20 Jul, 2018
Welcome! Guest
[ Login ]
Home News & Events About Us Services FAQ Knowledge Base Affiliate Program Signup Contact Us
The ONE STOP SOLUTION to all your eBusiness Needs!
Overview
Knowledge Base

Our new knowledge base is a valuable collection of technical information, web site marketing tips, tutorial, glossary, and documentation.

If you feel anything is missing, or still have questions, please contact us. Looking for something specific? Can't see it here? Try our "Knowledge Base Search".


General Information

  • 4images

    4images


    4images is a powerful web-based image gallery management system. Features include comment system, user registration and management, password protected administration area with browser-based upload and HTML templates for page layout and design.

    By using the integrated template system the design and layout can be customized easily. 4images is multilingual: an external language file can be used for translation in other languages.

    More features are: RSS feeds, search engine, automatic thumbnail generation, extensive user administration, upload function for users, showing IPTC and EXIF data of images, rating of images, spam protection, protection against hotlinking, newsletter, e-cards, integrated database backup function, etc.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • GeekLog

    GeekLog


    GeekLog was originally developed for the Security Geeks web site and was originally authored by Jason Whittenburg. In early 2001, Jason decided it was time to devote his time to other things and the project has since been maintained by Tony Bibbs who uses Geeklog to run Iowa Outdoors. Geeklog is bona fide open-source software and has been released under the GNU GPL for use by others. Configuring GeekLog is meant to be an easy process though it will require you to have access to several components of your system.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • pMachineFree

    pMachineFree


    pMachine is online publishing's most flexible and creative software.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • BlaB! Lite

    BlaB! Lite


    Features: high performance, extremely low bandwidth required; supports 99.8% of the available browsers; no additional plugins / server modules required; bad words removal; custom timezone settings; sound notification on new messages; utf-8 based multilanguage support.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • TYPO

    TYPO


    TYPO3 is developed by the Danish programmer Kasper Skaarhoej. It is the most advanced GPL Content Management Framework available, and competes very successfully with commercial products costing $50.000. TYPO3 is distributed under the GPL license, however Kasper has expressed certain aims for the system which we ask you to respect (see typo3.com for more information).

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

E-Store

  • Unsold Shopping Cart

    Unsold Shopping Cart


    我們的“網上商店”系統提供專業的“報表及統計”功能,讓您能隨時檢視“即時”及“過往”的業績記錄,令掌握營運更輕鬆。

    每項報表皆具備多種不同的樣式,而且除了能線上檢視外,更可透過您的印表機,將業務數據列印以備參考。

    “購物車未完成報告”能讓您知悉顧客放在“購物車”的產品,而這些產品名單的存在,意味顧客未進行結帳,或結帳過程遇到難題,這時您便可了解顧客的購物需要,從而提供適當的協助。

    進入“購物車未完成報告”:
    1. 點擊主選單的“報表及統計”

    2. 點擊左選單的“購物車未完成報告”

    每項“購物車未完成報告”包含的資料:
    • 日期
      購物車內容的建立日期,或最近的狀態日期

    • 姓名
      購物車所屬的顧客姓名,點擊該姓名,即可到達該顧客的詳細資料

    • 電子郵件
      購物車所屬的顧客電子郵件,點擊該電子郵件,即可到馬上寄送聯絡電子郵件

    • 電話號碼
      購物車所屬的顧客電話號碼

    • 手機號碼
      購物車所屬的顧客手機號碼

    • 產品資料
      詳列購物車內的產品名單

    “購物車未完成報告”的顯示範圍:
    • 日期範圍
      選擇合適的範圍天數

    針對“購物車未完成報告”的動作:
    • 刪除
      將顧客的“購物車”內容清空,並刪除有關記錄

    • 列印
      將當前資料透過印表機列印

    注意事項:
    • 請定期檢視所有報表及統計數據,方能掌握業務進展及變化

    • 所有報表數據屬您的商業機密,切勿隨意向第三者披露

    • 若有使用其他第三方供應商,例如“收款閘道”,基放計算方式、環境因素等,二者的報表數據結果可能並不一致

    • 報表資料屬即時狀態,而過往記錄有可能受其他因素影響,例如管理員對訂單的刪除等,所以資料將與實際稍有差別

    • 報表數據只供參考


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • E-Mail Configuration

    E-Mail Configuration


    我們的“網上商店”系統,需要利用多個電郵地址進行各種跟顧客溝通的用途,亦需要透過電子郵件向您通知運營狀況。

    一般情況下,我們都會為新建立的“網上開店”預先建立了數個常用的電郵地址,若您需要增加額外的電郵地址,可透過這份指南介紹的步驟進行管理。

    這份指南介紹的電子郵件設定,不適用於“獨立伺服器網上商店”、“套裝版權網上商店”、以及“開發版網上商店”。

    “郵件賬號”包含以下資料:
    • 登入賬號
      登入賬號必需是英文細寫和數字,其中可使用的符號是“.”、“-”、“_”,例如賬號是“abcd88”,則電郵地址便是“abcd88@yourdomain.com”

