m |
m |
||
Line 1: | Line 1: | ||
{{#icon:security.png|cPanel Security}} | {{#icon:security.png|cPanel Security}} | ||
+ | <div align=justify>In '''Security''' section you can find information about how to make your site and your [http://myidealhost.com/hosting.shtml hosting account] more secure. Some of these features include shell access, leech protection, hot link protection, and more. | ||
---- | ---- | ||
− | {{#icon:password-protect-directories.png|Password | + | {{#icon:password-protect-directories.png|Password Protect Directories in cPanel}} |
+ | '''Password Protect Directories''' allows you to restrict access to certain parts of your website. | ||
---- | ---- | ||
{{#icon:IP-deny-manager.png|IP Deny Manager in cPanel}} | {{#icon:IP-deny-manager.png|IP Deny Manager in cPanel}} | ||
+ | '''IP Deny Manager''' is capable of blocking a single IP address or a range of IP addresses. | ||
---- | ---- | ||
{{#icon:SSL-TLS-manager.png|SSL/TLS Manager in cPanel}} | {{#icon:SSL-TLS-manager.png|SSL/TLS Manager in cPanel}} | ||
+ | '''SSL/TLS Manager''' allows you to manage SSL/TLS keys, certificates, and signing requests. These features are intended to make your website more secure. | ||
---- | ---- | ||
{{#icon:SSH-SHell-Access.png|SSH/Shell Access in cPanel}} | {{#icon:SSH-SHell-Access.png|SSH/Shell Access in cPanel}} | ||
+ | '''SSH/Shell Access''' allows you to connect to your server remotely. | ||
---- | ---- | ||
{{#icon:hotlink-protection.png|Hotlink Protection in cPanel}} | {{#icon:hotlink-protection.png|Hotlink Protection in cPanel}} | ||
+ | '''Hotlink Protection''' allows you to prevent other websites from stealing bandwidth. | ||
---- | ---- | ||
{{#icon:leech-protect.png|Leech Protect in cPanel}} | {{#icon:leech-protect.png|Leech Protect in cPanel}} | ||
+ | '''Leech Protect''' allows you to prevent users from sharing passwords publicly. | ||
---- | ---- | ||
{{#icon:GnuPG-keys.png|GnuPG Keys Security}} | {{#icon:GnuPG-keys.png|GnuPG Keys Security}} | ||
+ | |||
+ | These features allow create and manage '''GnuPG keys''', that use the “public key approach” to encryption.</div> |