30 May, 2020
Welcome! Guest
[ Login ]
Home News & Events About Us Services FAQ Knowledge Base Affiliate Program Signup Contact Us
The ONE STOP SOLUTION to all your eBusiness Needs!
Overview
Knowledge Base

Our new knowledge base is a valuable collection of technical information, web site marketing tips, tutorial, glossary, and documentation.

If you feel anything is missing, or still have questions, please contact us. Looking for something specific? Can't see it here? Try our "Knowledge Base Search".


Email Tutorial

  • What is mail policy and email limits?

    What is mail policy and email limits?


    Mail Limits

    There is an maximum amount of emails which can be send out per hour is 30 emails from one account or 300 emails per domain and 700 emails per day, this limit is also applied "Web Hosting Service", "Towards Mailing Lists" and "Online E-Store System". Focus Network Company reserves the violation of any of the foregoing may result in immediate deactivate or termination upon any indication of such activity without notice.

    Many of our servers have a 60 pop checks per hour limit per email address.? If you go over this you're likely to get a wrong password error message saying login incorrect. Just wait an hour and it will automatically unlock you. to prevent this from happening again make sure to disable auto checking or at least set it to something higher such as 10 minutes.

    Any mailing list larger than 2000 will require a dedicated server solution from us. Note: dividing one large list into smaller lists to get below this limit is not allowed.

    We have a maximum size of emails of 50 MByte and under, any email over 50 MByte will be automatically rejected, please use your FTP to transfer big files!

    Mailing Lists Rules

    1. Anytime you're sending a message no matter how large your e-mail list is you must throttle it.? We recommend you throttle it to at the very least sending 1 email every 6 seconds. If the mailing list software you're using does not allow you to throttle you must switch to something else. We recommend Mailman which can be found in your control panel under PLESK. If you do not throttle and you try sending let's say 1500 emails the server will try sending all 1500 in 1 second which is not possible. This will cause the server load to go very high and for the entire server to be sluggish until this process is completed. It is our job to keep the server up and running without being sluggish. Anyone who causes the servers load to go high will be suspended and the process will be terminated. If you choose not to throttle you will most likely be suspended for crashing the server without notice.

    2. Any mailing list over 100 emails is only allowed to be sent to during off-peak times to prevent high server loads. Off peak times qualify as all day Saturday and Sunday, and 1am - 8 am eastern time M-F.

    3. You are not allowed to mail to a mailing list you were given or purchased. This is spamming because they never agreed to you personally sending them mail. We do not care and how you justify it this is spam and will result in termination of the offending account.

    4. Any unsolicited e-mail being sent will result in termination of the offending account without notice. We take a zero tolerance stance against sending of unsolicited e-mail.



    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Setup fetch email using Google Gmail

    Setup fetch email using Google Gmail


    Why Should I Use Fetch Mail Instead of an Email Forwarder?

    We are committed to improving the stability of services.

    Unfortunately, it is very common for mail forwarding to cause blacklisting with many large email providers. This most commonly occurs when large amounts of mail are forwarded and then marked as spam after it has been received in the end user's inbox. This results in our server's sending reputation being penalized since it was the last server to send the mail. Ultimately, our server will be blacklisted with the email provider and it will affect all of other users on the same server.

    A solution to this is to disabled mail forwarding altogether. change to using mail fetcher, you can access mail in a other system without having the mail routed through that system's server. This way, you can mark a message as spam without it affecting our email server's reputation.

    The instructions below provide steps on how to fetch mail from our server so you can access them via Google Mail.

    Google Mail Fetcher is easy to set up and free to use. It uses POP3 to pull all the contents of an email box into Gmail and then parses the emails for spam. Mail Fetcher can download messages from up to five other email accounts, allowing you to centralize all your email in Gmail.

    Once Mail Fetcher is set up, Google will check those accounts on a regular basis, and new mail will appear automatically in Gmail.

    • Log into your Gmail account.
    • Click the gear icon in the upper right corner of the page and select Settings.
    • Click the Settings and Accounts and Import tab and locate the Check mail from other accounts (using POP3) section.
    • Click Add a POP3 mail account you own. (Note: Google does not allow the use of self-signed SSL certificates, including our shared SSL certificates.)
    • Enter the full email address of the account from which you'd like mail fetched.

    • Click Next Step.
    • In the Username field, enter your full email address.
    • In the Password field, enter the password for the email address you provided.
    • Select Port 110 for a POP3 connection.
    • Click the checkboxes next to the options that best suit your needs:
      • Leave a copy of retrieved messages on the server.
      • Always use a secure connection (SSL) when retrieving mail *
      • Label incoming messages
      • Archive incoming messages
    • Click Add Account.


    Attention
    • As a convenience to users, we provide information about how to use certain third-party products, but we do not have technical support third-party products. we are not responsible for the functions or reliability of such products.
    • Email Forwarding or Fetch Mail may disclose your secrets.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Setup fetch email using Outlook mail / Hotmail

    Setup fetch email using Outlook mail / Hotmail


    Why Should I Use Fetch Mail Instead of an Email Forwarder?

    We are committed to improving the stability of services.