    • 密碼
      密碼必需由六至十五個“英文”或“數字”組成,英文的大小楷視為不同,其中切勿包含登入賬號,組合亦不能過份簡單

    • 確認密碼
      再一次輸入密碼作確認

    針對“郵件賬號”的動作:
    • 刪除
      將“郵件賬號”及內裏的郵件徹底刪除

    注意事項:
    • 電子郵件屬私人擁有的,切勿向他人透露登入資料,而登入資料亦應妥善保管

    • 基於保安理由,建議每六個月變更一次登入密碼

    • 修改已建立的郵件賬號的設定及更改密碼,請利用“網路郵局”或“PLESK控制台”

    • 我們不會向您索取郵件賬號的資料,並且需要防範從任何途徑向您索取資料的“網路行騙”陷阱


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Customers Analysis

    Customers Analysis


    我們的“網上商店”系統提供專業的“報表及統計”功能,讓您能隨時檢視“即時”及“過往”的業績記錄,令掌握營運更輕鬆。

    每項報表皆具備多種不同的樣式,而且除了能線上檢視外,更可透過您的印表機,將業務數據列印以備參考。

    進入“客戶類型分析”:
    1. 點擊主選單的“報表及統計”

    2. 點擊左選單的“客戶類型分析”

    每項“客戶類型分析”包含的資料:
    • 性別統計

    • 國家統計

    • 年齡統計

    針對“客戶類型分析”的動作:
    • 列印
      將當前資料透過印表機列印

    注意事項:
    • 請定期檢視所有報表及統計數據,方能掌握業務進展及變化

    • 所有報表數據屬您的商業機密,切勿隨意向第三者披露

    • 若有使用其他第三方供應商,例如“收款閘道”,基放計算方式、環境因素等,二者的報表數據結果可能並不一致

    • 報表資料屬即時狀態,而過往記錄有可能受其他因素影響,例如管理員對訂單的刪除等,所以資料將與實際稍有差別

    • 報表數據只供參考


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 業務管理架構

    業務管理架構


    在貴公司採用我們的系統過程裏,除了初次完善的設定後,往後的管理可能會十分繁重,由於在互聯網上潛在著巨大商機和不分國別界限,所以因由開業初期的零碎訂單及客戶查詢,以至貴公司網站及業務續漸被更多人認識,這時會出現大量的客戶查詢及訂單,所以貴公司必須及早作好安排,提高業務效率。

    因為每間公司的業務均不盡相同,我們實難以一一說明,但以下是一些根據現時我們的客戶提供及經整理的重點安排:
    • 新產品的輸入工作

    • 售清產品的刪除或補貨工作(系統對於存量會有提示)

    • 產品的售價、存量、內容的更新

    • 經常校對輸入了的資料並試驗實際模擬交易,找出錯誤的地方並加以修正

    • 整個網站內容訊息定時更新,會讓顧客保持新鮮感

    • 不斷增加網站文字內容,可令各搜尋引擎收集更多資訊,有利提高知名度

    • 定時提供促銷活動,如節日特價品,送贈小額電子禮券吸引舊會員消費

    • 定時為產品報道新消息

    • 為日常訂單收取的信用咭營業金額記錄及整理

    • 定時按實際需要而更新貨運資料及運費調整

    • 定時利用我們的「電子報管理系統」寄發產品新消息給會員以保持聯係

    • 尋找其他網站商店提出合作商機

    • 定時向我們提出需要改善的地方,以利顧客的訂購過程更簡化無誤

    • 定期觀察我們提供的網站報告,比較瀏覽量高低的地區作出相應的宣傳安排

    • 如網上營商是貴公司的重點業務,需多利用各動宣傳媒體,例如於“Yahoo”、“Google”放置廣告,把產品張貼到知名的拍賣網如“EBay.com”、“雅虎拍賣網”等

    Please be aware we does not participate in any management and not assume responsibility and support for third party providers.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Interface of Administer Center

    Interface of Administer Center


    Before you start using the Administer Center, it is important to understand the documentation conventions used in it.

    This guide is intended for hosting E-Store who manage their servers through Administer Center and have access to administrator's account in the control panel.

    Ec2Biz “Online E-Store System” is a e-commerce automation solution that gives business owner full control over the managed products selling and simplifies setup and management of customer accounts, order, and store style.

