ADSL BasicsAsymmetric Digital Subscriber Line (ADSL) is a form of DSL, a data communications technology that enables faster data transmission over copper telephone lines than a conventional voiceband modem can provide. It does this by utilizing frequencies that are not used by a voice telephone call. A splitter - or microfilter - allows a single telephone connection to be used for both ADSL service and voice calls at the same time. Because phone lines vary in quality and were not originally engineered with DSL in mind, it can generally only be used over short distances, typically less than 4km.
At the telephone exchange the line generally terminates at a DSLAM where another frequency splitter separates the voice band signal for the conventional phone network. Data carried by the ADSL is typically routed over the telephone company's data network and eventually reaches a conventional internet network. In the UK under British Telecom the data network in question is its ATM network which in turn sends it to its IP network IP Colossus
DNS SettingsThese are the basic DNS Settings required for ADSL
Please note that these normally are automatically configured by your router
Primary DNS 220.127.116.11
Secondary DNS 18.104.22.168
Third DNS 22.214.171.124
Primary DNS 126.96.36.199
Secondary DNS 188.8.131.52 We recomend that all ADSL customers set "Obtain a DNS server address automatically"
Excessive bandwidth usage
Username and Password (Stolen)Their are known exploits and hackers actively scanning insecure routers to obtain usernames and passwords. These are then used to steal bandwidth from the account. Webstorm can check if your account has been used without your permission, please contact our call centre for more information.
Wireless hijackingIf your router is wireless enabled, hackers in the nearby vicinity may be using your bandwidth for their own purposes, even if WEP or WPA is enabled.
Spyware,Malware,Viruses,TrojansAny of the PC"s connected to the Internet may be infected with the above causing your machine to become a zombie for sending spam or an instrument in sending denial of service attacks. Technology is now being employed to avoid detection by most Antivirus programs.
SolutionEnable WPA encryption if you are using wireless. Make sure you have newly updated virus and anti spyware software. Change your ADSL password via the ADSL usage stats page http://www.wispa2.co.za/usage/webstorm
Shaped vs UnshapedShaping is the act of giving one protocol (such as http) a higher priority than another protocol (such as p2p, VOIP).
It should be mentioned that Telkom controls the network shaping on the SAIX network. The shaped ADSL packages favor what Telkom considers to be "business protocols" over "non-business protocols." The protocols used for email, web browsing, and normal downloads accomplished with either a web browser or an FTP program are given priority over other protocols.
When the network is busy, protocols other than those mentioned here are treated as less important and, in effect, will simply operate slower. For most people, this doesn"t present a significant problem. However, for those who use their internet connection for things such as online gaming, international trading, VOIP, and other applications that use non-standard protocols, the effect is that the performance of their connection.
Unshaped packages treat all protocols the same and provide the best possible performance for online gaming and all other non-standard applications.
Webstorm Router Setup (White Billion 7300)Your ADSL router would have come with two data cables: one for your phone line (thin cream cable) and one for your computer (slightly thicker yellow cable).
Plug the thin cable into the ADSL enabled Telkom wall socket and into the back of your Webstorm Router.
If the modem is powered up then you should see the ADSL light flashing. Please wait for the light to stop flashing, once the ADSL light is steady, plug the yellow Ethernet cable into the network port on your computer and the other end of the cable into your Webstorm modem LAN 1.
Once you have completed the above please contact the Webstorm call centre, and one of the agents will remotely configure your Router.
If you are using your ADSL line for the first time please inform the Webstorm Agent, as your line may need to be verified.
Mecer Router Setup* Open Internet Explorer and type in the address bar 192.168.1.1 and press enter * Enter the Username and Password in the login box. * Username: admin * Password: admin * This will bring you to the setup page, click on "Quick Configuration"
Enter the settings that are displayed below. "Quick Configuration"
- ATM Interface: 0
- VPI: 8
- VCI: 35
- Enter your Webstorm ADSL username and password
- Click "Submit" when done.
- Thereafter click on "Admin".
- Click on "Commit & Reboot".
- Scroll to the bottom and click "Commit".
- You can now restart your router.
Please remember to change the default admin password
Option 1 (Via Website)Step 1 Go to www.webstorm.co.za
Step 2 Click on Customer zone
Step 3 Click on ADSL Usage Stats
Step 4 Login Using your ADSL username and Password
Step 5 Click on ADSL Topup
Step 6 Follow the topup instructions
Web topups from this interface can only be done once a month, for all other top ups please contact our support department on 0861 101 527 or mail firstname.lastname@example.org to do a top up for you.
