11 Nov, 2025
Welcome! Guest
[ Login ]
Home News & Events About Us Services FAQ Knowledge Base Affiliate Program Signup Contact Us
The ONE STOP SOLUTION to all your eBusiness Needs!
Overview
Knowledge Base

Our new knowledge base is a valuable collection of technical information, web site marketing tips, tutorial, glossary, and documentation.

If you feel anything is missing, or still have questions, please contact us. Looking for something specific? Can't see it here? Try our "Knowledge Base Search".


Domain Names Knowledge

  • Required Documents of Hong Kong Domain Name

    Required Documents of Hong Kong Domain Name


    Domain CategoryEligible Applicant
    Examples of Document
    .hkLocal or overseas individuals or entities
    • (Organization Registration) A copy of the Business Registration Certificate (BR) issued by the Inland Revenue Department (IRD) of HKSARG (NOT registered as a Branch) i.e. name of the organization shall be that of the head office, not branch office, or
    • (Individual Registration) A copy of HKID card or other document proofing that you are a resident of HKSAR.
    .com.hk / .公司.hkCommercial entities registered in HKSAR
    • A copy of the Business Registration Certificate (BR) issued by the Inland Revenue Department (IRD) of HKSARG (NOT registered as a Branch) i.e. name of the organization shall be that of the head office, not branch office, or
    • A copy of the Certificate of Registration of Overseas Company issued by the Company Registry (CR) of HKSARG, or
    • Other documentary proof required for the application of .org.hk, .edu.hk, .net.hk or .gov.hk with a letter stating the reason of selecting .com.hk.
    .org.hk / .組織.hkRegistered or approved not-for-profit organizations in HKSARG
    • A copy of the tax exemption letter issued by Inland Revenue Department (IRD) that shows your organization is a charity or non-profit making organization (under Section 88 or 87), or
    • A copy of the Certificate of a Society issued by Hong Kong Police, or
    • A copy of the proof showing exemption from Registration of a Society issued by Hong Kong Police, or
    • A copy of the Certificate of Registration for trade unions or other unions, or
    • A copy of Certificate of Owners' Corporation under Building Ordinance, or
    • A copy of Registration of a Hospital / Nursing Home (under Section 88 of the Inland Revenue Ordinance), or
    • A copy of the Certificate of Registration of a Child Care Centre, or
    • Application letter issued by Government Department, or
    • Gazatte / Ordinance mentioned the establishment of your organization together with an application letter issed by your organization if you are a statutory body, or
    • A copy of the Memorandum of Association shows that no dividend per share to shareholders plus copy of the Business Registration Certificate or Certificate of Incoporation, or
    • Other valid document proofing the non-profit making nature of your organization.
    .edu.hk / .教育.hkRegistered schools, tertiary institutions and other approved educational institutions in Hong Kong
    • A copy of the Certificate of a School issed by Education and Manpower Bureau of HKSARG, or
    • A copy of the Ordinance showing that your institute is established by law together with an application letter issued by your institute, or
    • A copy of the Certificate of Registration of a course issued by Education and Manpower Bureau of HKSARG, or
    • A copy of the Certificate of Registration of a Child Care Centre (for Nurseries Running Educare Services or Pre-Primary Curriculum for Children between 2 to 6 years old), or
    • A copy of the Certificate of Education (for Nurseries Running Educare Services or Pre-Primary Curriculum for Children between 2 to 6 years old)
    .net.hk / .網絡.hkEntities managing network infrastructure, machines and services with a license from the Office of Telecommunications Authority of the HKSARG
    • A copy of the PNETS (IVANS / ISP) license issued by the Office of the Telecommunications Authority of the Government HKSAR, or
    • Fixed Telecommunication Network Services (FTNS) / Fixed Carrier License.
    .gov.hk / .政府.hkBureaux or Departments of the HKSARG
    • Subject to the endorsement by the Office of Government Chief Information Officer
    .idv.hk / .個人.hkResidents of HKSAR
    • A copy of HKID card or other document proofing that you are a resident of HKSAR.
      (For the registration of .個人.hk, the domain name you selected shall be your legal name)


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to transfer my existing domain name to "Focus Network Company"?

    How to transfer my existing domain name to "Focus Network Company"?


    When you start using your new hosting account or E-Store with us, it may be quite inconvenient to leave your domain name to be managed by your old host. If you do that you will have to communicate with two different organizations: one will be providing the hosting services or E-Store for your website and the other will be providing domain registration services for your website.

    In order to move your existing domain and manage it together with your "Focus Network Company" hosting account with you just need to order the "Domain Transfer Service".

    Requirements for successful domain name transfer

    • The domain name to be transferred is not in 'Locked' Status.
    • The customer has access to the administrative contact email for the domain.
    • The customer can provide "Focus Network Company" with the domain EPP key code, applying to domains for which there is such a code.
    • There are more than 15 days till the domain name expiration date.
    • The domain name was registered for the first time more than 60 day ago.
    • The domain name has one of the following extensions: .com .net .org .us .biz .info .name.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How do I change DNS records if my domain is registered with GoDaddy?

    How do I change DNS records if my domain is registered with GoDaddy?


    If you recently purchased Focus Network Company web hosting or E-Store, but your domain name was previously hosted somewhere else, you will need to change your DNS information to the follow these simple steps:

    1. Log in to the GoDaddy Account Manager. http://www.godaddy.com
    2. Select Manage Domains from the Domain Names dropdown menu or the Manage Your Account list.
    3. Select the domain name you wish to modify using the checkboxes and then click Set Nameservers Icon.
    4. Select Custom nameservers (I host my domains elsewhere.).
    5. Enter our name server information to Nameserver 1 and Nameserver2 from below.
      ns1.powersx.com
      ns2.powersx.com
    6. Click OK at the bottom.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • What Is Domain Redemption Period

    What Is Domain Redemption Period


    The Redemption Period occurs approximately 30 days after a domain has been reached its expiration date, this applies to .COM, .NET, and .ORG domains, other TLDs may have different policies concerning expiration and renewal.

    For thirty (30) days after the expiration date the domain will be available for renewal in a grace period. After the thirty day grace period the domain will enter a hold period known as the Redemption Period for another thirty (30) days where to recover the domain the registry requires a HKD$3,000 fee.

    However, there is no guaranteed grace period, and once expired, the domain can be deleted at any time.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to point my existing domain name to "Focus Network Company" server?

    How to point my existing domain name to "Focus Network Company" server?


    Using your existing domain name with "Focus Network Company" service is easy! You simply have to point it to your account by replacing your old host DNS settings with our domain name server ones.

    Below are our DNS information:

    • ns1.powersx.com
    • ns2.powersx.com

    In case you do not have access to such a management tool, you need to contact your Domain Registrar to change the DNS settings for you.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

E-Store

  • SEO Keywords

    SEO Keywords


    Ec2Biz的「網上商店系統」具備首創的動態優化技術,能讓您的線上商店較其他同業“脫穎而出”。

    請選用一些和您的業務或產品有關的“關鍵字”,關鍵字越多則能令您的網站越受搜索引擎關注。

    搜尋引擎最佳化(Search Engine Optimization,簡稱SEO)是一種利用搜索引擎的搜索規則來提高目的網站在有關搜索引擎內的提名的方式。由於不少研究發現,搜索引擎的用戶往往只會留意搜索結果最開首的幾項條目,所以不少商業網站都希望透過各種形式來干擾搜索引擊的排序。當中尤以各種依靠廣告維生的網站為甚。

    所謂「針對搜尋引擎作最佳化的處理」, 是指為了要讓網站更容易被搜尋引擎接受。

    搜尋引擎會將網站彼此間的內容做一些相關性的資料比對。 然後再由瀏覽器將這些內容以最快速且接近最完整的方式,呈現給搜尋者。

    搜索引擎優化對於任何一家網站來說,要想在網站推廣中取得成功,搜索引擎優化都是至為關鍵的一項任務。同時,隨著搜索引擎不斷變換它們的排名演算法規則,每次演算法上的改變都會讓一些排名很好的網站在一夜之間名落孫山,而失去排名的直接後果就是失去了網站固有的可觀訪問量。所以每次搜索引擎演算法的改變都會在網站之中引起不小的騷動和焦慮。我們可以說,搜索引擎優化也成了一個愈來愈複雜的任務。