    Ec2Biz “Online E-Store System” is stable, secure and reliable, but what you will like about it the most is that it will save you and your technical staff much time and effort
    All your customers will have personal isolated purchase interface environments and will be able to manage their accounts, purchase history, and inquiry on their own — without bothering you.

    NOTE: Pop-up blocking in your browser should be disabled when using Administer Center. Microsoft IE 5.5 and Netscape v4.5 or lower for Windows/UNIX is no longer supported.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Domain Names Knowledge

  • How to transfer my existing domain name to "Focus Network Company"?

    How to transfer my existing domain name to "Focus Network Company"?


    When you start using your new hosting account or E-Store with us, it may be quite inconvenient to leave your domain name to be managed by your old host. If you do that you will have to communicate with two different organizations: one will be providing the hosting services or E-Store for your website and the other will be providing domain registration services for your website.

    In order to move your existing domain and manage it together with your "Focus Network Company" hosting account with you just need to order the "Domain Transfer Service".

    Requirements for successful domain name transfer

    • The domain name to be transferred is not in 'Locked' Status.
    • The customer has access to the administrative contact email for the domain.
    • The customer can provide "Focus Network Company" with the domain EPP key code, applying to domains for which there is such a code.
    • There are more than 15 days till the domain name expiration date.
    • The domain name was registered for the first time more than 60 day ago.
    • The domain name has one of the following extensions: .com .net .org .us .biz .info .name.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do I change DNS records if my domain is registered with GoDaddy?

    How do I change DNS records if my domain is registered with GoDaddy?


    If you recently purchased Focus Network Company web hosting or E-Store, but your domain name was previously hosted somewhere else, you will need to change your DNS information to the follow these simple steps:

    1. Log in to the GoDaddy Account Manager. http://www.godaddy.com
    2. Select Manage Domains from the Domain Names dropdown menu or the Manage Your Account list.
    3. Select the domain name you wish to modify using the checkboxes and then click Set Nameservers Icon.
    4. Select Custom nameservers (I host my domains elsewhere.).
    5. Enter our name server information to Nameserver 1 and Nameserver2 from below.
      ns1.powersx.com
      ns2.powersx.com
    6. Click OK at the bottom.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Who can register a .US domain name?

    Who can register a .US domain name?


    Any United States citizen or permanent resident, as well as any business or organization with a bona fide presence in the U.S., can register a .us domain name.

    One of the following eligibility requirements must be met:

    • A natural person (i) who is a citizen or permanent resident of the United States of America or any of its possessions or territories or (ii) whose primary place of domicile is in the United States of America or any of its possessions, or
    • Any entity or organization that is incorporated within one of the fifty (50) United States states, the District of Columbia, or any of the United States possessions or territories or (ii) organized or otherwise constituted under the laws of a state of the United States of America, the District of Columbia, or any of its possessions or territories, or
    • An entity or organization (including federal, state, or local government of the United States, or a political subdivision thereof) that has a bona fide presence in the United States.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to point my existing domain name to "Focus Network Company" server?

    How to point my existing domain name to "Focus Network Company" server?


    Using your existing domain name with "Focus Network Company" service is easy! You simply have to point it to your account by replacing your old host DNS settings with our domain name server ones.

    Below are our DNS information:

    • ns1.powersx.com
    • ns2.powersx.com

    In case you do not have access to such a management tool, you need to contact your Domain Registrar to change the DNS settings for you.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do I change DNS records if my HK domain is registered with HKDNR?

    How do I change DNS records if my HK domain is registered with HKDNR?


    If your Hong Kong domain is registered with HKDNR and you want to use Focus Network Company web hosting or E-Store service, you'll just need to follow these simple steps in order to point the domain to our name servers.

    1. Log in to the HKDNR account http://www.hkdnr.hk
    2. Select your domain name from the Manage Domain Name.

    3. Click the Modify DNS (MNS) link on Domain Information Manager.
    4. Enter our name server information to Name Server(1) and Name Server(2) to below.
      ns1.powersx.com
      ns2.powersx.com
    5. Click Submit at the bottom.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Linux Web Hosting

