HTML processors.

    HTML is also often used to refer to content of the MIME type text/html or even more broadly as a generic term for HTML whether in its XML-descended form (such as XHTML 1.0 and later) or its form descended directly from SGML (such as HTML 4.01 and earlier).

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Upload

    Upload


    Upload is to send data from a remote system, such as a HTTP, FTP server, or other similar systems.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Industry News

  • Microsoft recommends against usage of SHA-1

    Microsoft recommends against usage of SHA-1


    Microsoft is advising its customers to stop using the SHA-1 hashing algorithm in cryptographic applications such as SSL/TLS encryption and code signing.

    In a security advisory issued by the company, Microsoft said that it would stop recognising certificates using the algorithm after January 1, 2016. After this date, certificate authorities (CAs) that issue certificates under the Windows Root Certificate Program will only be able to issue SHA-2 certificates.

    According to Microsoft, SHA-1 is used in 98 percent of all certificates issued worldwide. However, it also claims that since 2005 researchers have discovered collision attacks against the algorithm that mean it no longer meets its security standards. Although the announcement to drop SHA-1 comes today, the Australian Signals Directorate (ASD) has been advising government agencies to move to SHA-2 since December 2011.

    The ASD also has a slightly different opinion of when the collision attacks were first known, stating that "theoretically impressive attacks" against SHA-1 were known since 2004, but that they were not practical to implement.

    ASD has already removed the "weakened but not broken" SHA-1 algorithm from use in its Information Security Manual.

    The US National Institute of Standards and Technology, which published the algorithm, also stated in September 2012 that US federal agencies should stop using SHA-1.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • LinkWithin related posts widget with photo thumbnails

    LinkWithin related posts widget with photo thumbnails


    LinkWithin是最近很紅的相關文章外掛,它改變以往以超連結文字顯示相關文章的做法,而是採用縮圖模式來顯示相關文章。只你網誌支援javascript,然後註冊認證後,你會拿到一串代碼,把代碼貼在網誌上,該程式碼就會自動偵測您的文章並以縮圖模式顯示相關文章!

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Pre-Beta Release of Windows 7

    Pre-Beta Release of Windows 7


    Over the past few years, you've asked us to make some changes to Windows. We listened closely. Now it's time to share an early look at how we've used your feedback.

    Windows 7 is faster, more reliable, and makes it easier to do what you want. Both the everyday things and the killer "is that really possible?" things.

    Dig into this site to see what's coming.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Twitter

    Twitter


    Twitter is a free social networking and micro-blogging service that enables its users to send and read each others' updates, known as tweets. Tweets are text-based posts of up to 140 characters, displayed on the author's profile page and delivered to other users - known as followers - who have subscribed to them. Senders can restrict delivery to those in their circle of friends or, by default, allow open access. Users can send and receive tweets via the Twitter website, Short Message Service (SMS) or external applications. The service is free over the Internet, but using SMS may incur phone service provider fees.

    Since its creation in 2006 by Jack Dorsey, Twitter has gained notability and popularity worldwide. It is sometimes described as the "SMS of the Internet", as it provides the functionality—via its application programming interface (API)—for other desktop and web-based applications to send and receive short text messages, often obscuring the Twitter service itself.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 微軟證實Hotmail個人資料遭竊取

    微軟證實Hotmail個人資料遭竊取


    根據BBC(英國廣播公司)報導,微軟公司的Windows Live Hotmail遭到網絡黑客入侵,超過萬個hotmail客戶資料遭到竊取,這些資料多數來自歐洲,微軟並證實遭竊取的密碼都是正確的。

    科技網誌neowin.net說,黑客除了盜取帳號密碼之外,又把盜取到的資料全數公布到網路上,超過上萬個hotmail帳戶的細節,2009年10月1日被貼上一個讓人分享密碼的網站pastebin.com。

    Neowin聲稱這些帳戶可能是被黑或是利用網路釣魚搜集而來。網路釣魚攻擊者利用發送釣魚郵件給受害者,受害者點選後,會被導向釣魚網頁,就會洩漏了個人的機密資訊給予攻擊者,如個人的信用卡號碼、密碼、帳號等。

    微軟目前表示,他們已經知悉此事,並正在積極了解及處理中。這件事透露出網路資訊安全的疑慮,若果個人資料遭到竊取,可能會有更多後續麻煩的事端。

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Linux Web Hosting

  • How to enable Mod-Rewrite Module

    How to enable Mod-Rewrite Module


    This module uses a rule-based rewriting engine (based on a regular-expression parser) to rewrite requested URLs on the fly. It supports an unlimited number of rules and an unlimited number of attached rule conditions for each rule, to provide a really flexible and powerful URL manipulation mechanism. The URL manipulations can depend on various tests, of server variables, environment variables, HTTP headers, or time stamps. Even external database lookups in various formats can be used to achieve highly granular URL matching.