    新增SEO 關鍵字:
    1. 點擊主選單的“系統設定”

    2. 點擊左選單的“SEO 關鍵字”

    3. 輸入相關資料

    4. 完成後按“儲存”或“更新”,或按“返回”放棄並返回列表

    注意事項:
    • 每個“關鍵字請以”“,”(小逗號)分隔

    • 請勿輸入一整句的短文章

    • 無需輸入“重複”的“關鍵字”


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Support Tickets

    Support Tickets


    “支援服務記錄”能提供高效率、管理簡易的雙向溝通環境,比一般只依靠電子郵件進行通信的模式不同。

    當顧客(查詢者)需要向店主查詢問題的時候,只要直接在“聯絡我們”的頁面輸入個人資料及問題的內容,簡單地點擊“寄出”,系統便會記錄該項查詢,並且即時向“查詢者”及管理員發出確認郵件。

    當管理員知悉及回覆查詢後,系統便會記錄往後的答覆,並同時發出電郵通知“查詢者”,而“查詢者”可點擊郵件內的連結,再次到達您網站的“聯絡頁”檢視管理員的回覆細節,“查詢者”亦可在需要時在“聯絡頁”提出“回應”。
    整個查詢過程,“查詢者”均可隨時隨地在“聯絡頁”辦理所有查詢、檢視、回應,系統亦會將每一項查詢主題的來龍去脈一一記錄,以便管理員掌握這些客戶服務中的資訊。

    支援查詢的範圍主要可針對“一般查詢”、“產品查詢”、“訂單查詢”等等,這些查詢的記錄必需是經由“聯絡頁”處理,凡經其他途徑例如電子郵件、電話處理的情況下,這項功能是沒法記錄的。

    這份指南將介紹“支援服務記錄”中的各項設定。

    “部門設定”包含以下資料:
    • 查詢部門名稱
      “中英文”的自訂部門名稱,供“查詢者”提出針對部門的選擇,亦提供“管理員”回覆時的所屬部門選擇。

    • 預設值
      針對所有名稱的其中一項為系統預設狀態

    “重要程度設定”包含以下資料:
    • 重要程度名稱
      “中英文”的自訂重要程度名稱,供“查詢者”提出針對重要性的選擇。

    • 預設值
      針對所有名稱的其中一項為系統預設狀態

    “查詢狀態設定”包含以下資料:
    • 查詢狀態名稱
      “中英文”的自訂查詢狀態名稱,讓雙方知悉查詢項目的處理狀態、流程,一般預設狀態是“等待處理”。

    • 預設值
      針對所有名稱的其中一項為系統預設狀態

    “職員設定”包含以下資料:
    • 職員名稱
      “中英文”的自訂職員名稱,讓管理員以不同身份進行回覆。

    • 預設值
      針對所有名稱的其中一項為系統預設狀態

    注意事項:
    • 我們已經預先設定了若干常用的名稱,如您仍覺不足,則可再新增希望使用的名稱。

    • 請於“初始設定”時妥善設定,日後新增名稱是可以的,但切勿刪除已建立的名稱,這樣將引致已記錄的“支援服務記錄”不能對應。

    • 上述名稱應採用簡短易理解的政策,切勿輸入長篇的說明。

    針對“支援服務記錄”的動作:
    • 編輯
      修改已經建立的“中英文”名稱、改變預設值。

    • 刪除
      刪除已經建立的“中英文”名稱,己運作的商店不宜進行刪除動作


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Customers Approval

    Customers Approval


    我們的“網上開店”系統,可以同時以單一網站實行“B2C”和“B2B”的方案,如果您決定以“B2B”型式營運線上貿易,則可透過向每一位登記的會員進行篩選,確保不會令業務資料外流給競爭對手。

    而這份指南將介紹如何處理登記會員的確認工作。
    設首先確定已經把“系統設定”的“會員設定”裏“新增客戶批核選擇”設成“需批核”。

    若希望商店產品的售價只讓已批核會員觀看,請同時將“系統設定”的“會員設定”裏“非認可批核會員不能觀看售價”設成“啟用”。

    如您的“網上商店”屬零售“B2C”模式,這裏的說明請直接忽略。

    進入“待確認會員”管理:
    1. 點擊主選單的“訂單處理/客戶管理”

    2. 點擊左選單的“待確認會員”

    3. 選擇針對的會員

    “待確認會員”包含的資料:
    • 客戶基本資料
      檢視登記資料,考慮是否批核該名會員

    • 郵件主題及內容
      使用預設郵件範本,寄出確認通知

    • 確認
      直接點擊“確認”按鈕

    針對“待確認會員”的動作:
    • 確認會員
      若檢視資料後認為合適,可進行確認工作

    • 刪除
      若登記者不符合要求,可直接刪除

    • 寄電子郵件
      在正式確認前寄電郵向登記者查詢

    注意事項:
    • 未被確認的登記者,將無法登入網站

    • 如啟用“非認可批核會員不能觀看售價”,則未被確認的登記者將無法登入及觀看售價

    • 可配合“目錄分類”的“專屬客戶目錄”,把產品隱藏,令一般人無法觀看,只對被確認而且亦是“專屬客戶”級別的會員開放瀏覽權

    • 若需要將已經確認的會員轉回“未確認狀態,請往“客戶資料”選出該會員並修改“會員確認”及“專屬客戶狀態”


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Business Summary

    Business Summary


    我們的“網上商店”系統提供專業的“報表及統計”功能,讓您能隨時檢視“即時”及“過往”的業績記錄,令掌握營運更輕鬆。

    每項報表皆具備多種不同的樣式,而且除了能線上檢視外,更可透過您的印表機,將業務數據列印以備參考。

    進入“業務日誌報告”:
    1. 點擊主選單的“報表及統計”

    2. 點擊左選單的“業務日誌報告”

    每項“業務日誌報告”包含的資料:
    • 獨立訪問量
      選擇週期內的獨立IP 地址訪問量

    • 頁面瀏覽數
      選擇週期內的所有頁面被瀏覽總數,包括重復的點擊

    • 產品瀏覽數
      選擇週期內的所有產品被瀏覽總數,包括重復的點擊

    • 顧客訂購量
      選擇週期內,總共多少位顧客曾訂購

    • 產品訂購數
      選擇週期內,總共被訂購的產品數量

    • 訂單綜數
      選擇週期內的訂單總綜數

    • 訂單總金額
      選擇週期內的訂單總金額

    “業務日誌報告”的報表週期:
    • 每天數據
      透過選擇“年度”和“月份”,列出週期內的每天明細

    • 每月數據
      透過選擇“年度”,列出週期內的每月明細

    • 每年數據
      列出週期內的每年明細

    針對“業務日誌報告”的動作:
    • 報表週期
      選擇合適的週期範圍

    • 報表樣式
      選擇“棒狀圖”、“圓形圖”、“文字報表”其中一種樣式

    • 列印
      將當前資料透過印表機列印

    注意事項:
    • 請定期檢視所有報表及統計數據,方能掌握業務進展及變化

    • 所有報表數據屬您的商業機密,切勿隨意向第三者披露

    • 若有使用其他第三方供應商,例如“收款閘道”,基放計算方式、環境因素等,二者的報表數據結果可能並不一致

    • 報表資料屬即時狀態,而過往記錄有可能受其他因素影響,例如管理員對訂單的刪除等,所以資料將與實際稍有差別

    • 報表數據只供參考


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Preorder Products

    Preorder Products


    當您的產品屬於即將發售,您可預先把產品增加到店面,並以“預訂產品”型式接受顧客的訂購或查詢。

    所有產品若有特別注明“開售日期”的話,均被系統視為“預訂產品”的,而上店面的產品目錄,可根據設定顯示這些“產品預訂”。

    當該產品被訂購時,店面亦會提示顧客,顧客若接納先預訂後取貨則便可如常繼續完成訂單。

    請您在收到這些預訂產品的訂購單時關注及記錄,以便在產品發售時不會遺漏這些先前的訂單令顧客抱怨。

    每項產品包含的資料:
    • 開售日期 - 每項產品的開售日期,若留空則產品被視為正常發售

    新增產品:
    1. 點擊主選單的“分類目錄/產品管理”