  • PHP - How to creating own error logs for debugging PHP scripts

    PHP - How to creating own error logs for debugging PHP scripts


    Please insert the following code in your PHP script. (or create separate file and adding the code in it. Include the file using "include()")

       error_reporting(0);
    $old_error_handler = set_error_handler("userErrorHandler");
    function userErrorHandler ($errno, $errmsg, $filename, $linenum, $vars)
    {
    $time=date("d M Y H:i:s");
    // Get the error type from the error number
    $errortype = array (1 => "Error",
    2 => "Warning",
    4 => "Parsing Error",
    8 => "Notice",
    16 => "Core Error",
    32 => "Core Warning",
    64 => "Compile Error",
    128 => "Compile Warning",
    256 => "User Error",
    512 => "User Warning",
    1024 => "User Notice");
    $errlevel=$errortype[$errno];
    //Write error to log file (CSV format)
    $errfile=fopen("errors.csv","a");
    fputs($errfile,"\"$time\",\"$filename:
    $linenum\",\"($errlevel) $errmsg\"\r\n");
    fclose($errfile);

    if($errno!=2 && $errno!=8) {
    //Terminate script if fatal error
    die("A fatal error has occurred. Script execution has been aborted");
    }
    }


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do you set a website default page to something other than index.html

    How do you set a website default page to something other than index.html


    Create an .htaccess file in your httpdocs directory, or the directory for which you want to change the default, and add the following line:

    DirectoryIndex filename.html

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Using FTP with Internet Explorer (IE)

    Using FTP with Internet Explorer (IE)


    Internet Explorer(IE) include built-in FTP functionality. To connect to a website via FTP and transfer files, follow the instructions below.

    If your FTP requires a username and password, you will obviously need these before you begin.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • PHP - How to PHP - How to switch off safe_mode for website

    PHP - How to PHP - How to switch off safe_mode for website


    To switch off safe mode in Plesk on your hosting account:

    1. Logging In to Plesk control panel.
    2. Navigate to the domain in Desktop.
    3. Click on the Setup icon.
    4. Scroll down the page to Services section
    5. Make sure PHP is checked but Safe mode on is UNCHECKED
    6. Click the button labled OK


    Done! The website will now be running PHP with safe mode off.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to enable Mod-Rewrite Module

    How to enable Mod-Rewrite Module


    This module uses a rule-based rewriting engine (based on a regular-expression parser) to rewrite requested URLs on the fly. It supports an unlimited number of rules and an unlimited number of attached rule conditions for each rule, to provide a really flexible and powerful URL manipulation mechanism. The URL manipulations can depend on various tests, of server variables, environment variables, HTTP headers, or time stamps. Even external database lookups in various formats can be used to achieve highly granular URL matching.

    In order to enable Mod_Rewrite for your site you should create a text file called .htacccess in the directory where you wish the rewrite rules to apply.

    The first line of this text file should be:
    RewriteEngine On

    After that you can place your rewrite rules. Here are some examples for Joomla's SEF option:
    RewriteCond %{REQUEST_FILENAME} !-f
    RewriteCond %{REQUEST_FILENAME} !-d
    RewriteCond %{REQUEST_URI} (/|.htm|.php|.html|/[^.]*)$ [NC]
    RewriteRule ^(content/|component/) index.php

    Many applications come with ready to use rewrite rules that can be found in a file called htaccess.txt.

    Upload this file into the root of your domain(e.g. httpdocs). The changes take effect immediately.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Industry News

  • Parallels Plesk Sitebuilder Adds New Features

    Parallels Plesk Sitebuilder Adds New Features


    Parallels' new release of Plesk Sitebuilder software helps customers with new features.

    Parallels Plesk Sitebuilder 4.2 integrates the Fotolia online micro-priced image marketplace into the software's WYSIWYG editor, allowing users to browse and buy photos directly from the Fotolia gallery without leaving the wizard. The software also includes a new design module featuring SitePal speaking avatar technology by Oddcast. SitePal enables users to deploy animated, talking characters on any website.

    "Parallels Plesk Sitebuilder 4.2 takes website creation to a whole new level with innovative features that are tightly integrated into the software to improve ease of use," said Serguei Beloussov, CEO of Parallels. "The new version of Parallels website creation software demonstrates our commitment to delivering open solutions based on the Parallels Open Platform to help service providers add value to their offerings."

    Parallels Plesk Sitebuilder is a next-generation, scalable website-building application that can be integrated into any business process for hosting providers, ISPs, registrars and telecoms. The software's easy-to-use, five-step wizard and 14 dynamic modules make this software a powerful and flexible solution. It is designed to work with hosting platforms that use the new Application Packaging Standard (APS), such as the Parallels Plesk Control Panel.

    The Parallels Open Platform enables hosting with Parallels virtualization and automation technology through integration with a wide range of third-party applications and systems. The APS Standard (APS), a key element of the platform, is used by ISVs and service providers to seamlessly integrate applications to offer to the more than 10 million businesses and individuals that use Parallels products.

    Availability
    Parallels Plesk Sitebuilder 4.2 is available now for the Linux/Unix and Windows platforms. It can be downloaded via the Parallels Plesk Application Vault at http://www.parallels.com/en/products/sitebuilder/ .