    Unfortunately, it is very common for mail forwarding to cause blacklisting with many large email providers. This most commonly occurs when large amounts of mail are forwarded and then marked as spam after it has been received in the end user's inbox. This results in our server's sending reputation being penalized since it was the last server to send the mail. Ultimately, our server will be blacklisted with the email provider and it will affect all of other users on the same server.

    A solution to this is to disabled mail forwarding altogether. change to using mail fetcher, you can access mail in a other system without having the mail routed through that system's server. This way, you can mark a message as spam without it affecting our email server's reputation.

    The following articles explain how to set up mail fetching for other services and are for reference only.

    http://windows.microsoft.com/en-us/outlook/pop-email

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Setup fetch email using Yahoo! Mail

    Setup fetch email using Yahoo! Mail


    Why Should I Use Fetch Mail Instead of an Email Forwarder?

    We are committed to improving the stability of services.

    Unfortunately, it is very common for mail forwarding to cause blacklisting with many large email providers. This most commonly occurs when large amounts of mail are forwarded and then marked as spam after it has been received in the end user's inbox. This results in our server's sending reputation being penalized since it was the last server to send the mail. Ultimately, our server will be blacklisted with the email provider and it will affect all of other users on the same server.

    A solution to this is to disabled mail forwarding altogether. change to using mail fetcher, you can access mail in a other system without having the mail routed through that system's server. This way, you can mark a message as spam without it affecting our email server's reputation.

    The following articles explain how to set up mail fetching for other services and are for reference only.

    http://help.yahoo.com/kb/SLN3527.html

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to configure Outlook Express With POP Before SMTP Relay

    How to configure Outlook Express With POP Before SMTP Relay


    Our use different SMTP relays for sending mail - POP before SMTP. In POP before SMTP, the relay system collects your IP address when you authenticate yourself with the POP server, and then permits SMTP relaying from that IP address for 5 minute.

    In other words, you need to check your mail first, only then you can send your messages.

    To configure your Outlook Express or any other e-mail client, you need to know your POP3 and SMTP servers address.

    In this tutorial we will learn how to setup Outlook Express with POP Before SMTP Relay.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Glossary

  • PNG (Portable Network Graphics)

    PNG (Portable Network Graphics)


    PNG (Portable Network Graphics) is a bitmapped image format that employs lossless data compression. PNG was created to improve and replace the GIF format, as an image-file format not requiring a patent license.

    PNG is pronounced "ping" , but can be spoken "P-N-G" to avoid confusion with network tool ping. PNG is supported by the libpng reference library (platform-independent), with C functions for handling PNG images.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • E-Mail

    E-Mail


    Electronic mail (abbreviated "e-mail" or, often, "email") is a store and forward method of composing, sending, storing, and receiving messages over electronic communication systems.

    The term "e-mail" (as a noun or verb) applies both to the Internet e-mail system based on the Simple Mail Transfer Protocol (SMTP) and to intranet systems allowing users within one organization to e-mail each other. Often these workgroup collaboration organizations may use the Internet protocols for internal e-mail service.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Search Engine

    Search Engine


    A search engine is an information retrieval system designed to help find information stored on a computer system, such as on the World Wide Web, inside a corporate or proprietary network, or in a personal computer. The search engine allows one to ask for content meeting specific criteria (typically those containing a given word or phrase) and retrieves a list of items that match those criteria. This list is often sorted with respect to some measure of relevance of the results. Search engines use regularly updated indexes to operate quickly and efficiently.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • B2C (Business-to-consumer)

    B2C (Business-to-consumer)


    B2C (Business-to-consumer), also business-to-customer, describes activities of commercial organizations serving the end consumer with products and/or services.

    The two main challenges faced by B2C e-commerce are building traffic and sustaining customer loyalty. Due to the winner-take-all nature of the B2C structure, many smaller firms find it difficult to enter a market and remain competitive.

    In addition, online shoppers are very price-sensitive and are easily lured away, so acquiring and keeping new customers is difficult.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Cookie

    Cookie


    The term Cookie derives from "magic cookie", a packet of data a program receives but only uses for sending it again, possibly to its origin, unchanged. Magic cookies were already used in computing when Lou Montulli had the idea of using them in Web communications in Mar 1993.

    Purpose
    HTTP cookies are used by Web servers to differentiate users and to maintain data related to the user during navigation, possibly across multiple visits. HTTP cookies were introduced to provide a way for realizing a "shopping cart" (or "shopping basket"), a virtual device into which the user can "place" items to purchase, so that users can navigate a site where items are shown, adding or removing items from the shopping basket at any time.

    Allowing users to log in to a website is another use of cookies. Users typically log in by inserting their credentials into a login page; cookies allow the server to know that the user is already authenticated, and therefore is allowed to access services or perform operations that are restricted to logged-in users.

    Many websites also use cookies for personalization based on users' preferences. Sites that require authentication often use this feature, although it is also present on sites not requiring authentication. Personalization includes presentation and functionality. For example, the Wikipedia Web site allows authenticated users to choose the webpage skin they like best; the Google search engine allows users (even non-registered ones) to decide how many search results per page they want to see.