    2. 點擊左選單的“預訂產品”

    3. 點擊主螢幕的“增加”按鈕

    4. 選擇產品的目錄

    5. 選擇相關產品

    6. 點擊主螢幕的下方的“增加”按鈕

    7. 點擊“日曆”按鈕選擇“開售日期”

    8. 完成後按“儲存”或“更新”,或按“返回”放棄並返回列表

    針對預訂產品的動作:
    • 新增產品
      從已建立的產品裏挑選一項成為預訂產品

    • 編輯
      修改已經增加的預訂產品資料

    • 刪除
      將該預訂產品資料刪除,若產品預訂中,將會轉回正常發售,此刪除動作只針對預訂資料,不會把原有產品刪除

    注意事項:
    • 系統暫未有特設針對此類訂單的管理,請確保顧客訂購的預訂產品已被關注記錄

    • 若產品到達開售日期,產品將以正常模式發售,不再顯示預訂訊息

    • 您亦可使用一般的“產品管理”修改“開售日期”


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Linux Web Hosting

  • PHP - How to define session.save_path

    PHP - How to define session.save_path


    If you can’t modify PHP.INI global configuration file, or just want to make the change affect Joomla! or Mambo application only, you must create or edit the .htaccess file in the installation directory for Joomla! or Mambo, and add the following line:

    php_value session.save_path '/var/www/vhosts/domainname/httpdocs/sessions'

    Change the /sessions to a folder that is writable(chmod 0757) and prefer to be a session saved folder by you which has been created first.

    * Where domainname is your domain name.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plesk 9 Control Panel User’s Guide

    Plesk 9 Control Panel User’s Guide


    Parallels Plesk Panel is the only web hosting control panel with integrated web design, SaaS storefront and billing. Parallels Plesk Panel delivers maximum profits for growing service providers.

    Parallels Plesk Panel is the most complete Web hosting control panel available today. In fact, it’s the only Web hosting panel that includes integrated Web design tools, a SaaS storefront, and fully automated billing and provisioning. Plus it delivers maximum profits for growing service providers; provides key tools for Web designers; and includes an easy-to-use server control panel for IT professionals (and small businesses without IT staff).

    This is a guide to the new Panel user interface called Control Panel, which is focused only on hosting management. This guide is addressed to anyone who is going to manage websites and mail using Parallels Plesk Panel 9: hosting services customers, resellers and server administrators.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • PHP - How to creating own error logs for debugging PHP scripts

    PHP - How to creating own error logs for debugging PHP scripts


    Please insert the following code in your PHP script. (or create separate file and adding the code in it. Include the file using "include()")

       error_reporting(0);
    $old_error_handler = set_error_handler("userErrorHandler");
    function userErrorHandler ($errno, $errmsg, $filename, $linenum, $vars)
    {
    $time=date("d M Y H:i:s");
    // Get the error type from the error number
    $errortype = array (1 => "Error",
    2 => "Warning",
    4 => "Parsing Error",
    8 => "Notice",
    16 => "Core Error",
    32 => "Core Warning",
    64 => "Compile Error",
    128 => "Compile Warning",
    256 => "User Error",
    512 => "User Warning",
    1024 => "User Notice");
    $errlevel=$errortype[$errno];
    //Write error to log file (CSV format)
    $errfile=fopen("errors.csv","a");
    fputs($errfile,"\"$time\",\"$filename:
    $linenum\",\"($errlevel) $errmsg\"\r\n");
    fclose($errfile);

    if($errno!=2 && $errno!=8) {
    //Terminate script if fatal error
    die("A fatal error has occurred. Script execution has been aborted");
    }
    }


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • PHP - How to check the PHP settings on the hosting server?

    PHP - How to check the PHP settings on the hosting server?


    A very easy way of doing this is to create a file named "check_info.php" or "check_info.php5".

    Insert the following line in it:

    <? phpinfo(); ?>

    Then run this file in your domain, i.e. http://www.domainname.com/check_info.php

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Plesk 11 Administrator’s Guide

    Plesk 11 Administrator’s Guide


    With more than 250,000 Windows and Linux servers deployed, Parallels Plesk Panel is the preferred choice for hosting service providers, web designers, and website owners. Parallels Plesk Panel is the first step down your business' growth path - toward faster sites and faster mobile access for website owners and toward a complete product line as your hosting business grows.

    This guide is intended for server administrators who are going to manage Parallels Panel 11 and Customer and Business Manager. This document also includes instructions about offering Web Presence Builder in the Try and Buy (or trial) mode.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Pre-Sale Services

  • Privacy Policy for your account

    Privacy Policy for your account


    We will never under any circumstance - rent, sell, exchange or in any way make your information available to third parties, unless legally required to do so.

    For international domain, ICANN does require that you receive one email per year to verify and update your contact information on your domain.

    Also, confirmation emails for ordering, domain name registrations and transfers, along with instructional email to activate services will still be sent to you.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Specific refund conditions based on method of payment

    Specific refund conditions based on method of payment


    Cash / Bank Deposit / Cheque:
    We will refund your money back to the account you sent payment from, mail a cheque, or via PayPal. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    PayPal:
    For orders paid via PayPal we will refund money to your PayPal account only. Your PayPal account must be considered "Verified" by PayPal, open, and in good standing with PayPal for us to refund money.

    Credit Card:
    For security reasons the credit card you use to purchase any of Focus Network Company products must be valid when you request a refund. We cannot refund to a credit card that has expired or been cancelled.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to apply special price for international domain

    How to apply special price for international domain


    We are offering domain name registration for the unbelievable low price.

    This offer is for a limited time only. Act fast while quantities last.

    You must purchase following plan offered on our site at the same time you new register your domain name to qualify.

    • E-Store
    • Linux Web Hosting
    • Website Design & Development


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Newsletter / E-mail Help

    Newsletter / E-mail Help


    As a subscriber of www.ec2biz.com newsletters, you need to add www.ec2biz.com to your address book to continue to receive these emails.

    Please follow the directions at this link: Have you added the www.ec2biz.com addresses to your e-mail address book? for your particular e-mail provider.

    You need to add www.ec2biz.com to your address book:


    Please choose your e-mail provider below for specific instructions on adding www.ec2biz.com to your address book:

    Hotmail
    • Open the e-mail.

    • Click "SAVE ADDRESS" at the top of the message header.

    • Click "OK" on the next screen.

    Yahoo
    • Open the e-mail.

    • Click "ADD TO ADDRESS BOOK" next to the FROM address.

    • Click "ADD TO ADDRESS BOOK" again.

    Outlook Express
    • Open the e-mail.

    • Right-click on the FROM name.

    • Click ADD TO ADDRESS BOOK in the menu.

    • Click OK on the Properties pop-up.

    Netvigator.com (NETMail)
    • Click "ADD ADDRESS" on the screen of book address.

    • Input a new address to field:

    • Click "SAVE" on the bottom.

    i-cable.com
    • Click "ADD ADDRESS" on the screen of book address.

    • Input a new address to field:

    • Click "SAVE".

    You may need to contact your email provider to get more information.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Why using free email accounts is bad idea?

    Why using free email accounts is bad idea?


    We recommend that you NOT use an email address from a free service (e.g. Yahoo! or Hotmail) with your account information.

    Instead, please enter a traditional address, such as that from your account, or one issued to you by your ISP (Internet Service Provider).