    About Parallels - Optimized Computing
    Parallels (formerly SWsoft) is a worldwide leader in virtualization and automation software that optimizes computing for consumers, businesses, and service providers across all major hardware, operating systems, and virtualization platforms. Founded in 1999, Parallels is a fast-growing company with 900 employees in North America, Europe, and Asia.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Microsoft recommends against usage of SHA-1

    Microsoft recommends against usage of SHA-1


    Microsoft is advising its customers to stop using the SHA-1 hashing algorithm in cryptographic applications such as SSL/TLS encryption and code signing.

    In a security advisory issued by the company, Microsoft said that it would stop recognising certificates using the algorithm after January 1, 2016. After this date, certificate authorities (CAs) that issue certificates under the Windows Root Certificate Program will only be able to issue SHA-2 certificates.

    According to Microsoft, SHA-1 is used in 98 percent of all certificates issued worldwide. However, it also claims that since 2005 researchers have discovered collision attacks against the algorithm that mean it no longer meets its security standards. Although the announcement to drop SHA-1 comes today, the Australian Signals Directorate (ASD) has been advising government agencies to move to SHA-2 since December 2011.

    The ASD also has a slightly different opinion of when the collision attacks were first known, stating that "theoretically impressive attacks" against SHA-1 were known since 2004, but that they were not practical to implement.

    ASD has already removed the "weakened but not broken" SHA-1 algorithm from use in its Information Security Manual.

    The US National Institute of Standards and Technology, which published the algorithm, also stated in September 2012 that US federal agencies should stop using SHA-1.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plurk

    Plurk


    Plurk is a free social networking and micro-blogging service that allows users to send updates (otherwise known as plurks) through short messages or links, which can be up to 140 text characters in length.

    Updates are then shown on the user's home page using a timeline which lists all the updates received in chronological order, and delivered to other users who have signed up to receive them. Users can respond to other users' updates from their timeline through the Plurk.com website, by instant messaging, or by text messaging.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Pre-Beta Release of Windows 7

    Pre-Beta Release of Windows 7


    Over the past few years, you've asked us to make some changes to Windows. We listened closely. Now it's time to share an early look at how we've used your feedback.

    Windows 7 is faster, more reliable, and makes it easier to do what you want. Both the everyday things and the killer "is that really possible?" things.

    Dig into this site to see what's coming.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 如何利用異地備份隬補防毒軟件的不足

    如何利用異地備份隬補防毒軟件的不足


    從世衛在2009年4月24號發出的第一個人類豬流感個案開始,至今已有76個國家和超過3萬感染個案而豬流感病毒變種的問題也成為了全球關注的話題。其實在電腦的世界,惡性攻擊病毒每天在不斷的增加、更新和改變,而企業往往就因為病毒入侵而造成數據丟失和摧毀的受害者。如何防範數據丟失帶來的災難性影響,是企業I.T.部門經常要面對的挑戰。

    企業單靠病毒掃描軟件並不足夠

    根據美國FBI 2005的研究指出,約84%的公司會受到惡性病毒的攻擊。另外,美國網絡安全協會(Cyber Secure Institute) 的報告指出,企業為了清除各項病毒的花費高達90億美元!無論您為電腦做再好的隔離措施,例如擁有最新的防病毒軟件和頻密的病毒掃描,病毒也可以找到辦法入侵電腦系統然後摧毀公司重要的檔案,例如客戶清單、合約和訂單等等。公司因為數據丟失和內部電腦系統故障影響而到商譽也絕非金錢能隬補。所以,企業要防範數據丟失帶來的災難性影響,單靠病毒掃描軟件並不足夠。

    設立災難性回復方案才能治本

    其實要解決以上問題就要從根本著手,第一步就是要為企業電腦系統設立有效和快速的災難復原方案 (Disaster Recovery Solution),而當中最重要的一環便是為每台電腦作鏡像備份(Image Backup),這樣,當遇到病毒入侵造成數據丟失,企業便可快速地把事先備份好電腦鏡像直接恢復到電腦上,把受到感染或是有故障的電腦復原到正常狀態,確保企業持續運作,儲存於電腦內的業務數據亦能得以保存。