    Cookies are also used to track users across a website. Third-party cookies and Web bugs, explained below, also allow for tracking across multiple sites. Tracking within a site is typically done with the aim of producing usage statistics, while tracking across sites is typically used by advertising companies to produce anonymous user profiles, which are then used to target advertising (deciding which advertising image to show) based on the user profile.

    Browser Setting
    Described in " How to Enable Cookie " section.

    Cookie Expiration
    Persistent cookies have been criticized by privacy experts for not being set to expire soon enough, and thereby allowing some websites to track users and build up a profile of them over time. This aspect of cookies also compounds the issue of session hijacking, because a stolen persistent cookie can potentially be used to impersonate a user for a considerable period of time.

    Identification
    If more than one browser is used on a computer, each usually has a separate storage area for cookies. Hence cookies do not identify a person, but a combination of a user account, a computer, and a Web browser. Thus, anyone who uses multiple accounts, computers, or browsers has multiple sets of cookies.

    Likewise, cookies do not differentiate between multiple users who share a computer and browser, if they do not use different user accounts.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

General Information

  • Coppermine

    Coppermine


    Coppermine Photo Gallery is a picture gallery script. Users can upload pictures with a web browser (thumbnails are created on the fly), rate pictures, add comments and send e-cards.

    The admins can manage the galleries and batch add pictures that have been uploaded on the server by FTP. Support for multimedia files has been added recently. Images are stored in albums and albums can be grouped by categories.

    The script supports multiple users and each user can possibly have its own set of albums. The script also supports multiple languages and has a theme system.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Xaraya

    Xaraya


    Xaraya delivers the requisite infrastructure and tools to create custom web applications that include fully dynamic multi-platform Content Management Solutions (CMS).

    Xaraya's modular, database independent architecture introduces tools that separate form, function, content, and design with on-the-fly extensions allowing greater control and versatility.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • OpenX

    OpenX


    OpenX (phpAdsNew) is an open-source ad server, with an integrated banner management interface and tracking system for gathering statistics.

    With OpenX you can easily rotate paid banners and your own in-house advertisements.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • CRE Loaded

    CRE Loaded


    Create your storefront catalog and upload product images, text, and graphics to your storefront.

    Manage orders and inventory with the shopping cart. Process credit card payments through PayPal or Authorize.net, set up special pricing, and determine shipping costs.

    And so much more -- and all from anywhere you can access the Internet. CRE Loaded also offers hundreds of different templates to customize the look of your online store, so you can offer your customers a unique, easily identifiable, and fully branded shopping experience.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Zen Cart

    Zen Cart


    Zen Cart truly is the art of e-commerce; free, user-friendly, open source shopping cart software. The ecommerce web site design program is being developed by a group of like-minded shop owners, programmers, designers, and consultants that think ecommerce web design could be and should be done differently.

    Some shopping cart solutions seem to be complicated programming exercises instead of responding to users needs, Zen Cart puts the merchants and shoppers requirements first. Similarly, other shopping cart software programs are nearly impossible to install and use without an IT degree, Zen Cart can be installed and set-up by anyone with the most basic web site building and computer skills.

    There are hundreds of shopping cart programs available, but none come close to offering the level of options, features and support available with Zen Cart. Even the commercial programs have a hard time competing.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Industry News

  • Summit 2008 Agenda Announced by Parallels

    Summit 2008 Agenda Announced by Parallels


    Parallels has announced the following topics are to be featured at Summit 2008: Software as a Service (SaaS), Virtualization and 'green' hosting.

    This free, two-day event will welcome customers, partners and other industry participants from around the world on May 19-20 at the Omni Shoreham Hotel in Washington, DC.

    This year's Summit will feature keynotes by industry leaders and innovators, as well as in-depth product, strategy and networking sessions for business and technical professionals. The event will also include hands-on technical labs for Parallels Plesk Control Panel, Parallels Virtuozzo Containers, and Parallels Plesk Billing, sponsored by HP.

    "The Parallels Summit 2008 brings together business and technical professionals to discuss not only virtualization and automation technologies, but also broader hosting and SaaS trends and opportunities," said Kurt Daniel, senior vice president of marketing and online, Parallels. "This year's event will build on the momentum of the previous two years and offers valuable networking with potential business partners, Parallels technical and business resources, and other industry participants."

    Agenda Highlights
    The Parallels Summit 2008 begins Monday, May 19 at 9 a.m. with morning sessions followed by the opening keynote at 1:30 p.m. The Summit program concludes on Tuesday, May 20 at 5 p.m.

    The agenda features two tracks: a business track, which will focus on product features, profitability and use cases; and a technical track, which will focus on product-specific implementations, architectures and hands-on problem solving.

    Featured speakers include:
    • Bill McNee, Founder and CEO, Saugatuck Technology, who will share findings from Saugatuck Technology's most recent SaaS research program and annual SaaS Research Report.

    • Dan Golding, Analyst for Tier 1 Research, who will provide expert analysis of the hosting industry and trends.

    • Serguei Beloussov, CEO of Parallels, who will describe the next generation of SaaS and virtualization based on Parallels' unique perspective due to its large, global customer base.

    • Top-level Executives, who represent industry leaders and innovative smaller companies who will discuss technology developments that are shaping the industry.