    In order to enable Mod_Rewrite for your site you should create a text file called .htacccess in the directory where you wish the rewrite rules to apply.

    The first line of this text file should be:
    RewriteEngine On

    After that you can place your rewrite rules. Here are some examples for Joomla's SEF option:
    RewriteCond %{REQUEST_FILENAME} !-f
    RewriteCond %{REQUEST_FILENAME} !-d
    RewriteCond %{REQUEST_URI} (/|.htm|.php|.html|/[^.]*)$ [NC]
    RewriteRule ^(content/|component/) index.php

    Many applications come with ready to use rewrite rules that can be found in a file called htaccess.txt.

    Upload this file into the root of your domain(e.g. httpdocs). The changes take effect immediately.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plesk 9 Control Panel User’s Guide

    Plesk 9 Control Panel User’s Guide


    Parallels Plesk Panel is the only web hosting control panel with integrated web design, SaaS storefront and billing. Parallels Plesk Panel delivers maximum profits for growing service providers.

    Parallels Plesk Panel is the most complete Web hosting control panel available today. In fact, it’s the only Web hosting panel that includes integrated Web design tools, a SaaS storefront, and fully automated billing and provisioning. Plus it delivers maximum profits for growing service providers; provides key tools for Web designers; and includes an easy-to-use server control panel for IT professionals (and small businesses without IT staff).

    This is a guide to the new Panel user interface called Control Panel, which is focused only on hosting management. This guide is addressed to anyone who is going to manage websites and mail using Parallels Plesk Panel 9: hosting services customers, resellers and server administrators.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • PHP - How to Enable / Disable register_globals for website

    PHP - How to Enable / Disable register_globals for website


    You can Enable / Disable register_globals for php in your account by setting this directive in .htaccess in httpdocs folder:

    php_flag register_globals On

    or

    php_flag register_globals Off

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • PHP - How to define magic_quotes_gpc

    PHP - How to define magic_quotes_gpc


    You can Enable / Disable magic_quotes_gpc for php in your account by setting this directive in .htaccess in httpdocs folder:

    php_flag magic_quotes_gpc On

    or

    php_flag magic_quotes_gpc Off

    The magic_quotes_gpc is a function which automatically escape $_GET, $_POST and $_COOKIE variables. This cause a lot of (poorly written) PHP scripts out there which blindly rely on magic_quotes_gpc, to be wide open to various SQL/XSS-injections.

    If you run a website that relies on magic_quotes_gpc for escaping user input, we strongly recommend that you disable access to such scripts until a version fixing this bug is released.

    By default magic_quotes_gpc was turned off.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plesk 11 Administrator’s Guide

    Plesk 11 Administrator’s Guide


    With more than 250,000 Windows and Linux servers deployed, Parallels Plesk Panel is the preferred choice for hosting service providers, web designers, and website owners. Parallels Plesk Panel is the first step down your business' growth path - toward faster sites and faster mobile access for website owners and toward a complete product line as your hosting business grows.

    This guide is intended for server administrators who are going to manage Parallels Panel 11 and Customer and Business Manager. This document also includes instructions about offering Web Presence Builder in the Try and Buy (or trial) mode.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

E-Store

  • Attribute Management

    Attribute Management


    “商品特性”能允許您在某一項產品上,預先設定可供顧客在訂購時選擇更合適的產品細節,而且有效減少收到訂單後的種種跟進工作。

    例如您正在售賣的西褲,應該具備不同的“顏色”、“腰圍”、“褲長”等,以供顧客選購,而透過“商品特性”的預先設定,您便可自定產品選擇上的各種“選項名稱”和“選項值”。

    在您的‘網上商店’銷售的產品,都可以個別地套用合適的“商品特性”以解決同款產品但具備多樣化的訂購選擇,而且每種特性選擇可設定獨特的“差價”。

    例如某一衣服產品的正常售價是每件一百圓,若顧客選擇“大碼”則需多付十圓,意味這件“大碼衣服”的每件售價將會是一百一十圓。

    要在產品中增加“商品特性”,必需預先完成上一節指南介紹的“商品特性設定”。

    進入“商品特性管理”:
    1. 點擊主選單的“分類目錄/產品管理”