    有資深企業備份經驗的Ahsay 銷售部經理候健生指出:「如何為企業設立有效和快速的災難復原方案是一個很大的課題,大小企業都需要正視。但對中小企來說,由於資源所限,加上公司內未必有專門負責I.T.方面的人員,所以很多中小企都未有實行。其實坊間都有不少能夠提供鏡像備份(Image Backup)的備份軟件,可以滿足基本備份需要。但這些軟件只能夠作本地備份,一旦公司的電腦受到病毒侵襲,用作儲存備份的電腦或伺服器亦可能已經中毒,導致已備份的鏡像無法還原而不能做到災難復原。所以企業應選擇具備異地鏡像備份的備份軟件,才能確保災難復原能發揮功效,因為就算本地公司內所有電腦和伺服器都已經中毒,儲存於異地的鏡像備份數據亦不會受到感染,企業便可快速地把電腦鏡像直接從異地恢復到電腦上,達至災難復原的目的。而Ahsay Backup Software 是市場上少數可以做到異地鏡像備份的企業備份方案。」

    關於Ahsay

    Ahsay Systems Corporation (亞勢系統有限公司) 建基於香港,目前在世界各地已擁有超過2, 900個服務合作夥伴和經銷商,並有超過90萬用戶安裝了Ahsay Backup Software備份軟件。

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Pre-Sale Services

  • Newsletter / E-mail Help

    Newsletter / E-mail Help


    As a subscriber of www.ec2biz.com newsletters, you need to add www.ec2biz.com to your address book to continue to receive these emails.

    Please follow the directions at this link: Have you added the www.ec2biz.com addresses to your e-mail address book? for your particular e-mail provider.

    You need to add www.ec2biz.com to your address book:


    Please choose your e-mail provider below for specific instructions on adding www.ec2biz.com to your address book:

    Hotmail
    • Open the e-mail.

    • Click "SAVE ADDRESS" at the top of the message header.

    • Click "OK" on the next screen.

    Yahoo
    • Open the e-mail.

    • Click "ADD TO ADDRESS BOOK" next to the FROM address.

    • Click "ADD TO ADDRESS BOOK" again.

    Outlook Express
    • Open the e-mail.

    • Right-click on the FROM name.

    • Click ADD TO ADDRESS BOOK in the menu.

    • Click OK on the Properties pop-up.

    Netvigator.com (NETMail)
    • Click "ADD ADDRESS" on the screen of book address.

    • Input a new address to field:

    • Click "SAVE" on the bottom.

    i-cable.com
    • Click "ADD ADDRESS" on the screen of book address.

    • Input a new address to field:

    • Click "SAVE".

    You may need to contact your email provider to get more information.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to apply special price for international domain

    How to apply special price for international domain


    We are offering domain name registration for the unbelievable low price.

    This offer is for a limited time only. Act fast while quantities last.

    You must purchase following plan offered on our site at the same time you new register your domain name to qualify.

    • E-Store
    • Linux Web Hosting
    • Website Design & Development


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • What are your DNS servers?

    What are your DNS servers?


    Please refer to:

    How to point my existing domain name to "Focus Network Company" server?

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Why using free email accounts is bad idea?

    Why using free email accounts is bad idea?


    We recommend that you NOT use an email address from a free service (e.g. Yahoo! or Hotmail) with your account information.

    Instead, please enter a traditional address, such as that from your account, or one issued to you by your ISP (Internet Service Provider).

    This gives us better assurance of being able to contact you should we need to, as well as helping us protect your account and prevent fraud.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Specific refund conditions based on method of payment

    Specific refund conditions based on method of payment


    Cash / Bank Deposit / Cheque:
    We will refund your money back to the account you sent payment from, mail a cheque, or via PayPal. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    PayPal:
    For orders paid via PayPal we will refund money to your PayPal account only. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    Credit Card:
    For security reasons the credit card you use to purchase any of Focus Network Company products must be valid when you request a refund. We cannot refund to a credit card that has expired or been cancelled.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Email Tutorial

  • How do I access my webmail (Check emails using a browser)?

    How do I access my webmail (Check emails using a browser)?


    You can read your mail and compose new messages even if you are far from your home or office computer. To do this, you first need to allow access to the Horde Webmail interface that is integrated with your control panel. Then you can work with your mail from any computer with Internet connection and Web browser installed, or a WAP-enabled cellular phone or a handheld computer (PDA).
    To login to your webmail use the following url:

    http://webmail.yourdomain.com

    *where yourdomain.com is your domain name.

    Login details are your email address and password you setup in your control panel.
    This is the perfect Webmail program, which comes with all our web hosting plans, so you can access your emails anywhere in the world.
    You can read your mail and compose new messages even if you are far from your home or office computer. To do this, you first need to allow access to the Horde Webmail interface that is integrated with your control panel. Then you can work with your mail from any computer with Internet connection and Web browser installed, or a WAP-enabled cellular phone or a handheld computer (PDA).
    Horde offers many of the features available in pc email clients like Outlook Express. Some of the features include:
    • Compose and send emails

    • Read your incoming mail

    • Email search facility

    • Address book

    • Calendar and events

    • Save work as a draft

    • Task lists

    • Create folders for storing your mail


    To login to your webmail use the following url:

    http://webmail.yourdomain.com

    *where yourdomain.com is your domain name.