    This gives us better assurance of being able to contact you should we need to, as well as helping us protect your account and prevent fraud.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Industry News

  • 「.tel」域名時代來臨,勢成全球電話簿

    「.tel」域名時代來臨,勢成全球電話簿


    所有個人或企業,於2009年2月3日起可以註冊「.tel」域名,作為對外溝通的渠道。這新域名特別針對流動上網,據報道,美國意大利法拉利車廠與《哈利波特》小說作家羅琳、微軟公司等等都已率先註冊該域名。

    「.tel」域名的特點是讓企業將所有聯繫方法,如電話、傳真、電郵等放在「.tel」,讓網民更方便與企業聯絡,甚至直接透過網站撥打電話或發送文字短信。企業還可以用它通過即時消息(Instant Messaging)工具、博客平台甚至語音電話(VoIP)服務等低成本通信渠道來降低其成本,從而做到既省錢又能加強客戶服務。

    「.tel」域名不同其他網域名稱的部分,在於不需有自己的IP,就能直接有完整網頁的呈現,並透過創新技術使得網頁內的聯絡資訊或關鍵字得以直接儲存,並同時被大眾所查閱,在透過其他常用軟體的支援下,點選EMAIL, MSN ID, SKYPE ID 或地址, 都能呈現極佳的互動效果。

    Telnic表示,他們會以「先到先得」的方式處理申請,預計一些極具吸引力的域名將很快會被搶購一空。

    全球網民在香港時間2009年2月3日23時起,就可到Telnic的網站 http://telnic.org 登記,每個.tel域名售300美元,為期3年,之後每年20美元。

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Microsoft recommends against usage of SHA-1

    Microsoft recommends against usage of SHA-1


    Microsoft is advising its customers to stop using the SHA-1 hashing algorithm in cryptographic applications such as SSL/TLS encryption and code signing.

    In a security advisory issued by the company, Microsoft said that it would stop recognising certificates using the algorithm after January 1, 2016. After this date, certificate authorities (CAs) that issue certificates under the Windows Root Certificate Program will only be able to issue SHA-2 certificates.

    According to Microsoft, SHA-1 is used in 98 percent of all certificates issued worldwide. However, it also claims that since 2005 researchers have discovered collision attacks against the algorithm that mean it no longer meets its security standards. Although the announcement to drop SHA-1 comes today, the Australian Signals Directorate (ASD) has been advising government agencies to move to SHA-2 since December 2011.

    The ASD also has a slightly different opinion of when the collision attacks were first known, stating that "theoretically impressive attacks" against SHA-1 were known since 2004, but that they were not practical to implement.

    ASD has already removed the "weakened but not broken" SHA-1 algorithm from use in its Information Security Manual.

    The US National Institute of Standards and Technology, which published the algorithm, also stated in September 2012 that US federal agencies should stop using SHA-1.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • 微軟證實Hotmail個人資料遭竊取

    微軟證實Hotmail個人資料遭竊取


    根據BBC(英國廣播公司)報導,微軟公司的Windows Live Hotmail遭到網絡黑客入侵,超過萬個hotmail客戶資料遭到竊取,這些資料多數來自歐洲,微軟並證實遭竊取的密碼都是正確的。

    科技網誌neowin.net說,黑客除了盜取帳號密碼之外,又把盜取到的資料全數公布到網路上,超過上萬個hotmail帳戶的細節,2009年10月1日被貼上一個讓人分享密碼的網站pastebin.com。

    Neowin聲稱這些帳戶可能是被黑或是利用網路釣魚搜集而來。網路釣魚攻擊者利用發送釣魚郵件給受害者,受害者點選後,會被導向釣魚網頁,就會洩漏了個人的機密資訊給予攻擊者,如個人的信用卡號碼、密碼、帳號等。

    微軟目前表示,他們已經知悉此事,並正在積極了解及處理中。這件事透露出網路資訊安全的疑慮,若果個人資料遭到竊取,可能會有更多後續麻煩的事端。

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Google 7.68 Terabits Per Second Cable

    Google 7.68 Terabits Per Second Cable


    Search giant finalizes plan for Pacific fiber being ran.

    The recent quakes in Taiwan highlighted a lack of redundancy in the Pacific, where fiber runs have about half the capacity found across the Atlantic. A number of companies are planning to rectify that -- including Verizon, who is working with a number of companies to run an 11,000 mile, five terabits per second (Tbps) cable from the United States (Oregon) directly to mainland China, Taiwan and South Korea.

    Google is also laying Pacific fiber as part of a consortium named Unity, formed alongside six international companies. The coalition is building a 6,200 mile, 7.68Tbps capable fiber run from Los Angeles to Chikura, located off the coast near Tokyo. Google today announced they finalized the deal on the $300 million project. According to the press release Trans-pacific bandwidth demand continues to surge:

    According to the TeleGeography Global Bandwidth Report, 2007, Trans–Pacific bandwidth demand has grown at a compounded annual growth rate (CAGR) of 63.7 percent between 2002 and 2007. It is expected to continue to grow strongly from 2008 to 2013, with total demand for capacity doubling roughly every two years. "The Unity cable system allows the members of the consortium to provide the increased capacity needed as more applications and services migrate online, giving users faster and more reliable connectivity," said Unity spokesperson Jayne Stowell.

    It's obviously a nice deal for Google, given the content operator gets access to bandwidth at build cost. NEC Corporation and Tyco Telecommunications will build the fiber run starting immediately, and it should be completed by 2010, assuming that the undersea cable cutting bogeyman leaves them alone.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • If You're Going To Steal Software, Steal From Us: Microsoft Exec

    If You're Going To Steal Software, Steal From Us: Microsoft Exec


    Microsoft business group president Jeff Raikes estimates that between 20% and 25% of all software used in the United States is pirated, but said some pirates end up becoming paying customers.

    By Paul McDougall
    InformationWeek
    12, 2007 03:00

    If you're going to be a software counterfeiter, then please copy and illegally use Microsoft products.

    The above plea isn't from a posting on a hacker forum. Rather, it's how Microsoft business group president Jeff Raikes feels about software counterfeiters. "If they're going to pirate somebody, we want it to be us rather than somebody else," Raikes said.

    The remarks might seem surprising, coming from a senior executive at a software company that spends millions each year fighting software piracy and developing copyright protection technologies.

    But Raikes, speaking last week at the Morgan Stanley Technology conference in San Francisco, said a certain amount of software piracy actually helps Microsoft because it can lead to purchases by individuals who otherwise might never have been exposed to the company's products.

    "We understand that in the long run the fundamental asset is the installed base of people who are using our products," Raikes said. "What you hope to do over time is convert them to licensing the software."

    Raikes said Microsoft isn't about to abandon efforts to track down those who illegally copy and use its products. However, he said Microsoft has to balance that approach with the recognition that users of purloined software could one day become legitimate customers.

    "You want to push towards getting legal licensing, but you don't want to push so hard that you lose the asset that's most fundamental in the business," said Raikes, who estimated that between 20% and 25% of all software used in the United States is pirated.

