imageKandi imageKandi ::.
About cPanel

Home | Web Design | Web Hosting | Web Portfolio | Graphic Design | SEO

cPanel Features:

Operating System: Linux

Network | Security | Policies

How To:

How to Login to cPanel


List of cPanel Features:

Manage E-mail Accounts (Add, Remove, Change Password)
WebMail for all Accounts
Custom Mail Filtering
Mailing Lists (mailman)
Ability to Modify an MX Entry
Spam Filtering
Auto Responders
Webalizer Web Stats
Webalizer Ftp Stats
Analog Stats
AWStats - see sample (Example of Website Stats)
View Latest Visitors
View Bandwidth Usage
View Error Log
Download a raw log file
Manage FTP Accounts (Add, Remove, Change Password)
Anonymous FTP Controls
Ability to change FTP login message
Ability to kill FTP sessions
Site Tools
Web Protect (htaccess editor)
Ability to Change Site and FrontPage password
Custom Error Pages
Ability to Edit Mime Types
Ability to Edit Apache Handlers
Install FrontPage Extensions
Uninstall FrontPage Extensions
Search Engine Submit Tool
File Manager
Ability to Add/Remove Subdomains
Subdomain Redirects
Stats for Subdomains
Advanced Tools
SSH access
Manage GPG Keys
Cron Jobs
Pre-Installed CGI Scripts
Interchange Cart
Agora Cart
Bulletin Board
Java Chat
CGI Wrapper
Random HTML Generator
Advanced Guestbook
Counter Generator
Java Clock Generator
Java Countdown Generator
Secure FormMail clone
Entropy Search
Entropy Banner
Network Tools
DNS Lookup
Example of DNS Servers Setup
Database Management
Manage MySQL Databases (Add, Remove, Change Password, Add Access Hosts)
phpMyAdmin Access

Documentation on How to Use cPanel:

'Fantastico' package installed:

Supported Software
Supported Software Supported Software

Feature Packed Custom Hosting
Best Prices:

cPanel Standard
$5.00 /month
Space — 250MB
Plenty of space and
full power of cPanel

cPanel Business
$10.00 /month
Space — 500MB
Ever more space and
full power of cPanel

Still Need more space?
Get a Quote:

Custom hosting solutions available on request, to suit virtually any project requirements.



Our network architecture is a complete Cisco product and is a Cisco Certified Network. We utilize fully redundant Cisco 7500 (redundant routers and redundant cards within the router) at the core and state of the art 3550 L3 switch / routers as border routers. To further maximize redundancy we utilize distributed 2924 XL EN switches to ensure that single chasis failure will have minimum downtime effects on our servers. This approach gives us maximum power failure protection and switch failure protection to distribute the load and risk.

Prevention of Hijacking and Conflicts — We also utilize VLANS to prevent customer IP space hijacking and conflicts. By keeping our network as flat as possible — we minimize route convergence and latency in the backbone and speed the packets to the best provider through BGP4 on the core.

Major Backbone Providers — Our network is fully meshed and redundant with 6 major backbone providers. Our current network consists of a gigabit (1000mbit) to Abovenet, Allegiance, Aleron, Global Crossing, IBIS7, and Telia. By having providers with a larger burst capacity we're able to handle DoS attacks better than many of our competitors that have chosen many smaller pipes. We do not provision less than GIG circuits on the backbone any more. It also allows us plenty of room to fail back and forth from provider to provider without regards to where the traffic is going to prefer since any one of our links has far sufficient size to handle all of our traffic. We actively monitor our routers for key factors including temperature, cpu and memory utilization and monitor our connections for transit latency and uptime. We are notified immediately in the event of a process going out of tolerance or an outage through our automated systems which allows us to respond quickly with corrective action.

Our average uptime is 99.98% (Excellent).

Network Tech




High Security Alarm System
24hr. On-Site Security Personnel
24hr. Video Surveillance
Electronic Motion Sensors
Fire Suppressant System
Redundant Temperature Control
UPS Backup Generators
Standby Seismically-Braced Server Racks

We invest in some of the best technology and equipment available. The result is a secure and reliable server environment.

If you have any question please contact us:





As a provider of website hosting, and other Internet-related services, offers its clients, and their customers and users, the means to disseminate public, private, commercial, and noncommercial information. respects that the Internet provides a forum for free and open discussion and dissemination of information, however, when there are competing interests at issue, reserves the right to take certain preventative or corrective actions.