    The login name is the full email address i.e. you@yoursite.com and the password is the one you setup when you created the email in PLESK.

    Login details are your email address and password you setup in your PLESK control panel or Online E-Store System.
    If you also use an email client like Outlook Express to check your mail and still want to access the mail with Horde, make sure you check the option to leave mail on the server. If you fail to do this, all your mail will be downloaded to your email client and won't be accessable via webmail with Horde. Please be aware though that leaving your emails on the server will increase your used disk space as well.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Microsoft Outlook Setup Tutorial

    Microsoft Outlook Setup Tutorial


    In this tutorial we will learn how to setup MS Outlook for use with your new hosting email account.

    What you will Need:

    • A valid email account, if you haven't created an email account yet please log into your Control Panel and set up an email account.
    • An email client. This tutorial uses Outlook, which is part of Microsoft Office.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to setup your email account on Android Mobile Device

    How to setup your email account on Android Mobile Device


    Configuring your Android device to receive mail from your hosted email accounts is a very easy process.

    This tutorial will give you a simple guide on the steps you need to perform to easily access your domain email accounts on the go with your Android device.

    Currently tested devices are:
    • Nexus One
    • HTC One max
    • HTC Butterfly s
    • HTC One mini
    • HTC One
    • HTC One SV
    • HTC One X+
    • HTC Desire
    • HTC Hero
    • HTC EVO
    • HTC Incredible
    • HTC Dream
    • HTC Magic
    • HTC Aria
    • HTC Wildfire
    • HTC Sapphire
    • T-Mobile G1
    • Motorola Droid
    • Motorola Milestone
    • Samsung Galaxy S2
    • Samsung Galaxy S3
    • Samsung Galaxy S3 LTE
    • Samsung Galaxy S4
    • Samsung Galaxy S4 LTE
    • Samsung Galaxy S3 mini
    • Samsung Galaxy S4 mini
    • Samsung Galaxy Note 2
    • Samsung Galaxy Note 3
    • Samsung Galaxy Note 3 LTE
    • Samsung Galaxy Ace 3
    • Samsung Galaxy Mega
    • Samsung Galaxy S
    • Samsung Fascinate
    • Samsung Vibrant
    • Samsung Epic
    • Samsung Mesmerize


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Outlook Express Setup Tutorial

    Outlook Express Setup Tutorial


    In this tutorial we will learn how to setup Outlook Express for use with your new hosting email account.

    What you will Need:

    • A valid email account, if you haven't created an email account yet please log into your Control Panel and set up an email account.
    • An email client. This tutorial uses Outlook Express, which is a pre-installed component of Windows.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to setup your email account on Windows Phone 7 Mobile Device

    How to setup your email account on Windows Phone 7 Mobile Device


    Configuring your Windows Phone 7 device to receive mail from your hosted email accounts is a very easy process.

    This tutorial will give you a simple guide on the steps you need to perform to easily access your domain email accounts on the go with your Windows Phone 7 device.

    Currently tested devices are:
    • HTC Radar
    • SAMSUNG Focus
    • LG Optimus 7


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Glossary

  • Encryption

    Encryption


    encryption is the process of obscuring information to make it unreadable without special knowledge, sometimes referred to as scrambling. Encryption has been used to protect communications for centuries, but only organizations and individuals with an extraordinary need for secrecy had made use of it. In the mid-1970s, strong encryption emerged from the sole preserve of secretive government agencies into the public domain, and is now used in protecting widely-used systems, such as Internet e-commerce, mobile telephone networks and bank automatic teller machines.

    Encryption can be used to ensure secrecy, but other techniques are still needed to make communications secure, particularly to verify the integrity and authenticity of a message; for example, a message authentication code (MAC) or digital signatures. Another consideration is protection against traffic analysis.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Cookie

    Cookie


    The term Cookie derives from "magic cookie", a packet of data a program receives but only uses for sending it again, possibly to its origin, unchanged. Magic cookies were already used in computing when Lou Montulli had the idea of using them in Web communications in Mar 1993.

    Purpose
    HTTP cookies are used by Web servers to differentiate users and to maintain data related to the user during navigation, possibly across multiple visits. HTTP cookies were introduced to provide a way for realizing a "shopping cart" (or "shopping basket"), a virtual device into which the user can "place" items to purchase, so that users can navigate a site where items are shown, adding or removing items from the shopping basket at any time.

    Allowing users to log in to a website is another use of cookies. Users typically log in by inserting their credentials into a login page; cookies allow the server to know that the user is already authenticated, and therefore is allowed to access services or perform operations that are restricted to logged-in users.