Option 2 (Email / Fax)Email or fax our support department with your top up size and ADSL account username
Email : email@example.com
Fax : 0865226989
Option 3 (Credit Card)This feature allow online payment for Additional Topups
Step 1 click here
Step 2 Select ADSL cap size
Step 3 Agree to the terms and conditions
Step 4 Insert your credit Card details
Note : Once you have activated a topup on your account, you may need to restart your ADSL router. If you do not have a power button please unplugging the power from the router for 2 sec.
View ADSL UsageStep 1 go to www.webstorm.co.za
Step 2 Click on Customer zone
Step 3 Click on "ADSL Usage" Stats
Step 4 Login Using your ADSL username and Password this will route you to the usage report that is displayed in a graph format.
In this console you will have acsess to previous ADSL usage, option to change your ADSL password, Network notices and Topup features.
ADSL Line TransferIf you have existing ADSL you can transfer the line to Webstorm at no cost.
This will allow Webstorm to
- Upgarde/Downgrade your line speed faster.
- Manage any faults via our call centre (No need to contact Telkom)
- Advanced ADSL line testing via your local Telkom exchange (Sync testing)
Transfer can take up to 1 week
ADSL Email SettingsAll ADSL accounts come with 1 e-mail address included in the package, in the format @webstorm.co.za to obtain your e-mail addresses fax the Webstorm NCC (National Call Centre) on 0866738633.
Our e-mail service comes with POP and SMTP access as well as webmail in instances where you may not have access to your own computer.
Webstorm Mail settingsIncomming Mail Server (pop3): mail.webstorm.co.za
Outgoing Mail server (smtp) : smtp5.webstorm.co.za
Webmail : www.webstorm.co.za/webmail
- You need to be an existing telephone subscriber or order a telephone line at the same time
- Your exchange must be DSL enabled
OrderingYou need to complete and sign the relevant order form supplied in the link below, confirming that you have read, understood and accepted the terms and conditions.
Once completed please fax to 0865226989
ADSL SecurityYour Webstorm ADSL provides a fast, always-available connection to the Internet. However, connecting to the Internet comes with the risk of intrusions from malicious users.
One difference between conventional dial-up Internet connections and DSL connections is that users are likely to spend more time online, mostly due to the "always available" nature of the service. Your PC can therefore be connected to the Internet 24 hours a day for many days at a time. The longer your PC is connected to the public Internet, the longer your PC is a target for malicious users elsewhere on the Internet.
Fortunately there are a number of measures you can take to minimise these intrusions.
- Disable file-sharing on Microsoft Windows platforms if not needed.
- Install a software firewall.
- If you have a home or Business network, consider installing a hardware firewall.
- Install a virus-checking program such as Norton or McAfee Anti-Virus and ensure your virus database is up to date. Scan all downloads and attachments.
- Regard any email attachments cautiously as they may contain viruses or malicious scripts.
- Use "strong" passwords of at least 7 characters in length. Mix upper and lower cases, and try not to use dictionary words. Passwords that are made up of common words or names and separated by numbers are not good examples of secure passwords.
- Unplug your router when you are away for long periods of time (i.e. on Holiday).
- Network Address Translation (NAT) can be used to hide PCs internal to your network. NAT functionality is available when using Microsoft Internet Connection Sharing (ICS), a hardware firewall, or an DSL modem with built-in router and PPPoE functionality.
- To ensure that your modem is secure from hackers or malicious users you should change the Supervisor/admin ID and Password
- If you are using the wireless feature on your ADSL modem, make sure wireless security is enabled like WPA.
3G/HSDPA Mail SettingsAll 3G/HSDPA accounts come with 1 e-mail address included in the package, in the format @webstorm.co.za to obtain your e-mail addresses fax the Webstorm NCC (National Call Centre) on 0866738633
Our e-mail service comes with POP and SMTP access as well as WEBMAIL in instances where you may not have access to your own computer.
Webstorm 3G/HSDPA Mail settings
Incomming Mail Server (pop3): mail.webstorm.co.za
Outgoing Mail server (smtp) : smtp13.webstorm.co.za
Webmail : www.webstorm.co.za/webmail
Email SettingsAll Webstorm accounts come with 1 e-mail address included in the package, in the format @webstorm.co.za to obtain your e-mail addresses fax the Webstorm NCC (National Call Centre) on 0866738633.