    Raikes said Microsoft is developing so-called "pay-as-you-go" software offerings with pricing schemes similar to those used by cell phone companies for emerging markets as a way of encouraging low-income individuals to use the company's products legally.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

General Information

  • HTTP 狀態碼

    HTTP 狀態碼


    當一個要求傳送至您的伺服器,要求您網站的網頁 (例如,使用者以瀏覽器瀏覽您的網頁),您的伺服器會傳回 HTTP 狀態碼以回應該要求。

    此狀態碼會提供關於要求狀態的資訊, 並給予您的網站和所要求網頁的資訊。

    一些常見的狀態碼如下:

    • 200 - 伺服器成功傳回網頁
    • 404 - 找不到所要求的網頁
    • 503 - 伺服器暫時無法使用

    下列為 HTTP 狀態碼的完整清單。 請按一下連結以取得更多資訊。 您也可以參閱 http://www.w3.org/Protocols/rfc2616/rfc2616-sec10.html W3C 的 HTTP 狀態碼網頁,以取得更多資訊。

    1xx (暫時的回應)
    指出暫時回應並請求要求者繼續的狀態碼。
    代碼說明
    100 (繼續)要求者應當繼續此要求。伺服器傳回此程式碼,指出已收到一項要求的第一部分,正等候其餘的部分。
    101 (切換通訊協定)要求者已要求伺服器切換通訊的協定,而伺服器正在確認即將如此進行。

    2xx(成功)
    指出伺服器已成功處理要求的狀態碼。
    代碼說明
    200 (成功)伺服器已成功處理要求。這代表伺服器已提供所要求的網頁。
    201 (已建立)要求已順利完成,伺服器已建立新的資源。
    202 (已接受)伺服器已接受此要求,但尚未處理。
    203 (非授權資訊)伺服器成功處理要求,但可能傳回來自另一資源的資訊。
    204 (無內容)伺服器已成功處理要求,不過未傳回任何內容。
    205 (重設內容)伺服器已成功處理要求,不過未傳回任何內容。 這個回應與 204 不一樣,此回應請求要求者重設文件檢視 (例如,清除表單以輸入新的資料)。
    206 (部分內容)伺服器已成功處理部分 GET 要求。

    3xx(已重新導向)
    您必須採取進一步的動作才能完成要求。通常這些狀態碼會用來重新導向。建議每項要求不要使用超過五次重新導向。
    代碼說明
    300 (多個選項)根據此要求,伺服器可採取數種動作。 伺服器可能會根據要求者 (user agent) 選取一個動作,也可能列出清單,讓要求者進行選擇。
    301 (永久移動)要求的網頁已永久移到新位置。 當伺服器回傳此回應 (回應 GET 或 HEAD 要求),會自動將要求者導向至新位置。
    302 (暫時移動)伺服器目前以來自不同位置的網頁回應要求者,但是要求者仍應該繼續以原位置進行未來的要求。 此程式碼類似於 GET 或 HEAD 要求裡的 301,會自動將要求者導向至另一個位置。
    303 (參閱其他位置)當要求者應該對另一個位置發出個別 GET 要求,才能擷取回應時,伺服器會傳回此狀態碼。 對於 HEAD 之外的所有要求,伺服器會自動導向至其他位置。
    304 (未修改)要求的網頁自上次要求以後並未修改過。 當伺服器回傳此回應時,並不會回傳網頁內容。要求者上次要求變更網頁之後,如果該網頁尚未經修改,您就應該設定伺服器傳回此回應 (稱為 If-Modified-Since HTTP 標題)。這樣可以節省您的頻寬和負載。
    305 (使用 Proxy)要求者只能透過 Proxy 進入要求的網頁。 當伺服器傳回此回應時,也會指出要求者應該使用的 Proxy。
    307 (暫時的重新導向)伺服器目前以來自不同位置的網頁回應要求者,但是要求者仍應該繼續以原位置進行未來的要求。 此程式碼類似於 GET 或 HEAD 要求裡的 301,會自動將要求者導向至另一個位置。

    4xx (要求錯誤)
    這些狀態碼指出要求裡可能有伺服器無法處理的錯誤。
    代碼說明
    400 (不正確的要求)伺服器無法辨識要求的語法。
    401 (未授權)此要求需要驗證。如果網頁需要登入,伺服器可能會傳回此回應。
    403 (禁止)伺服器拒絕要求。如果在試圖檢索您網站的有效網頁時收到此狀態碼,可能是因為您的伺服器或主機攔截了存取。
    404 (找不到)伺服器找不到所要求的網頁。例如,如果要求的網頁不在這個伺服器上,伺服器就會傳回此狀態碼。
    405 (不允許的方法)不允許要求裡所指定的方法。
    406 (不接受)要求的網頁無法回應所要求的內容特性。
    407 (需要 Proxy 驗證)此狀態碼類似於 401(未授權),但指定要求者必須透過 Proxy 進行驗證。當伺服器傳回此回應時,也會指出要求者應該使用的 Proxy。
    408 (要求逾時)在等候回應時,發生伺服器逾時。
    409 (衝突)在完成要求時,伺服器發生衝突。伺服器必須在回應中包含衝突資訊。伺服器可能會在 PUT 要求與較早的某項要求相衝突時傳回此狀態碼做為回應,並會列出這兩項要求之間的差異。
    410 (消失) 當要求的資源遭永久移除,伺服器會回傳此回應。此回應類似於 404 (未找到) 狀態碼,但在資源曾經存在但已消失的狀況中,有時會取代 404。如果資源已永久移動,您應該使用 301,指定資源的新位置。
    411 (需要長度)伺服器不接受不含有效內容長度標題欄位的要求。
    412 (前提失敗)伺服器未達到要求者所要求的前提之一。
    413 (要求實體太大)伺服器無法處理要求,因為要求過於龐大。
    414 (要求的 URI 太長)伺服器無法處理要求,因為要求的網址 (通常是一個網址) 過長。
    415 (不支援的媒體類型)要求的格式不受要求網頁支援。
    416 (要求的範圍無法使用)如果要求的範圍在該網頁上無法使用,伺服器就會傳回此狀態碼。
    417 (預期失敗)伺服器無法達到預期要求標題欄位的條件。

    5xx (伺服器錯誤)
    這些狀態碼指出伺服器在嘗試處理要求時發生內部錯誤。 這些錯誤傾向於是伺服器本身的錯誤,而不是要求的錯誤。
    代碼說明
    500 (內部伺服器錯誤)伺服器遭遇錯,可能無法完成要求。
    501 (未提供)伺服器不具備完成要求所需的功能。例如,當伺服器無法辨認要求的方式,可能就會傳回此狀態碼。
    502 (錯誤的閘道)伺服器當成閘道或 Proxy 使用,接收到來自上游伺服器的無效回應。
    503 (服務無法使用)伺服器目前暫時無法使用 (因為超載或維護之故而關閉)。通常這只是暫時性的狀況。
    504 (閘道逾時)伺服器當成閘道或 Proxy 使用,而且未接收到來自上游伺服器的即時回應。
    505 (不支援的 HTTP 版本)伺服器不支援要求裡所用的 HTTP 通訊協定版本。


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • B2evolution

    B2evolution


    b2evolution is a powerful blog tool you can install on your own website.

    It includes all the features of traditional blog tools, and extends them with evolved features such as file & photo management, advanced skinning, multiple blogs support as well as detailed user permissions...
    Not to mention third party plug-ins!

    Plus, it's free, open-source (GPL), it runs on virtually any webserver featuring PHP+MySQL and it's available in many languages!

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • How to Enable Cookie

    How to Enable Cookie


    To enable cookie, follow the instructions below for the browser version you are using.

    Mozilla Firefox (1.0 final release and earlier)

    • Go to the "Tools" menu.

    • Select "Options".

    • Select the "Privacy" icon in the left panel.

    • Check the box corresponding to "Allow sites to set cookies".

    • Click "OK" to save changes.

    Netscape 7.1/Mozilla 5.0

    • Select "Preferences" from the Edit menu.

    • Click on the arrow next to "Privacy & Security" in the scrolling window to expand.

    • Under "Privacy & Security", select "Cookies."

    • Select "Enable all cookies".

    • Click "OK".

    Microsoft Internet Explorer 6.0+

    • Select "Internet Options" from the Tools menu.

    • Click on the "Privacy" tab.

    • Click the "Default" button (or manually slide the bar down to "Medium") under "Settings".

    • Click "OK".

    Microsoft Internet Explorer 5.x

    • Select "Internet Options" from the Tools menu.

    • Click on the "Security" tab.

    • Click the "Custom Level" button.

    • Scroll down to the "Cookies" section.

    • To enable:
      • Set "Allow cookies that are stored on your computer" to "Enable".

      • Set "Allow per-session cookies" to "Enable".

    • Click "OK".

    Microsoft Internet Explorer 4.x

    • Select "Internet Options" from the View menu.

    • Click on the "Advanced" tab.

    • Scroll down to find "Cookies" within the "Security" section.

    • To enable:
      • Select "Always accept cookies".

    • Click "OK".