    Many websites also use cookies for personalization based on users' preferences. Sites that require authentication often use this feature, although it is also present on sites not requiring authentication. Personalization includes presentation and functionality. For example, the Wikipedia Web site allows authenticated users to choose the webpage skin they like best; the Google search engine allows users (even non-registered ones) to decide how many search results per page they want to see.

    Cookies are also used to track users across a website. Third-party cookies and Web bugs, explained below, also allow for tracking across multiple sites. Tracking within a site is typically done with the aim of producing usage statistics, while tracking across sites is typically used by advertising companies to produce anonymous user profiles, which are then used to target advertising (deciding which advertising image to show) based on the user profile.

    Browser Setting
    Described in " How to Enable Cookie " section.

    Cookie Expiration
    Persistent cookies have been criticized by privacy experts for not being set to expire soon enough, and thereby allowing some websites to track users and build up a profile of them over time. This aspect of cookies also compounds the issue of session hijacking, because a stolen persistent cookie can potentially be used to impersonate a user for a considerable period of time.

    Identification
    If more than one browser is used on a computer, each usually has a separate storage area for cookies. Hence cookies do not identify a person, but a combination of a user account, a computer, and a Web browser. Thus, anyone who uses multiple accounts, computers, or browsers has multiple sets of cookies.

    Likewise, cookies do not differentiate between multiple users who share a computer and browser, if they do not use different user accounts.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • e-Commerce

    e-Commerce


    Electronic Commerce is exactly analogous to a marketplace on the Internet.

    Electronic Commerce (also referred to as EC, e-commerce eCommerce or ecommerce) consists primarily of the distributing, buying, selling, marketing and servicing of products or services over electronic systems such as the Internet and other computer networks.

    The information technology industry might see it as an electronic business application aimed at commercial transactions; in this context, it can involve electronic funds transfer, supply chain management, e-marketing, online marketing, online transaction processing, electronic data interchange (EDI), automated inventory management systems, and automated data collection systems. Electronic commerce typically uses electronic communications technology of the World Wide Web, at some point in the transaction's lifecycle, although of course electronic commerce frequently depends on computer technologies other than the World Wide Web, such as databases, and e-mail, and on other non-computer technologies, such as transportation for physical goods sold via e-commerce.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Domain name

    Domain name


    On the Internet, the domain name stores and associates many types of information with domain names; most importantly, it translates domain names (computer hostnames) to IP addresses. It also lists mail exchange servers accepting e-mail for each domain. In providing a worldwide keyword-based redirection service, DNS is an essential component of contemporary Internet use.

    Useful for several reasons, the domain name pre-eminently makes it possible to attach easy-to-remember domain names (such as "ec2biz.com") to hard-to-remember IP addresses (such as 202.123.84.161). People take advantage of this when they recite URLs and e-mail addresses. In a subsidiary function, the domain name system makes it possible for people to assign authoritative names without needing to communicate with a central registrar each time.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Font

    Font


    In typography, a typeface is a coordinated set of glyphs designed with stylistic unity. A typeface usually comprises an alphabet of letters, numerals, and punctuation marks; it may also include ideograms and symbols, or consist entirely of them, for example, mathematical or map-making symbols. The term typeface is often conflated with font, a term which, historically, had a number of distinct meanings before the advent of desktop publishing; these terms are now effectively synonymous when discussing digital typography. A helpful and still valid distinction between font and typeface is a font's status as a discrete commodity with legal restrictions, while typeface designates a visual appearance or style not immediately reducible to any one foundry's production or proprietary control.

    The art and craft of designing typefaces is called type design. Designers of typefaces are called type designers, and often typographers. In digital typography, type designers are also known as font developers or font designers.

    The size of typefaces and fonts is traditionally measured in points; point has been defined differently at different times, but now the most popular is the Desktop Publishing Point. Font size is also commonly measured in millimeters (mm) and inches.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Knowledge Base Search

Type your question here. If no result are found, try more general search words. For Example: instead of "Email Account" try "Email".

If you did not find the Knowledge Base you were looking for, please try our FAQ

If you would like to know more about our services
please contact us immediately!

Contact Us

News & Events

2018 Chinese New Year Holiday Notice

Merry Christmas 2017

Scheduled Maintenance on 9 Apr 2017

2017 Chinese New Year Holiday Notice

Merry Christmas 2016

New Article

Payment Method

Bank Deposit / ATM
Mailing Cheque
Credit Card

ec2Biz.com Interactive Multimedia Ecommerce Web Hosting Online Shop Domain name Solutions
©2018 Focus Network Company. All Rights Reserved.