Our e-mail service comes with POP and SMTP access as well as webmail in instances where you may not have access to your own computer. Webmail : www.webstorm.co.za/webmail
Webstorm 3G/HSDPA Mail settingsIncomming Mail Server (pop3): mail.webstorm.co.za
Outgoing Mail server (smtp) : smtp13.webstorm.co.za
Webstorm Wireless-FX Mail settingsIncomming Mail Server (pop3): mail.webstorm.co.za
Outgoing Mail server (smtp) : smtp10.webstorm.co.za
Webstorm ADSL Mail settingsIncomming Mail Server (pop3): mail.webstorm.co.za
Outgoing Mail server (smtp) : smtp5.webstorm.co.za
IS DSL Mail settingsIncomming Mail Server (pop3): mail.webstorm.co.za
Outgoing Mail server (smtp) : smtp4.webstorm.co.za
IBurst Mail settingsIncomming Mail Server (pop3): mail.webstorm.co.za
Outgoing Mail server (smtp) : smtp9.webstorm.co.za
How to use FTPFTP (File Transfer Protocol) is the simplest way to exchange files between computers on the Internet. FTP is commonly used to transfer web page files from their creator to the computer that serves the pages to everyone on the Internet. It's also commonly used to download programs and other files to your computer from other servers.
An FTP client is the desktop application in your computer that actually does the transferring of data (or files).
FTP can be used with a command line interface (for example, from the Windows MS-DOS Prompt window) or with a commercial program that offers a graphical user interface such as FileZilla or CuteFTP. Some web browsers, such as Microsoft Internet Explorer, can also be used for FTP purposes.
To FTP to your account you require at least:
- A host name: (the domain name or server IP address)
- FTP username (as per KonsoleH)
- FTP password (as per KonsoleH)
- Using port 21
Example connection:Setting up your Microsoft Internet Explorer version 6 to work with FTP:
- Open Internet Explorer
- Enter the FTP address in the address bar:ftp://www.your-domain.com/public_html/
- Enter your FTP username and password when prompted
- Once connected, files can be transferred by dragging them to the Internet Explorer window, or alternatively, by copying files and pasting them in the Internet Explorer window
(where 'your-domain.com' is the name of your registered domain with Webstorm)
To upload site content using Microsoft Internet Explorer version 7, you need to make use of Windows Explorer by doing the following:
- Right click on the Windows 'Start' button
- Select 'Explore'
- Enter the FTP address in the address bar: ftp://your-domain/public_html/
- Enter your FTP username and password when prompted and click on 'Log on'
(where 'your-domain.com' is the name of your registered domain with Webstorm)
Once logged in, the current site content on the server will be displayed. You can then copy and paste your new files to this location.
- Once logged into your account, you are able to view the root (home) directory. The publicly visible web files for your account should NOT be placed into the home directory.
- All files intended for public viewing must be placed in the 'public_html' directory. Be careful not to delete this folder (it's actually a symbolic link). You will otherwise be prevented from accessing the contents of your web site.
- Should you not be able to see the 'public_html' link, use the full path (/user/www/users/your-ftp-login) to your web files as the destination folder. In any directory, the server looks for default files named:
- index.php (PHP only activated on a Basic account or better)
- The main page must be named 'index.html' (lower case).
- The home directory of your account contains two other important folders - the web log folder (www_logs) and the mailbox folder (users). Web logs can be retrieved form the 'www_logs' folder via FTP. The 'users' folder is best left untouched. It contains email contents that is used by the email system.
- Binary transfer mode must be selected to transfer image files (for example .gif, .jpeg).
- Ascii mode should be used to transfer files that are readable as normal text (html, cgi). Failure to properly select ASCII or Binary is a common cause of broken images and inoperative image maps and CGI scripts.
- Acceptable naming convention: Our Linux servers are case sensitive. In other words, the file name 'faq.html' in NOT the same as 'FAQ.html'. Incorrect link references will result in a 'File Not Found' error. This applies to directory names as well. To prevent errors, we suggest naming all files in lowercase. Apart from the underscore character ('_'), spaces and special control characters (! @ # $ % ^ & ; * : ' ~) are not permitted.
SA vs GermanyWebstorm's customers can experience the full benefit of hosting internationally - low bandwidth costs and increased monthly traffic - while still retaining the advantages of Webstorm’s local support and technical expertise.
Highly developed Internet infrastructures and competitive market conditions make bandwidth prices in Germany extremely cost effective.