    Netscape Communicator 4.x

    • Select "Preferences" from the Edit menu.

    • Find the "Cookies" section in the "Advanced" category.

    • To enable:
      • Select "Accept all cookies" (or "Enable all cookies").

    • Click "OK".


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Avactis

    Avactis


    Avactis shopping cart is a software package that allows you to open an online store on the Internet.

    It comprises two parts - a client side and an administrator side. The client side is your website as seen by visitors. The Avactis's client side allows the visitors to your site to browse products in the online store, select products and put them into the shopping cart, as in a conventional supermarket, and then pay for the selected products using a credit card or other payment options.

    The Avactis's administrator side allows you to stock up the store with products, track orders and payments.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • HTML True Color Chart

    HTML True Color Chart


    0000000000330000660000990000CC0000FF
    0033000033330033660033990033CC0033FF
    0066000066330066660066990066CC0066FF
    0099000099330099660099990099CC0099FF
    00CC0000CC3300CC6600CC9900CCCC00CCFF
    00FF0000FF3300FF6600FF9900FFCC00FFFF
    3300003300333300663300993300CC3300FF
    3333003333333333663333993333CC3333FF
    3366003366333366663366993366CC3366FF
    3399003399333399663399993399CC3399FF
    33CC0033CC3333CC6633CC9933CCCC33CCFF
    33FF0033FF3333FF6633FF9933FFCC33FFFF
    6600006600336600666600996600CC6600FF
    6633006633336633666633996633CC6633FF
    6666006666336666666666996666CC6666FF
    6699006699336699666699996699CC6699FF
    66CC0066CC3366CC6666CC9966CCCC66CCFF
    66FF0066FF3366FF6666FF9966FFCC66FFFF
    9900009900339900669900999900CC9900FF
    9933009933339933669933999933CC9933FF
    9966009966339966669966999966CC9966FF
    9999009999339999669999999999CC9999FF
    99CC0099CC3399CC6699CC9999CCCC99CCFF
    99FF0099FF3399FF6699FF9999FFCC99FFFF
    CC0000CC0033CC0066CC0099CC00CCCC00FF
    CC3300CC3333CC3366CC3399CC33CCCC33FF
    CC6600CC6633CC6666CC6699CC66CCCC66FF
    CC9900CC9933CC9966CC9999CC99CCCC99FF
    CCCC00CCCC33CCCC66CCCC99CCCCCCCCCCFF
    CCFF00CCFF33CCFF66CCFF99CCFFCCCCFFFF
    FF0000FF0033FF0066FF0099FF00CCFF00FF
    FF3300FF3333FF3366FF3399FF33CCFF33FF
    FF6600FF6633FF6666FF6699FF66CCFF66FF
    FF9900FF9933FF9966FF9999FF99CCFF99FF
    FFCC00FFCC33FFCC66FFCC99FFCCCCFFCCFF
    FFFF00FFFF33FFFF66FFFF99FFFFCCFFFFFF


    FF4848FF68DDFF62B0FE67EBE469FED568FD9669FE
    FF7575FF79E1FF73B9FE67EBE77AFED97BFDA27AFE
    FF8A8AFF86E3FF86C2FE8BF0EA8DFEDD88FDAD8BFE
    FF9797FF97E8FF97CBFE98F1ED9EFEE29BFDB89AFE
    FFA8A8FFACECFFA8D3FEA9F3EFA9FEE7A9FEC4ABFE
    FFBBBBFFACECFFBBDDFFBBF7F2BCFEEDBEFED0BCFE
    FFCECEFFC8F2FFC8E3FFCAF9F5CAFFF0CBFEDDCEFF
    FFDFDFFFDFF8FFDFEFFFDBFBF9D9FFF4DCFEE6DBFF
    FFECECFFEEFBFFECF5FFEEFDFDF2FFFAECFFF1ECFF
    FFF2F2FFFEFBFFF9FCFFF9FEFFFDFFFDF9FFFBF9FF
    8000808721879A03FE892EE43923D62966B823819C
    BF00BFBC2EBCA827FE9B4EE96755E32F74D02897B7
    DB00DBD54FD5B445FEA55FEB8678E94985D62FAACE
    F900F9DD75DDBD5CFEAE70ED9588EC6094DB44B4D5
    FF4AFFDD75DDC269FEAE70EDA095EE7BA7E157BCD9
    FF86FFE697E6CD85FEC79BF2B0A7F18EB4E67BCAE1
    FFA4FFEAA6EAD698FECEA8F4BCB4F3A9C5EB8CD1E6
    FFBBFFEEBBEEDFB0FFDBBFF7CBC5F5BAD0EFA5DBEB
    FFCEFFF0C4F0E8C6FFE1CAF9D7D1F8CEDEF4B8E2EF
    FFDFFFF4D2F4EFD7FFEDDFFBE3E0FAE0EAF8C9EAF3
    FFECFFF4D2F4F9EEFFF5EEFDEFEDFCEAF1FBDBF0F7
    FFF9FFFDF9FDFEFDFFFEFDFFF7F5FEF8FBFEEAF7FB
    5757FF62A9FF62D0FF06DCFB01FCEF03EBA601F33E
    6A6AFF75B4FF75D6FF24E0FB1FFEF303F3AB0AFE47
    7979FF86BCFF8ADCFF3DE4FC5FFEF733FDC04BFE78
    8C8CFF99C7FF99E0FF63E9FC74FEF862FDCE72FE95
    9999FF99C7FFA8E4FF75ECFD92FEF97DFDD78BFEA8
    AAAAFFA8CFFFBBEBFF8CEFFDA5FEFA8FFEDDA3FEBA
    BBBBFFBBDAFFCEF0FFACF3FDB5FFFCA5FEE3B5FFC8
    CACAFFD0E6FFD9F3FFC0F7FECEFFFDBEFEEBCAFFD8
    E1E1FFDBEBFFECFAFFC0F7FEE1FFFEBDFFEAEAFFEF
    EEEEFFECF4FFF9FDFFE6FCFFF2FFFECFFEF0EAFFEF
    F9F9FFF9FCFFFDFEFFF9FEFFFDFFFFF7FFFDF9FFFB
    1FCB4A59955C48FB0D2DC80059DF009D9D00B6BA18
    27DE556CA87079FC4E32DF0061F200C8C800CDD11B
    4AE37180B58489FC6336F20066FF00DFDF00DFE32D
    7CEB9893BF9699FD7752FF2095FF4FFFFFAAEDEF85
    93EEAAA6CAA9AAFD8E6FFF44ABFF73FFFF84EEF093
    A4F0B7B4D1B6BAFEA38FFF6FC0FF97FFFF99F2F4B3
    BDF4CBC9DECBCAFEB8A5FF8AD1FFB3FFFFB5F5F7C4
    D6F8DEDBEADCDDFED1B3FF99DFFFCAFFFFC8F7F9D0
    E3FBE9E9F1EAEAFEE2D2FFC4E8FFD9FFFFD7FAFBDF
    E3FBE9F3F8F4F1FEEDE7FFDFF2FFEAFFFFE3FCFCE9
    FAFEFBFBFDFBFDFFFDF5FFF2FAFFF7FFFFFDFDFDF0
    BABA21C8B400DFA800DB9900FFB428FF9331FF800D
    E0E04ED9C400F9BB00EAA400FFBF48FFA04AFF9C42
    E6E671E6CE00FFCB2FFFB60BFFC65BFFAB60FFAC62
    EAEA8AF7DE00FFD34FFFBE28FFCE73FFBB7DFFBD82
    EEEEA2FFE920FFDD75FFC848FFD586FFC48EFFC895
    F1F1B1FFF06AFFE699FFD062FFDEA2FFCFA4FFCEA2
    F4F4BFFFF284FFECB0FFE099FFE6B5FFD9B7FFD7B3
    F7F7CEFFF7B7FFF1C6FFEAB7FFEAC4FFE1C6FFE2C8
    F9F9DDFFF9CEFFF5D7FFF2D2FFF2D9FFEBD9FFE6D0
    FBFBE8FFFBDFFFFAEAFFF9EAFFF7E6FFF4EAFFF1E6
    FEFEFAFFFEF7FFFDF7FFFDF9FFFDF9FFFEFDFFF9F4
    D1D17AC0A545C27E3AC47557B05F3CC17753B96F6F
    D7D78ACEB86CC98A4BCB876DC06A45C98767C48484
    DBDB97D6C485D19C67D29680C87C5BD0977BC88E8E
    E1E1A8DECF9CDAAF85DAA794CF8D72DAAC96D1A0A0
    E9E9BEE3D6AADDB791DFB4A4D69E87E0BBA9D7ACAC
    EEEECEEADFBFE4C6A7E6C5B9DEB19EE8CCBFDDB9B9
    E9E9C0EDE4C9E9D0B6EBD0C7E4C0B1ECD5CAE6CCCC
    EEEECEEFE7CFEEDCC8F0DCD5EACDC1F0DDD5ECD9D9
    F1F1D6F5EFE0F2E4D5F5E7E2F0DDD5F5E8E2F3E7E7
    F5F5E2F9F5ECF9F3ECF9EFECF5E8E2FAF2EFF8F1F1
    FDFDF9FDFCF9FCF9F5FDFAF9FDFAF9FCF7F5FDFBFB
    F70000B9264F99009974138C0000CE1F88A74A9586
    FF2626D73E68B300B38D18AB5B5BFF"25A0C55EAE9E
    FF5353DD597DCA00CAA41CC67373FF29AFD674BAAC
    FF7373E37795D900D9BA21E08282FF4FBDDD8DC7BB
    FF8E8EE994ABFF2DFFCB59E89191FF67C7E2A5D3CA
    FFA4A4EDA9BCF206FFCB59E8A8A8FF8ED6EAC0E0DA
    FFB5B5F0B9C8FF7DFFD881EDB7B7FFA6DEEECFE7E2
    FFC8C8F4CAD6FFA8FFEFCDF8C6C6FFC0E7F3DCEDEA
    FFEAEAF8DAE2FFC4FFEFCDF8DBDBFFD8F0F8E7F3F1
    FFEAEAFAE7ECFFE3FFF8E9FCEEEEFFEFF9FCF2F9F8
    FFFDFDFEFAFBFFFDFFFFFFFFFDFDFFFAFDFEF7FBFA