In order to protect these competing interests, has developed an Acceptable Use Policy ("AUP"), which supplements and explains certain terms of each customer's respective service agreement and is intended as a guide to the customer's rights and obligations when utilizing’s services. This AUP will be revised from time to time. A customer's use of’s after changes to the AUP are posted on’s website,, will constitute the customer's acceptance of any new or additional terms of the AUP that result from those changes.

One important aspect of the Internet is that no one party owns or controls it. This fact accounts for much of the Internet's openness and value, but it also places a high premium on the judgment and responsibility of those who use the Internet to disseminate information to others.

When information is disseminated through the Internet, they also must keep in mind that does not review, edit, censor, or take responsibility for any information its clients may create.

When users place information on the Internet, they have the same liability as other authors for copyright infringement, defamation, and other harmful speech. Also, because the information they create is carried over’s network and may reach a large number of people, including both clients and non-clients of, clients' postings to the Internet may affect other clients and may harm’s goodwill, business reputation, and operations. For these reasons, clients violate policy and the service agreement when they, their customers, affiliates, or subsidiaries engage in the following prohibited activities listed below.




Sending unsolicited bulk and/or commercial messages over the Internet (known as "spamming"). It is not only harmful because of its negative impact on consumer attitudes toward, but also because it can overload our network and disrupt service to other clients. Also, maintaining an open SMTP relay is prohibited. When a complaint is received, has the discretion to determine from all of the evidence whether the e-mail recipients were from an "opt-in" e-mail list. If it determined that your account blatantly has engaged in SPAM, you run the the risk of suspension or termination without notice. We also do not allow SPAM promoting websites (that includes software, e-mail list etc.)


Engaging in any activity that infringes or misappropriates the intellectual property rights of others, including copyrights, trademarks, service marks, trade secrets, software piracy, and patents held by individuals, corporations, or other entities. Also, engaging in activity that violates privacy, publicity, or other personal rights of others. is required by law to remove or block access to customer content upon receipt of a proper notice of copyright infringement. It is also’s policy to terminate the privileges of customers who commit repeat violations of copyright laws.


Because the Internet is a global communication tool, and we have clients from nearly every country in the world it is difficult to dictate what is considered "adult material." However, we do allow "Legal Adult Content" with restrictions. If you question the acceptance of any specific content, please contact us for approval.


Using’s network as a means to transmit or post defamatory, harassing, abusive, or threatening language is prohibited.


Forging or misrepresenting message headers, whether in whole or in part, to mask the originator of the message is a major violation.


Accessing illegally or without authorization computers, accounts, or networks belonging to another party, or attempting to penetrate security measures of another individual's system (often known as "hacking") is explicitly prohibited. Also, any activity that might be used as a precursor to an attempted system penetration (i.e. port scan, stealth scan, or other information gathering activity) is prohibited.


Background Daemons in general are prohibited on servers, including, but not limited to, IRC bots, warez sites and any other program that interferes with normal server operation. will be the sole arbitrator of what constitutes a violation of the above policy.


Distributing information regarding the creation of and sending Internet viruses, worms, Trojan horses, pinging, flooding, mailbombing, or denial of service attacks. Also, activities that disrupt the use of or interfere with the ability of others to effectively use the network or any connected network, system, service, or equipment.


Advertising, transmitting, or otherwise making available any software, program, product, or service that is designed to violate this AUP, which includes, but not limited to the facilitation of the means to spam, denial of service attacks, and piracy of software.


Exporting encryption software and other prohibited software over the Internet or otherwise, to points outside the United States.

USENET GROUPS reserves the right not to accept postings from newsgroups where we have actual knowledge that the content of the newsgroup violates the AUP.


Engaging in activities that are determined to be illegal, including advertising, transmitting, or otherwise making available ponzi schemes, pyramid schemes, fraudulently charging credit cards, identity theft and pirating software - all are explicitly prohibited.



It is very important that you monitor your resource usage (disk and bandwidth). If our system indicates you're over the allocated disk or bandwidth space you'll need to perform one of the following:

1. Clean up all unnecessary files (e-mail, etc.)
2. Upgrade Your Account

Our refund policy is quite simple. A refund will be given to any customer within 30 days of account activation no questions asked.

We hope this policy layout is helpful in clarifying the obligations of Internet users, including and its clients, as responsible members of the Internet.

Please contact us if you have questions or would like to make a suggestion.

Go To


Home l Web Design l Web Hosting l Web Portfolio l Graphic Design l Photography l Printing l SEO

Privacy and Terms of Use


Original Content. All Rights Reserved © 2000-2019
E-mail:, Tel: 310-430-8535