    2. 點擊左選單的“商品特性管理”

    3. 或 在“產品管理”中點擊針對產品的“特性選擇”動作

    新增“商品特性”產品:
    1. 點擊主選單的“分類目錄/產品管理”

    2. 點擊左選單的“商品特性管理”

    3. 點擊主螢幕的“增加”按鈕

    4. 選擇產品的目錄

    5. 選擇相關產品

    6. 點擊主螢幕的下方的“編輯”按鈕

    7. 剔取合適的“商品特性”和選擇其他合適的項目

    8. 完成後按“儲存”或“更新”,或按“返回”放棄並返回列表

    每項“商品特性”包含的資料:
    • “商品特性”名稱
      透過剔取“選擇方格”來決定是否套用

    • 增/減選擇
      如該項特性具有“差價”,則可透過選擇“+”(增加差價)或“–”(減少差價),如沒有設定“差價”則不需選擇

    • 選項的差價
      如該項特性具有“差價”,請輸入差價的數值,例如“10”,如沒有差價請留空

    • 排序
      針對特性在下拉選單的先後排序,如沒有刻意設定,系統將以“商品特性”名稱的筆劃來自動排列

    針對“商品特性”的動作:
    • 新增產品
      從已建立的產品裏挑選一項並套用商品特性

    • 編輯
      修改已經套用商品特性的產品資料

    • 刪除
      將該產品的商品特性刪除,此刪除動作只針對商品特性資料,不會把原有產品刪除

    注意事項:
    • 如有為產品的商品特性“設定差價”,則差價的貨幣是以您商店的“預設貨幣”為基礎

    • 若產品套用了商品特性,顧客應在放進“購物車”前選擇,而完成訂購後的訂單,雙方的訂購產品資料都會特別地註明所選的商品特性

    • 若產品套用了商品特性,在顧客選擇了並完成訂購程序後,有關產品的商品特性無法再修改

    • 產品的特性差價,會根據訂購數量反影在訂單總計裏,並連同其他應收款項一併計算


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 感謝詞

    感謝詞


    首先感謝您選用Ec2Biz電子商務系統。現時在亞洲各國,由以日本、台灣等地區的電子商務及網上營商已經發展成熟,而香港亦因擁有國際金融中心及先進的物流科技等重要資源,使得電子商務對各大中小企業來說已是公司業務的重要成功因素。

    以往由於很多公司受資源所限,要發展電子商務需面對種種障礙,例如沒有熟識有關技術的工程人員、對投資網絡器材及日後維護顯得難以入手,以致業務未能盡享網上營商所帶來的巨大商機。

    今天我們馮著多年網絡系統的設計及改良,規劃出國際水準的電子商務管理軟件、配合先進而安全穩定的美國原裝伺服器機組及防火牆設備,並由專業的工程人員分組管理及監察整個系統的運作。

    我們深信貴公司的基本業務配合Ec2Biz的電子商務系統,以最低的投資,享受國際市場上達致最高的競爭能力及回報。

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Send E-Voucher

    Send E-Voucher


    “電子禮券”方案能讓您更靈活地提供促銷優惠,例如每當商店有新品推出時,可透過向會員寄贈小額的現金電子禮券,吸引會員搶購您的新品之餘,更同時享受優惠帶來的樂趣。

    而在一些特殊情況,您亦可利用“電子禮券”解決銷售過程出現的麻煩,例如:
    • 顧客已付全數貨款,但訂購產品中某些未能如期付運,而且經雙方協議,利用電子禮券替代退款

    • 顧客收到的訂購品出現瑕疵,為減少退換產品的雙方資源,可建議寄贈電子禮券作為道歉的心意

    • 因不明的原因,顧客無法經郵遞收到訂購品,為減少損失,經雙方協議後,以電子禮券替代賠償

    請注意,寄贈的“電子禮券”需要收件者透過“啟用編號”行使禮券,而且跟現金相同,並無使用限制,若需設定具備使用條件的禮券,請參考“優惠禮券管理”。

    “電子禮券”與“優惠禮券”的差別:
    • 電子禮券
      跟現金相同,不含任何使用限制,顧客可付款自購,或由管理員簽發

    • 優惠禮券
      可設定若干行使限制,並只能透過管理員簽發

    進入“寄發電子禮券”:
    1. 點擊主選單的“電子禮券/優惠禮券”