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Glossary

  • Cookie

    Cookie


    The term Cookie derives from "magic cookie", a packet of data a program receives but only uses for sending it again, possibly to its origin, unchanged. Magic cookies were already used in computing when Lou Montulli had the idea of using them in Web communications in Mar 1993.

    Purpose
    HTTP cookies are used by Web servers to differentiate users and to maintain data related to the user during navigation, possibly across multiple visits. HTTP cookies were introduced to provide a way for realizing a "shopping cart" (or "shopping basket"), a virtual device into which the user can "place" items to purchase, so that users can navigate a site where items are shown, adding or removing items from the shopping basket at any time.

    Allowing users to log in to a website is another use of cookies. Users typically log in by inserting their credentials into a login page; cookies allow the server to know that the user is already authenticated, and therefore is allowed to access services or perform operations that are restricted to logged-in users.

    Many websites also use cookies for personalization based on users' preferences. Sites that require authentication often use this feature, although it is also present on sites not requiring authentication. Personalization includes presentation and functionality. For example, the Wikipedia Web site allows authenticated users to choose the webpage skin they like best; the Google search engine allows users (even non-registered ones) to decide how many search results per page they want to see.

    Cookies are also used to track users across a website. Third-party cookies and Web bugs, explained below, also allow for tracking across multiple sites. Tracking within a site is typically done with the aim of producing usage statistics, while tracking across sites is typically used by advertising companies to produce anonymous user profiles, which are then used to target advertising (deciding which advertising image to show) based on the user profile.

    Browser Setting
    Described in " How to Enable Cookie " section.

    Cookie Expiration
    Persistent cookies have been criticized by privacy experts for not being set to expire soon enough, and thereby allowing some websites to track users and build up a profile of them over time. This aspect of cookies also compounds the issue of session hijacking, because a stolen persistent cookie can potentially be used to impersonate a user for a considerable period of time.

    Identification
    If more than one browser is used on a computer, each usually has a separate storage area for cookies. Hence cookies do not identify a person, but a combination of a user account, a computer, and a Web browser. Thus, anyone who uses multiple accounts, computers, or browsers has multiple sets of cookies.

    Likewise, cookies do not differentiate between multiple users who share a computer and browser, if they do not use different user accounts.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Internet Protocol

    Internet Protocol


    Internet Protocol (IP) is a unique address that certain electronic devices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address. Any participating network device—including routers, computers, time-servers, printers, Internet fax machines, and some telephones—can have their own unique address.

    An IP address can also be thought of as the equivalent of a street address or a phone number (compare: VoIP (voice over (the) internet protocol)) for a computer or other network device on the Internet. Just as each street address and phone number uniquely identifies a building or telephone, an IP address can uniquely identify a specific computer or other network device on a network.

    IP addresses can appear to be shared by multiple client devices either because they are part of a shared hosting web server environment or because a proxy server (e.g., an ISP or anonymizer service) acts as an intermediary agent on behalf of its customers, in which case the real originating IP addresses might be hidden from the server receiving a request. The analogy to telephone systems would be the use of predial numbers (proxy) and extensions (shared).

    IP addresses are managed and created by the Internet Assigned Numbers Authority (IANA). The IANA generally allocates super-blocks to Regional Internet Registries, who in turn allocate smaller blocks to Internet service providers and enterprises.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • SWF (Flash Animations)

    SWF (Flash Animations)


    SWF is a proprietary vector graphics file format produced by the Flash software from Adobe (formerly Macromedia). Intended to be small enough for publication on the web, SWF files can contain animations or applets of varying degrees of interactivity and function. SWF is also sometimes used for creating animated display graphics and menus for DVD movies, and television commercials.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • ISP

    ISP


    An Internet service provider (abbr. ISP, also called Internet access provider or IAP) is a business or organization that provides to consumers access to the Internet and related services.

    In the past, most ISPs were run by the phone companies. Now, ISPs can be started by just about any individual or group with sufficient money and expertise. In addition to Internet access via various technologies such as dial-up and DSL, they may provide a combination of services including Internet transit, domain name registration and hosting, web hosting, and colocation.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • B2C (Business-to-consumer)

    B2C (Business-to-consumer)


    B2C (Business-to-consumer), also business-to-customer, describes activities of commercial organizations serving the end consumer with products and/or services.

    The two main challenges faced by B2C e-commerce are building traffic and sustaining customer loyalty. Due to the winner-take-all nature of the B2C structure, many smaller firms find it difficult to enter a market and remain competitive.

    In addition, online shoppers are very price-sensitive and are easily lured away, so acquiring and keeping new customers is difficult.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Email Tutorial

  • Setup fetch email using Google Gmail

    Setup fetch email using Google Gmail


    Why Should I Use Fetch Mail Instead of an Email Forwarder?

    We are committed to improving the stability of services.

    Unfortunately, it is very common for mail forwarding to cause blacklisting with many large email providers. This most commonly occurs when large amounts of mail are forwarded and then marked as spam after it has been received in the end user's inbox. This results in our server's sending reputation being penalized since it was the last server to send the mail. Ultimately, our server will be blacklisted with the email provider and it will affect all of other users on the same server.

    A solution to this is to disabled mail forwarding altogether. change to using mail fetcher, you can access mail in a other system without having the mail routed through that system's server. This way, you can mark a message as spam without it affecting our email server's reputation.

    The instructions below provide steps on how to fetch mail from our server so you can access them via Google Mail.

    Google Mail Fetcher is easy to set up and free to use. It uses POP3 to pull all the contents of an email box into Gmail and then parses the emails for spam. Mail Fetcher can download messages from up to five other email accounts, allowing you to centralize all your email in Gmail.