    Parallels will also host two evening networking events for attendees. On Monday night, attendees are invited to join Parallels for an Odyssey Boat Cruise. Event participants staying through Tuesday evening can choose to attend a Washington Nationals baseball game against the Philadelphia Phillies at the brand new ballpark, which features a high-definition scoreboard that displays more than 1 million pixels.

    A detailed agenda of planned sessions and activities is available at http://www.parallels.com/summit/agenda .

    Register, Reserve Hotel before April 19
    Parallels Summit 2008 is expected to attract hundreds of business and IT professionals from around the world. Space is limited and registration and hotel accommodations are subject to availability. To register or become a sponsor, visit http://www.parallels.com/summit today.

    About Parallels - Optimized Computing
    Parallels (formerly SWsoft) is a worldwide leader in virtualization and automation software that optimizes computing for consumers, businesses, and service providers across all major hardware, operating systems, and virtualization platforms. Founded in 1999, Parallels is a fast-growing company with 900 employees in North America, Europe, and Asia.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Microsoft recommends against usage of SHA-1

    Microsoft recommends against usage of SHA-1


    Microsoft is advising its customers to stop using the SHA-1 hashing algorithm in cryptographic applications such as SSL/TLS encryption and code signing.

    In a security advisory issued by the company, Microsoft said that it would stop recognising certificates using the algorithm after January 1, 2016. After this date, certificate authorities (CAs) that issue certificates under the Windows Root Certificate Program will only be able to issue SHA-2 certificates.

    According to Microsoft, SHA-1 is used in 98 percent of all certificates issued worldwide. However, it also claims that since 2005 researchers have discovered collision attacks against the algorithm that mean it no longer meets its security standards. Although the announcement to drop SHA-1 comes today, the Australian Signals Directorate (ASD) has been advising government agencies to move to SHA-2 since December 2011.

    The ASD also has a slightly different opinion of when the collision attacks were first known, stating that "theoretically impressive attacks" against SHA-1 were known since 2004, but that they were not practical to implement.

    ASD has already removed the "weakened but not broken" SHA-1 algorithm from use in its Information Security Manual.

    The US National Institute of Standards and Technology, which published the algorithm, also stated in September 2012 that US federal agencies should stop using SHA-1.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 33 Million Domains Registered in 2007

    33 Million Domains Registered in 2007


    Report released by VeriSign, shows that over 33 Million domain names were registered in 2007, bringing the total up to 153million domains.

    Below is a summary of the report:

    In the last quarter of 2007, the base of domain name registrations grew 27 percent over the fourth quarter of 2006 and five percent over the third quarter of 2007… The total base of Country Code Top Level Domain Names (ccTLDs) was 58 million, a 33 percent increase year over year and a six percent increase quarter over quarter. Across all of the gTLDs and ccTLDs, .com has the highest base followed by .de (Germany), .net and .cn (China). The fifth spot is shared by .uk (United Kingdom) and .org. with approximately the same size base of domain name registrations.

    This release also states that the adoption of IPv6 has been relatively slow in the United States as compared to Asia and Europe. More than 100 domain name registries (i.e. top-level domain managers) support IPv6 for name servers and DNS queries including VeriSign who has supported IPv6 for .com and .net since 2002. The root name servers were enabled for IPv6 in February 2008 with the inclusion of IPv6 addresses for six of the thirteen root servers, including the A and J root servers operated by VeriSign.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 如何利用異地備份隬補防毒軟件的不足

    如何利用異地備份隬補防毒軟件的不足


    從世衛在2009年4月24號發出的第一個人類豬流感個案開始,至今已有76個國家和超過3萬感染個案而豬流感病毒變種的問題也成為了全球關注的話題。其實在電腦的世界,惡性攻擊病毒每天在不斷的增加、更新和改變,而企業往往就因為病毒入侵而造成數據丟失和摧毀的受害者。如何防範數據丟失帶來的災難性影響,是企業I.T.部門經常要面對的挑戰。

    企業單靠病毒掃描軟件並不足夠

    根據美國FBI 2005的研究指出,約84%的公司會受到惡性病毒的攻擊。另外,美國網絡安全協會(Cyber Secure Institute) 的報告指出,企業為了清除各項病毒的花費高達90億美元!無論您為電腦做再好的隔離措施,例如擁有最新的防病毒軟件和頻密的病毒掃描,病毒也可以找到辦法入侵電腦系統然後摧毀公司重要的檔案,例如客戶清單、合約和訂單等等。公司因為數據丟失和內部電腦系統故障影響而到商譽也絕非金錢能隬補。所以,企業要防範數據丟失帶來的災難性影響,單靠病毒掃描軟件並不足夠。

    設立災難性回復方案才能治本

    其實要解決以上問題就要從根本著手,第一步就是要為企業電腦系統設立有效和快速的災難復原方案 (Disaster Recovery Solution),而當中最重要的一環便是為每台電腦作鏡像備份(Image Backup),這樣,當遇到病毒入侵造成數據丟失,企業便可快速地把事先備份好電腦鏡像直接恢復到電腦上,把受到感染或是有故障的電腦復原到正常狀態,確保企業持續運作,儲存於電腦內的業務數據亦能得以保存。