    2. 點擊左選單的“寄發電子禮券”

    每項“寄發電子禮券”包含的資料:
    • 禮券金額
      電子禮券的面值金額,例如金額為三十圓,則數值便是“30”(必需輸入)

    • 寄給會員
      向所有會員、指定的“客戶群組”、或指定的某一會員透過電子郵件寄發電子禮券

    注意事項:
    • 電子禮券的面值必需視為金額,而不能設成折扣率,請勿混淆

    • 禮券啟用編號由隨機自動產生,每項禮券的啟用編號將不會重復

    • 禮券價值金額的貨幣將根據您商店的“預設貨幣”為基礎

    • 禮券的啟用,必需通過收禮者電郵所附的“啟用編號”,除此以外,並無其他途徑啟用電子禮券

    • 禮券一經寄出,將不能修改或刪除

    • 若顧客將禮券啟用後,在付款結帳後仍有禮券餘值,那餘值將儲存於顧客帳戶裏供下次購物時再使用

    • 顧客可將持有的禮券面值自用,或轉寄全部、部份面值給親友當現金使用(轉寄後的收禮者仍需按照正常程序登記成為會員及結帳)


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • E-Mail Duplicate

    E-Mail Duplicate


    透過“電子郵件副本”,您能翻閱最近從“管理員控制台”寄出的給顧客或查詢者的郵件,以便在出現分歧問題時掌握當時的訊息,而且亦有助處理客戶服務及改善運作。

    系統只會記錄從“管理員控制台”寄出的郵件,而店面自動寄出的一般確認信,例如“會員登記”、“訂單確認”、“查詢確認”等是不會被記錄,而其他非經商店系統處理的訊息,像普通電子郵件、網路郵局等,亦無法進行記錄。

    進入“電子郵件副本”:
    1. 點擊主選單的“系統工具”

    2. 點擊左選單的“電子郵件副本”

    “電子郵件副本”包含的資料:
    • 郵件主題

    • 郵件內容

    • 寄出日期

    • 寄件人
      一般為“商店管理員”或其他獲委派的管理員

    • 收收者

    針對“電子郵件副本”的動作:
    • 資訊
      檢視該封郵件的內容

    • 刪除
      將郵件副本刪除

    注意事項:
    • 郵件副本不包含“電子報”及“傳送手機短訊 ”

    • 系統只會記錄能成功從“管理員控制台”寄出的電子郵件

    • 成功寄出並不等於收件寄能順利收信或已閱讀郵件,尚有其他因素影響郵件的送遞,例如收件者郵箱已滿、郵件無法通過對方的垃圾郵件過慮、收件者電郵地址錯誤等。

    • 在各種郵件的處理上,如沒有選擇“保留郵件副本”,系統將無法記錄這些郵件

    • 一些免費申請的電子郵箱,例如“奇摩雅虎”,會加插他們的廣告於每封郵件內,而且內容也有可能被自動修改,所以從系統寄出的郵件格式,可能與收件者看見的不相同

    • 如果收信者堅稱無法收到您寄出的電郵,請嘗試使用其他方法向對方聯系,或請對方關注郵件是否被置於“Bulk Mail Folder”


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Error Log Viewer

    Error Log Viewer


    “錯誤記錄檢視器”是記錄“線上商店”及“管理員控制台”是一種除錯工具,由於整個系統由多組不同的程序語言組成,配合資料庫的存取,在變化多端的運作下難免會出現錯誤,雖然錯誤的發生比率很微,但若在出現問題時總是要盡快找出錯誤之處。

    如果發現系統運作出現問題而毫無頭緖時,應立即使用“錯誤記錄檢視器”的訊息,以便能按部就班地找出可疑的地方。

    進入“錯誤記錄檢視器”:
    1. 點擊主選單的“系統工具”

    2. 點擊左選單的“錯誤記錄檢視器”

    “錯誤記錄檢視器”包含的資料:
    • 一般錯誤記錄
      所有在程序語言出現的錯誤,例如由“跳脫字元(escapes)”、“函數”等引致的問題

    • 資料庫錯誤記錄
      所有從資料庫引致的錯誤,例如“資料表損毀”、“格式錯誤”、“存取錯誤”等

    注意事項:
    • 檢視器列出的訊息汲及高階語言,一般用戶較難理解,只適合由專業而具經驗者處理。

    • “錯誤記錄檢視器”只提供予“獨立套裝軟件”及“開發版軟件”,一般租用型式並未包含此功能。


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Pre-Sale Services

  • How to renew your Domain / Hosting Plan / other services?