    Once Mail Fetcher is set up, Google will check those accounts on a regular basis, and new mail will appear automatically in Gmail.

    • Log into your Gmail account.
    • Click the gear icon in the upper right corner of the page and select Settings.
    • Click the Settings and Accounts and Import tab and locate the Check mail from other accounts (using POP3) section.
    • Click Add a POP3 mail account you own. (Note: Google does not allow the use of self-signed SSL certificates, including our shared SSL certificates.)
    • Enter the full email address of the account from which you'd like mail fetched.

    • Click Next Step.
    • In the Username field, enter your full email address.
    • In the Password field, enter the password for the email address you provided.
    • Select Port 110 for a POP3 connection.
    • Click the checkboxes next to the options that best suit your needs:
      • Leave a copy of retrieved messages on the server.
      • Always use a secure connection (SSL) when retrieving mail *
      • Label incoming messages
      • Archive incoming messages
    • Click Add Account.


    Attention
    • As a convenience to users, we provide information about how to use certain third-party products, but we do not have technical support third-party products. we are not responsible for the functions or reliability of such products.
    • Email Forwarding or Fetch Mail may disclose your secrets.


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Are you able to send emails but not receive?

    Are you able to send emails but not receive?


    Either your E-Mail address setting is wrong, or your domain is out of disk space. You will need to increase the amount of disk space to receive mail again.

    Does it say "please enter your username and password for the following server" and you are sure you're using the correct information?

    Most of our servers have a 60 checks per hour limit. If you hit this limit in any hour you'll be locked out for the rest of the hour. you will need to click: Tools > Options > General > and disable where it says "check for new messages every xx minutes".

    If you do not want to disable it just set it to check less often. keep in mind the more computers you have auto checking or checking the mail the quicker you will hit this limit.

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Setup fetch email using Outlook mail / Hotmail

    Setup fetch email using Outlook mail / Hotmail


    Why Should I Use Fetch Mail Instead of an Email Forwarder?

    We are committed to improving the stability of services.

    Unfortunately, it is very common for mail forwarding to cause blacklisting with many large email providers. This most commonly occurs when large amounts of mail are forwarded and then marked as spam after it has been received in the end user's inbox. This results in our server's sending reputation being penalized since it was the last server to send the mail. Ultimately, our server will be blacklisted with the email provider and it will affect all of other users on the same server.

    A solution to this is to disabled mail forwarding altogether. change to using mail fetcher, you can access mail in a other system without having the mail routed through that system's server. This way, you can mark a message as spam without it affecting our email server's reputation.

    The following articles explain how to set up mail fetching for other services and are for reference only.

    http://windows.microsoft.com/en-us/outlook/pop-email

    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • Useful ISP email information

    Useful ISP email information


    I S PPOP3PortS.S.LSMTPPortS.S.LIMAP4PortS.S.L
    網上行
    Netvigator
    pop.netvigator.com110995smtp.netvigator.com25465
    商業網上行
    Business Netvigator
    corppop.netvigator.com110corpmail1.netvigator.com25
    PCCW NETMailpop.netvigator.com110995smtp.netvigator.com25465
    PCCW NETMail Plusndpop.netvigator.com110995ndsmtp.netvigator.com25465ndimap.netvigator.com143993
    和記寬頻
    Hutchison Broadband
    pop.hgcbroadband.com
    pop.net-yan.com
    110mail02.hgcbroadband.com
    mail02.net-yan.com
    25
    3寬頻
    Three Broadband
    pop.threebb.com.hk110mail02.threebb.com.hk25
    有線寬頻
    i-CABLE
    mail.i-cable.com110smtp.i-cable.com25
    香港寬頻
    HKBN
    popo.hkbn.net
    pop1.hkbn.net
    popo.ctimail.com
    110smtpo.hkbn.net
    smtpo.ctimail.com
    25
    太平洋寬頻
    Pacific Internet
    pop.pacific.net.hk110smtp.pacific.net.hk25
    SmarTone Vodafone110995smtp.smartone-vodafone.com25
    HKNetpop3.hknet.com110smtp.hknet.com25
    Google GMAILpop.gmail.com110995smtp.gmail.com25465imap.gmail.com143993
    雅虎電子郵件
    Yahoo Mail
    pop.mail.yahoo.com
    pop.mail.yahoo.com.hk
    110995smtp.mail.yahoo.com
    smtp.mail.yahoo.com.hk
    25465imap-ssl.mail.yahoo.com993
    Ymailpop.mail.yahoo.com110995smtp.mail.yahoo.com25465imap-ssl.mail.yahoo.com993
    Ymail Plusplus.pop.mail.yahoo.com110995plus.smtp.mail.yahoo.com25465imap-ssl.mail.yahoo.com993
    Hotmailpop3.live.com110995smtp.live.com25
    163 網易郵箱pop.163.com110995smtp.163.com25465imap.163.com143993
    QQ 郵箱pop.qq.com110995smtp.qq.com25465imap.qq.com993
    新浪網郵箱
    SinaMail
    pop3.sina.com.hk110------


    *** The above information is for reference only, Please seek independent technical advice if found necessary.

  • What is mail policy and email limits?

    What is mail policy and email limits?


    Mail Limits

    There is an maximum amount of emails which can be send out per hour is 30 emails from one account or 300 emails per domain and 700 emails per day, this limit is also applied "Web Hosting Service", "Towards Mailing Lists" and "Online E-Store System". Focus Network Company reserves the violation of any of the foregoing may result in immediate deactivate or termination upon any indication of such activity without notice.

    Many of our servers have a 60 pop checks per hour limit per email address.? If you go over this you're likely to get a wrong password error message saying login incorrect. Just wait an hour and it will automatically unlock you. to prevent this from happening again make sure to disable auto checking or at least set it to something higher such as 10 minutes.

    Any mailing list larger than 2000 will require a dedicated server solution from us. Note: dividing one large list into smaller lists to get below this limit is not allowed.

    We have a maximum size of emails of 50 MByte and under, any email over 50 MByte will be automatically rejected, please use your FTP to transfer big files!

    Mailing Lists Rules

    1. Anytime you're sending a message no matter how large your e-mail list is you must throttle it.? We recommend you throttle it to at the very least sending 1 email every 6 seconds. If the mailing list software you're using does not allow you to throttle you must switch to something else. We recommend Mailman which can be found in your control panel under PLESK. If you do not throttle and you try sending let's say 1500 emails the server will try sending all 1500 in 1 second which is not possible. This will cause the server load to go very high and for the entire server to be sluggish until this process is completed. It is our job to keep the server up and running without being sluggish. Anyone who causes the servers load to go high will be suspended and the process will be terminated. If you choose not to throttle you will most likely be suspended for crashing the server without notice.

    2. Any mailing list over 100 emails is only allowed to be sent to during off-peak times to prevent high server loads. Off peak times qualify as all day Saturday and Sunday, and 1am - 8 am eastern time M-F.

    3. You are not allowed to mail to a mailing list you were given or purchased. This is spamming because they never agreed to you personally sending them mail. We do not care and how you justify it this is spam and will result in termination of the offending account.

    4. Any unsolicited e-mail being sent will result in termination of the offending account without notice. We take a zero tolerance stance against sending of unsolicited e-mail.



    *** The above information is for reference only, Please seek independent technical advice if found necessary.

More...

Knowledge Base Search

Type your question here. If no result are found, try more general search words. For Example: instead of "Email Account" try "Email".

If you did not find the Knowledge Base you were looking for, please try our FAQ

If you would like to know more about our services
please contact us immediately!

Contact Us

News & Events

Business Transformation Notice

2022 Chinese New Year Holiday Notice

2021 Chinese New Year Holiday Notice

2020 Chinese New Year Holiday Notice

2019 Chinese New Year Holiday Notice

New Article

Payment Method

Bank Deposit / ATM
Mailing Cheque
Credit Card

ec2Biz.com Interactive Multimedia Ecommerce Web Hosting Online Shop Domain name Solutions
© Focus Network Company. All Rights Reserved.