    有資深企業備份經驗的Ahsay 銷售部經理候健生指出:「如何為企業設立有效和快速的災難復原方案是一個很大的課題,大小企業都需要正視。但對中小企來說,由於資源所限,加上公司內未必有專門負責I.T.方面的人員,所以很多中小企都未有實行。其實坊間都有不少能夠提供鏡像備份(Image Backup)的備份軟件,可以滿足基本備份需要。但這些軟件只能夠作本地備份,一旦公司的電腦受到病毒侵襲,用作儲存備份的電腦或伺服器亦可能已經中毒,導致已備份的鏡像無法還原而不能做到災難復原。所以企業應選擇具備異地鏡像備份的備份軟件,才能確保災難復原能發揮功效,因為就算本地公司內所有電腦和伺服器都已經中毒,儲存於異地的鏡像備份數據亦不會受到感染,企業便可快速地把電腦鏡像直接從異地恢復到電腦上,達至災難復原的目的。而Ahsay Backup Software 是市場上少數可以做到異地鏡像備份的企業備份方案。」

    關於Ahsay

    Ahsay Systems Corporation (亞勢系統有限公司) 建基於香港,目前在世界各地已擁有超過2, 900個服務合作夥伴和經銷商,並有超過90萬用戶安裝了Ahsay Backup Software備份軟件。

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 微軟證實Hotmail個人資料遭竊取

    微軟證實Hotmail個人資料遭竊取


    根據BBC(英國廣播公司)報導,微軟公司的Windows Live Hotmail遭到網絡黑客入侵,超過萬個hotmail客戶資料遭到竊取,這些資料多數來自歐洲,微軟並證實遭竊取的密碼都是正確的。

    科技網誌neowin.net說,黑客除了盜取帳號密碼之外,又把盜取到的資料全數公布到網路上,超過上萬個hotmail帳戶的細節,2009年10月1日被貼上一個讓人分享密碼的網站pastebin.com。

    Neowin聲稱這些帳戶可能是被黑或是利用網路釣魚搜集而來。網路釣魚攻擊者利用發送釣魚郵件給受害者,受害者點選後,會被導向釣魚網頁,就會洩漏了個人的機密資訊給予攻擊者,如個人的信用卡號碼、密碼、帳號等。

    微軟目前表示,他們已經知悉此事,並正在積極了解及處理中。這件事透露出網路資訊安全的疑慮,若果個人資料遭到竊取,可能會有更多後續麻煩的事端。

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Linux Web Hosting

  • MySQL - How do I export or backup a MySQL Database

    MySQL - How do I export or backup a MySQL Database


    You can easily create a database dump (export/backup) of a databases used by phpMyAdmin.

    This tutorial will outline the steps required to export or backup your MySQL databases.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plesk 9 Quick Start Guide

    Plesk 9 Quick Start Guide


    Parallels Plesk Panel is the only web hosting control panel with integrated web design, SaaS storefront and billing. Parallels Plesk Panel delivers maximum profits for growing service providers.

    Parallels Plesk Panel is the most complete Web hosting control panel available today. In fact, it’s the only Web hosting panel that includes integrated Web design tools, a SaaS storefront, and fully automated billing and provisioning. Plus it delivers maximum profits for growing service providers; provides key tools for Web designers; and includes an easy-to-use server control panel for IT professionals (and small businesses without IT staff).

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Default home page priority

    Default home page priority


    The filename below is the order of priority which the web hosting will read as the website index (default/main) page.

    1. index.php
    2. index.html
    3. index.htm
    4. index.shtml
    5. index.cfm (Option)

    If you need to change a site or directory default page, you can do so see: How do you set a website default page to something other than index.html.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plesk 11 Customer’s Guide

    Plesk 11 Customer’s Guide


    With more than 250,000 Windows and Linux servers deployed, Parallels Plesk Panel is the preferred choice for hosting service providers, web designers, and website owners. Parallels Plesk Panel is the first step down your business' growth path - toward faster sites and faster mobile access for website owners and toward a complete product line as your hosting business grows.

    This is a guide helps customers to accomplish hosting-management routines and create sites with Parallels Web Presence Builder.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plesk 11 Reseller’s Guide

    Plesk 11 Reseller’s Guide


    With more than 250,000 Windows and Linux servers deployed, Parallels Plesk Panel is the preferred choice for hosting service providers, web designers, and website owners. Parallels Plesk Panel is the first step down your business' growth path - toward faster sites and faster mobile access for website owners and toward a complete product line as your hosting business grows.