    How to renew your Domain / Hosting Plan / other services?


    Our billing system will automatically send the renewal notification and invoice to your registered email address 15 day before the expiry date.

    You need to ensure your registered email is valid in the billing system and to alert on any email notification sent from us, You are responsible for keeping their contact information up to date.

    Please note your responsibility to track the services their expiration date.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Specific refund conditions based on method of payment

    Specific refund conditions based on method of payment


    Cash / Bank Deposit / Cheque:
    We will refund your money back to the account you sent payment from, mail a cheque, or via PayPal. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    PayPal:
    For orders paid via PayPal we will refund money to your PayPal account only. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    Credit Card:
    For security reasons the credit card you use to purchase any of Focus Network Company products must be valid when you request a refund. We cannot refund to a credit card that has expired or been cancelled.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • What are your DNS servers?

    What are your DNS servers?


    Please refer to:

    How to point my existing domain name to "Focus Network Company" server?

    ns1.powersx.com
    ns2.powersx.com

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Privacy Policy for your account

    Privacy Policy for your account


    We will never under any circumstance - rent, sell, exchange or in any way make your information available to third parties, unless legally required to do so.

    For international domain, ICANN does require that you receive one email per year to verify and update your contact information on your domain.

    Also, confirmation emails for ordering, domain name registrations and transfers, along with instructional email to activate services will still be sent to you.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Why using free email accounts is bad idea?

    Why using free email accounts is bad idea?


    We recommend that you NOT use an email address from a free service (e.g. Yahoo! or Hotmail) with your account information.

    Instead, please enter a traditional address, such as that from your account, or one issued to you by your ISP (Internet Service Provider).

    This gives us better assurance of being able to contact you should we need to, as well as helping us protect your account and prevent fraud.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Email Tutorial

  • Mozilla Thunderbird For Mac OSX Email Setup Tutorial

    Mozilla Thunderbird For Mac OSX Email Setup Tutorial


    In this tutorial you will learn how to setup Mozilla Thunderbird as an email client on your Mac OSX.

    What you will Need:

    • A valid email account, if you haven't created an email account yet please log into your Control Panel and set up an email account.
    • An email client. This tutorial uses Mozilla Thunderbird, which is a free opensource email client.


    Thunderbird is a standalone version of the Mozilla Mail client. It offers sophisticated mail management features without the associated Web browser. These instructions assume that you are using Thunderbird 0.5 (or greater) for MacOS X. The configuration might be slightly different for other versions of Thunderbird.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to setup your email account on Windows Phone 7 Mobile Device

    How to setup your email account on Windows Phone 7 Mobile Device


    Configuring your Windows Phone 7 device to receive mail from your hosted email accounts is a very easy process.

    This tutorial will give you a simple guide on the steps you need to perform to easily access your domain email accounts on the go with your Windows Phone 7 device.

    Currently tested devices are:
    • HTC Radar
    • SAMSUNG Focus
    • LG Optimus 7


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to setup Your Emails on PLESK Control Panel

    How to setup Your Emails on PLESK Control Panel


    This guide is intended for users of email web hosting service who were given access to Plesk control panel for managing their mail accounts.

    NOTE:the guide do not apply for Online E-Store System and server rental with colocation.

    Your e-mail accounts are configured through PLESK .
    To configure your e-mail program to fetch your e-mail use the following information in outlook or other email programs:

    POP3 (incoming) mail server: mail.yourdomain.com

    SMTP (outgoing) mail server: mail.yourISP.com

    Which means you will have to use your ISP smtp server.

    Please be aware, when you set up outlook that your UserID is your full email address.

    The url for your online webmail is
    http://webmail.yourdomain.com

    Where yourdomain.com is the domain name of your Web host.

    Please be aware that your email will not work until your domain resolved to our servers.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Setup fetch email using Google Gmail

    Setup fetch email using Google Gmail


    Why Should I Use Fetch Mail Instead of an Email Forwarder?

    We are committed to improving the stability of services.

