Security

m
m
 
Line 1: Line 1:
 
{{#icon:security.png|cPanel Security}}
 
{{#icon:security.png|cPanel Security}}
  
 +
<div align=justify>In '''Security''' section you can find information about how to make your site and your [http://myidealhost.com/hosting.shtml hosting account] more secure. Some of these features include shell access, leech protection, hot link protection, and more.
 
----
 
----
{{#icon:password-protect-dirrectories.png|Password Protected Dirrectories in cPanel}}
+
{{#icon:password-protect-directories.png|Password Protect Directories in cPanel}}
  
 +
'''Password Protect Directories''' allows you to restrict access to certain parts of your website.
 
----
 
----
 
{{#icon:IP-deny-manager.png|IP Deny Manager in cPanel}}
 
{{#icon:IP-deny-manager.png|IP Deny Manager in cPanel}}
  
 +
'''IP Deny Manager''' is capable of blocking a single IP address or a range of IP addresses.
 
----
 
----
 
{{#icon:SSL-TLS-manager.png|SSL/TLS Manager in cPanel}}
 
{{#icon:SSL-TLS-manager.png|SSL/TLS Manager in cPanel}}
  
 +
'''SSL/TLS Manager''' allows you to manage SSL/TLS keys, certificates, and signing requests. These features are intended to make your website more secure.
 
----
 
----
 
{{#icon:SSH-SHell-Access.png|SSH/Shell Access in cPanel}}
 
{{#icon:SSH-SHell-Access.png|SSH/Shell Access in cPanel}}
  
 +
'''SSH/Shell Access''' allows you to connect to your server remotely.
 
----
 
----
 
{{#icon:hotlink-protection.png|Hotlink Protection in cPanel}}
 
{{#icon:hotlink-protection.png|Hotlink Protection in cPanel}}
  
 +
'''Hotlink Protection''' allows you to prevent other websites from stealing bandwidth.
 
----
 
----
 
{{#icon:leech-protect.png|Leech Protect in cPanel}}
 
{{#icon:leech-protect.png|Leech Protect in cPanel}}
  
 +
'''Leech Protect''' allows you to prevent users from sharing passwords publicly.
 
----
 
----
 
{{#icon:GnuPG-keys.png|GnuPG Keys Security}}
 
{{#icon:GnuPG-keys.png|GnuPG Keys Security}}
 +
 +
These features allow create and manage '''GnuPG keys''', that use the “public key approach” to encryption.</div>

Latest revision as of 08:25, 26 October 2012

rss feed for my website