    Resellers are middlemen between server administrators and end users. They order hosting services from the first group and sell them to the second. This guide explains how to set up and manage this business.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

E-Store

  • Customers Approval

    Customers Approval


    我們的“網上開店”系統,可以同時以單一網站實行“B2C”和“B2B”的方案,如果您決定以“B2B”型式營運線上貿易,則可透過向每一位登記的會員進行篩選,確保不會令業務資料外流給競爭對手。

    而這份指南將介紹如何處理登記會員的確認工作。
    設首先確定已經把“系統設定”的“會員設定”裏“新增客戶批核選擇”設成“需批核”。

    若希望商店產品的售價只讓已批核會員觀看,請同時將“系統設定”的“會員設定”裏“非認可批核會員不能觀看售價”設成“啟用”。

    如您的“網上商店”屬零售“B2C”模式,這裏的說明請直接忽略。

    進入“待確認會員”管理:
    1. 點擊主選單的“訂單處理/客戶管理”

    2. 點擊左選單的“待確認會員”

    3. 選擇針對的會員

    “待確認會員”包含的資料:
    • 客戶基本資料
      檢視登記資料,考慮是否批核該名會員

    • 郵件主題及內容
      使用預設郵件範本,寄出確認通知

    • 確認
      直接點擊“確認”按鈕

    針對“待確認會員”的動作:
    • 確認會員
      若檢視資料後認為合適,可進行確認工作

    • 刪除
      若登記者不符合要求,可直接刪除

    • 寄電子郵件
      在正式確認前寄電郵向登記者查詢

    注意事項:
    • 未被確認的登記者,將無法登入網站

    • 如啟用“非認可批核會員不能觀看售價”,則未被確認的登記者將無法登入及觀看售價

    • 可配合“目錄分類”的“專屬客戶目錄”,把產品隱藏,令一般人無法觀看,只對被確認而且亦是“專屬客戶”級別的會員開放瀏覽權

    • 若需要將已經確認的會員轉回“未確認狀態,請往“客戶資料”選出該會員並修改“會員確認”及“專屬客戶狀態”


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Products Additional Info

    Products Additional Info


    “附加產品資料”適合用於一些需要提供額外說明,或更詳盡產品規格的商品,這些附加的產品資料不會主動在“產品詳細頁”顯示,而是在該項產品的頁面展示含有連結的主題。

    當顧客點擊該主題,隨即便會彈出另一個小型視窗並在視窗內顯示這些“附加產品資料”。

    每項附加產品資料包含的資料:
    • “中英文”主題 - 最多125個字元

    • “中英文”內容 - 無限制內容,以“HTML”型式儲存及顯示,可加插圖片

    新增附加產品資料:
    1. 點擊主選單的“分類目錄/產品管理”

    2. 點擊左選單的“附加產品資料”

    3. 點擊主螢幕的“增加”按鈕

    4. 選擇產品的目錄

    5. 選擇相關產品

    6. 點擊主螢幕的下方的“增加”按鈕

    7. 輸入相關資料

    8. 完成後按“儲存”或“更新”,或按“返回”放棄並返回列表

    更改附加產品資料狀態:
    • 附加產品資料
      點擊狀態列的“綠色”或“紅色”按鈕

    針對附加產品資料的動作:
    • 增加
      針對產品新增一筆附加資料

    • 編輯
      修改已經增加的附加產品資料資料,例如更改“中英文”主題、“中英文”內容

    • 刪除
      將該附加產品資料刪除,此刪除動作只針對附加產品資料,不會把原有產品刪除

    注意事項:
    • 每項產品不限“附加產品資料”的數量

    • 這些只屬產品的額外資訊,不會影響產品的銷售條件及訂購過程

    • “中英文”主題、內容需分別輸入

    • 已經建立的附加產品資料可透過狀態改變成“顯示”或“不顯示”


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Brand or Manufacturer

    Brand or Manufacturer


    如果您的產品是由多個“品牌”或“廠商”組成,這樣便可透過“品牌或廠商”的預先設定,將產品歸納在所屬的品牌內。

    透過“品牌或廠商”,您的多元化產品不會再感覺混亂,而是變得讓顧客更容易集中瀏覽、架構更清楚,而且更能提高管理產品的效率。

    進入“品牌或廠商”管理:
    1. 點擊主選單的“分類目錄/產品管理”

    2. 點擊左選單的“品牌或廠商”

    每項“品牌或廠商”包含的資料:
    • 品牌名稱
      “中文”或“英文”的名稱,最多125個字元,請盡量簡短(必需輸入)

    • 品牌網頁
      針對該品牌的“中英文”官方網站,讓顧客瀏覽時可到這品牌的網站參考資料,必需包含由http://開首的完整網址(按需要使用)

    • 品牌圖片
      JPG、GIF或PNG格式(按需要使用)

    針對“品牌或廠商”的動作:
    • 新增
      新增一個品牌或廠商

    • 編輯
      修改已經建立的品牌或廠商,例如更改名稱、轉換圖片

    • 刪除
      將該品牌刪除,此刪除動作只針對品牌或廠商資料,不會把原有產品刪除

    • 資訊
      顯示該品牌或廠商的資訊,包括內含產品數量

    • 更新產品
      針對所屬該品牌或廠商的產品進行“快捷產品更新”

    注意事項:
    • 品牌或廠商的設定,建議應在“初始設定”時預先完成,以方便往後的“產品新增”及針對產品“匯出、匯入資料”的管理。

    • 如某一項“品牌或廠商”內含龐大產品數量,在點擊“資訊”時需較長時間下載頁面,請耐心等待。

    • 請自行了解有關“品牌”連結網址、圖片的知識產權及使用問題,若未經該“品牌”允許使用的相關資料,將有可能觸犯法例。

    • 有關著作權與商標聲明,您應在適當頁面,例如“使用條款”及“產品內容”,標明該品牌的商標擁有權,以避免觸犯任何國家的商標法例,例如您正在出售Intel的產品,則應聲明像是「Intel 和Itanium 是Intel Corporation 及其子公司在美國和其他國家(地區)的商標或註冊商標」。