    Unfortunately, it is very common for mail forwarding to cause blacklisting with many large email providers. This most commonly occurs when large amounts of mail are forwarded and then marked as spam after it has been received in the end user's inbox. This results in our server's sending reputation being penalized since it was the last server to send the mail. Ultimately, our server will be blacklisted with the email provider and it will affect all of other users on the same server.

    A solution to this is to disabled mail forwarding altogether. change to using mail fetcher, you can access mail in a other system without having the mail routed through that system's server. This way, you can mark a message as spam without it affecting our email server's reputation.

    The instructions below provide steps on how to fetch mail from our server so you can access them via Google Mail.

    Google Mail Fetcher is easy to set up and free to use. It uses POP3 to pull all the contents of an email box into Gmail and then parses the emails for spam. Mail Fetcher can download messages from up to five other email accounts, allowing you to centralize all your email in Gmail.

    Once Mail Fetcher is set up, Google will check those accounts on a regular basis, and new mail will appear automatically in Gmail.

    • Log into your Gmail account.
    • Click the gear icon in the upper right corner of the page and select Settings.
    • Click the Settings and Accounts and Import tab and locate the Check mail from other accounts (using POP3) section.
    • Click Add a POP3 mail account you own. (Note: Google does not allow the use of self-signed SSL certificates, including our shared SSL certificates.)
    • Enter the full email address of the account from which you'd like mail fetched.

    • Click Next Step.
    • In the Username field, enter your full email address.
    • In the Password field, enter the password for the email address you provided.
    • Select Port 110 for a POP3 connection.
    • Click the checkboxes next to the options that best suit your needs:
      • Leave a copy of retrieved messages on the server.
      • Always use a secure connection (SSL) when retrieving mail *
      • Label incoming messages
      • Archive incoming messages
    • Click Add Account.


    Attention
    • As a convenience to users, we provide information about how to use certain third-party products, but we do not have technical support third-party products. we are not responsible for the functions or reliability of such products.
    • Email Forwarding or Fetch Mail may disclose your secrets.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do I access my webmail (Check emails using a browser)?

    How do I access my webmail (Check emails using a browser)?


    You can read your mail and compose new messages even if you are far from your home or office computer. To do this, you first need to allow access to the Horde Webmail interface that is integrated with your control panel. Then you can work with your mail from any computer with Internet connection and Web browser installed, or a WAP-enabled cellular phone or a handheld computer (PDA).
    To login to your webmail use the following url:

    http://webmail.yourdomain.com

    *where yourdomain.com is your domain name.

    Login details are your email address and password you setup in your control panel.
    This is the perfect Webmail program, which comes with all our web hosting plans, so you can access your emails anywhere in the world.
    You can read your mail and compose new messages even if you are far from your home or office computer. To do this, you first need to allow access to the Horde Webmail interface that is integrated with your control panel. Then you can work with your mail from any computer with Internet connection and Web browser installed, or a WAP-enabled cellular phone or a handheld computer (PDA).
    Horde offers many of the features available in pc email clients like Outlook Express. Some of the features include:
    • Compose and send emails

    • Read your incoming mail

    • Email search facility

    • Address book

    • Calendar and events

    • Save work as a draft

    • Task lists

    • Create folders for storing your mail


    To login to your webmail use the following url:

    http://webmail.yourdomain.com

    *where yourdomain.com is your domain name.

    The login name is the full email address i.e. you@yoursite.com and the password is the one you setup when you created the email in PLESK.

    Login details are your email address and password you setup in your PLESK control panel or Online E-Store System.
    If you also use an email client like Outlook Express to check your mail and still want to access the mail with Horde, make sure you check the option to leave mail on the server. If you fail to do this, all your mail will be downloaded to your email client and won't be accessable via webmail with Horde. Please be aware though that leaving your emails on the server will increase your used disk space as well.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Knowledge Base Search

Type your question here. If no result are found, try more general search words. For Example: instead of "Email Account" try "Email".

If you did not find the Knowledge Base you were looking for, please try our FAQ

If you would like to know more about our services
please contact us immediately!

Contact Us

News & Events

Business Transformation Notice

2022 Chinese New Year Holiday Notice

2021 Chinese New Year Holiday Notice

2020 Chinese New Year Holiday Notice

2019 Chinese New Year Holiday Notice

New Article

Payment Method

Bank Deposit / ATM
Mailing Cheque
Credit Card

ec2Biz.com Interactive Multimedia Ecommerce Web Hosting Online Shop Domain name Solutions
© Focus Network Company. All Rights Reserved.