    • 我們不會就“著作權與商標”相關的使用及法律問題提供支援服務,對于錯誤使用所引致的責任,亦與我們無關,敬請留意。


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Database Backup

    Database Backup


    對於“電子商務”系統的持續運作,均依賴可靠而穩定的“資料庫”記錄所有的資料,而每當頁面的取存、顧客的各種動作、以及管理員的日常維護,都會改動“資料庫”中相關的資料表。

    由於“資料庫”的內容隨著各種的“讀”、“寫”、“比較”、“搜查”,都會不停地改變,所以備份的工作將顯得十分重要。

    我們的系統已經內置每天備份“資料庫”的功能,管理員一般無需刻意處理,但是備份點只會在每日指定時間,由系統自動執行,所以只會備份執行當時之前的資料,而未到下次的備份之間將存在一些不可預知的風險。

    所以我們建議管理員每次進行商店的維護或較大規模的增減資料工作前,以手動方式進行備份及下載備份檔,可確保維護出錯時前得到修復的機會。

    “資料庫”的備份,只針對文字及數值的資料,任何檔案、圖片、以及客戶上載的檔案將不會在此得到備份。

    其他如系統檔案等,備份的工作將由伺服器在例行備份時處理,但這些備份檔我們不會提供給客戶下載保留服務。

    進入“資料庫備分”管理:
    1. 點擊主選單的“系統工具”

    2. 點擊左選單的“資料庫備分”

    3. 選用主螢幕的合適功能

    針對“資料庫備份”:
    1. 點擊主螢幕的“備份”按鈕

    2. 選擇是否備份後下載檔案,如只儲存在伺服器端,將會佔據儲存空間

    3. 如資料龐大,備份時間將會稍長,請耐心等候,備份未完成前切勿處理其他維護工作

    針對“資料庫回存”:
    1. 點擊主螢幕的“回存”按鈕

    2. 上載在您電腦內的備份檔案

    3. 或選擇伺服器端的備份檔案後,點擊“回復資料庫”

    4. 如資料龐大,回存時間將會稍長,請耐心等候,回存未完成前切勿處理其他維護工作

    針對伺服器端“備份檔案”的動作:
    • 回復資料庫
      選擇合適的伺服器端檔案進行回復

    • 刪除
      將伺服器端檔案刪除

    注意事項:
    • 在已知的問題中,龐大的資料庫可能無法順利進行“備份”或“回存”,若在必須的情況下,請通知我們為您處理

    • 下載後的“備份檔”應保留完整狀態,不應修改或增減內容,否則無法進行回存


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • E-Voucher Usage Status

    E-Voucher Usage Status


    透過“已發出禮券狀態”的實時報告,您能隨時掌握已簽發的“電子禮券”,報告的內容包括禮券的寄出日期,啟用資訊等。

    請注意,寄贈的“電子禮券”需要收件者透過“啟用編號”行使禮券,而且跟現金相同,並無使用限制,若需設定具備使用條件的禮券,請參考“優惠禮券管理”。

    進入“已發出禮券狀態”:
    1. 點擊主選單的“電子禮券/優惠禮券”

    2. 點擊左選單的“已發出禮券狀態”

    每項“已發出禮券狀態”包含的資料:
    • 寄件人

    • 收件者

    • 寄出日期

    • 禮券金額

    • 啟用編號

    • 啟用日期

    • 收件者電郵地址

    注意事項:
    • 電子禮券的面值必需視為金額,而不能設成折扣率,請勿混淆

    • 禮券啟用編號由隨機自動產生,每項禮券的啟用編號將不會重復

    • 禮券價值金額的貨幣將根據您商店的“預設貨幣”為基礎

    • 禮券的啟用,必需通過收禮者電郵所附的“啟用編號”,除此以外,並無其他途徑啟用電子禮券

    • 禮券一經寄出,將不能修改或刪除

    • 若顧客將禮券啟用後,在付款結帳後仍有禮券餘值,那餘值將儲存於顧客帳戶裏供下次購物時再使用

    • 顧客可將持有的禮券面值自用,或轉寄全部、部份面值給親友當現金使用(轉寄後的收禮者仍需按照正常程序登記成為會員及結帳)


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Domain Names Knowledge

  • How do I change DNS records if my domain is registered with Directnic?

    How do I change DNS records if my domain is registered with Directnic?


    If your domain is registered with Directnic and you want to use Focus Network Company web hosting or E-Store service, you'll just need to follow these simple steps in order to point the domain to our name servers.

    1. Log in to your Directnic account and click on the Domain Manager link. http://www.directnic.com

    2. Click on the Change Nameserver Information icon located to the right of your domain name, under the Options heading.
    3. Replace the nameserver information listed with the below.
      ns1.powersx.com
      ns2.powersx.com
    4. Click on the Modify button at the bottom of the page and you're done.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to point my existing domain name to "Focus Network Company" server?

    How to point my existing domain name to "Focus Network Company" server?


    Using your existing domain name with "Focus Network Company" service is easy! You simply have to point it to your account by replacing your old host DNS settings with our domain name server ones.

    Below are our DNS information:

    • ns1.powersx.com
    • ns2.powersx.com

    In case you do not have access to such a management tool, you need to contact your Domain Registrar to change the DNS settings for you.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do I change DNS records if my HK domain is registered with HKDNR?

    How do I change DNS records if my HK domain is registered with HKDNR?


    If your Hong Kong domain is registered with HKDNR and you want to use Focus Network Company web hosting or E-Store service, you'll just need to follow these simple steps in order to point the domain to our name servers.

    1. Log in to the HKDNR account http://www.hkdnr.hk
    2. Select your domain name from the Manage Domain Name.

    3. Click the Modify DNS (MNS) link on Domain Information Manager.
    4. Enter our name server information to Name Server(1) and Name Server(2) to below.
      ns1.powersx.com
      ns2.powersx.com
    5. Click Submit at the bottom.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to transfer my existing domain name to "Focus Network Company"?

    How to transfer my existing domain name to "Focus Network Company"?


    When you start using your new hosting account or E-Store with us, it may be quite inconvenient to leave your domain name to be managed by your old host. If you do that you will have to communicate with two different organizations: one will be providing the hosting services or E-Store for your website and the other will be providing domain registration services for your website.

    In order to move your existing domain and manage it together with your "Focus Network Company" hosting account with you just need to order the "Domain Transfer Service".

    Requirements for successful domain name transfer

    • The domain name to be transferred is not in 'Locked' Status.
    • The customer has access to the administrative contact email for the domain.
    • The customer can provide "Focus Network Company" with the domain EPP key code, applying to domains for which there is such a code.
    • There are more than 15 days till the domain name expiration date.
    • The domain name was registered for the first time more than 60 day ago.
    • The domain name has one of the following extensions: .com .net .org .us .biz .info .name.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do I change DNS records if my domain is registered with GoDaddy?

    How do I change DNS records if my domain is registered with GoDaddy?


    If you recently purchased Focus Network Company web hosting or E-Store, but your domain name was previously hosted somewhere else, you will need to change your DNS information to the follow these simple steps:

    1. Log in to the GoDaddy Account Manager. http://www.godaddy.com
    2. Select Manage Domains from the Domain Names dropdown menu or the Manage Your Account list.
    3. Select the domain name you wish to modify using the checkboxes and then click Set Nameservers Icon.
    4. Select Custom nameservers (I host my domains elsewhere.).
    5. Enter our name server information to Nameserver 1 and Nameserver2 from below.
      ns1.powersx.com
      ns2.powersx.com
    6. Click OK at the bottom.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Pre-Sale Services

  • How to renew your Domain / Hosting Plan / other services?

    How to renew your Domain / Hosting Plan / other services?


    Our billing system will automatically send the renewal notification and invoice to your registered email address 15 day before the expiry date.

    You need to ensure your registered email is valid in the billing system and to alert on any email notification sent from us, You are responsible for keeping their contact information up to date.

    Please note your responsibility to track the services their expiration date.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • What are your DNS servers?

    What are your DNS servers?


    Please refer to:

    How to point my existing domain name to "Focus Network Company" server?

    ns1.powersx.com
    ns2.powersx.com

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Specific refund conditions based on method of payment

    Specific refund conditions based on method of payment


    Cash / Bank Deposit / Cheque:
    We will refund your money back to the account you sent payment from, mail a cheque, or via PayPal. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    PayPal:
    For orders paid via PayPal we will refund money to your PayPal account only. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    Credit Card:
    For security reasons the credit card you use to purchase any of Focus Network Company products must be valid when you request a refund. We cannot refund to a credit card that has expired or been cancelled.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Why using free email accounts is bad idea?

    Why using free email accounts is bad idea?


    We recommend that you NOT use an email address from a free service (e.g. Yahoo! or Hotmail) with your account information.

    Instead, please enter a traditional address, such as that from your account, or one issued to you by your ISP (Internet Service Provider).

    This gives us better assurance of being able to contact you should we need to, as well as helping us protect your account and prevent fraud.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Privacy Policy for your account

    Privacy Policy for your account


    We will never under any circumstance - rent, sell, exchange or in any way make your information available to third parties, unless legally required to do so.

    For international domain, ICANN does require that you receive one email per year to verify and update your contact information on your domain.

    Also, confirmation emails for ordering, domain name registrations and transfers, along with instructional email to activate services will still be sent to you.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Knowledge Base Search

Type your question here. If no result are found, try more general search words. For Example: instead of "Email Account" try "Email".

If you did not find the Knowledge Base you were looking for, please try our FAQ

If you would like to know more about our services
please contact us immediately!

Contact Us

News & Events

2020 Chinese New Year Holiday Notice

2019 Chinese New Year Holiday Notice

Credit card processing fees

Price adjustment for Domain name

2018 Chinese New Year Holiday Notice

New Article

Payment Method

Bank Deposit / ATM
Mailing Cheque
Credit Card

ec2Biz.com Interactive Multimedia Ecommerce Web Hosting Online Shop Domain name Solutions
©2020 Focus Network Company. All Rights Reserved.