The cost of bandwidth in South Africa is slowly decreasing. Wherever possible, Webstorm passes on these cost saving benefits to our customers, ensuring very competitive rates relative to local market conditions.
Transferring your hosting package to our German hosting location is a good decision if:
- Your website generates high volumes of traffic, resulting in an escalation of costs.
- Your website is targeted at reaching an international market.
Domain TransferWhen you change hosting companies, your domain name Registrar must be given the necessary information to redirect traffic to your new hosting location. Once your domain name registration record is updated to reflect Webstorm's network (domain name servers), you can start enjoying the full benefits associated with your Webstorm hosting account.
KonsoleH™konsoleH™ merges all service administration tools into a single, integrated management system that enables you to manage your web space with greater efficiency and accessibility.
The award-winning, proprietary control panel was implemented to empower our customers with greater control and easy access to a wide range of tools and systems to manage their hosting account. You can access konsoleH™ by clicking on ‘Control Panel under Customer Zone on the main Webstorm Site’ To login, simply use your Domain Name and FTP password.
The benefits of konsoleH™
- Convenience and efficiency through self-service.
- konsoleH™ is an undiluted, purpose-built control panel that is designed for speed and clean function rather than the graphically intensive design of its contemporaries that compromise on download speed, particularly in an encrypted (secure) environment.
- konsoleH™ makes technical functions more accessible to computer-literate individuals while sophisticated technical procedures are easily available to the technical-savvy system engineer who would otherwise not have access to functions that require root/administrator access.
Domain RenewalAll customers with domains registered through Webstorm will receive renewal reminders. For your convenience, we will automatically renew your domain on your behalf, adding the renewal fee to your invoice, unless you instruct us otherwise.
What is PhPPHP is a powerful, server-side scripting language that can be used to extend the functionality of your pages in many ways. It is available for use with Basic Accounts and higher, and is invoked by naming the files that use it with the following extensions:
The syntax of PHP is very similar to popular programming languages such as C and Perl. If you have any previous programming experience, it is likely that you'll be able to pick up PHP in short order. No one tutorial could ever cover the hundreds of built-in PHP functions, so we highly recommend following and reading over the related links given at the bottom of this article.
PHP is embedded within a page by enclosing commands within the start tag
Normal HTML tags and text cannot be included within blocks of PHP code. You can output HTML code from within a PHP block to the browser by using the echo command as shown above, or by ending the PHP block, outputting your HTML, and starting a new one. You can include as many separated blocks of PHP code in your file as you need, and any variables you set will be available to the block it was set in, and any block below that.
What is MySQLMySQL is a true multi-user, multithreaded SQL (Structured Query Language) database server. MySQL is most commonly used for Web applications and for embedded applications and has become a popular alternative to proprietary database systems because of its speed and reliability.
MySQL is an open source RDBMS (Relational Database Management System) that relies on SQL for processing the data in the database. MySQL provides APIs (Application Programming Interface) for the languages C, C++, Eiffel, Java, Perl, PHP and Python.
One of the fastest SQL (Structure Query Language) database servers currently on the market is the MySQL server. It is our preferred solution for those holding Basic Accounts or higher, who need databases to drive their web sites.
ADSIActive Directory Service Interfaces is developed by Microsoft and gives developers access to multiple directory service providers through an open set of interfaces. Applications written to ADSI will work with any directory service that offers an ADSI provider.
ASPActive Server Pages (ASP) is the way for programmers to link and build web applications. The scripts are embedded in HTML forms and can be written in any language allowing for versatility for development. The use of ASP allows the pages to be dynamic, which means the page can be completely customizable for the user. The client is not able to see the ASP script because it is executed on the server side.
ASP.NETASP.NET is A set of web development technologies that enable programmers to build web applications and XML web services.
ATLActive Template Library is a set of prepackaged program routines for use when creating Active Server Page code and other Active X program components with C++.
CC is a low-level standardized programming language for use on the UNIX operating system. It has since spread to many other operating systems, and is one of the most widely used programming languages.
C++This object-oriented programming (OOP) language is the best language for creating large-scale applications. C++ is a superset of the C language.
C#C# is an ECMA-compliant programming language deisgned to support .NET development.
CSSCascading Style Sheets is a standard stylesheet language for describing the presentation of a document written in a markup language like HTML or XHTML. CSS can be applied to any application of XML as well, such as SVG or XUL. The CSS specifications are maintained by the World Wide Web Consortium (W3C).
COMComponent Object Model is an open standard that specifies how components work together and interoperate. COM is used as the basis for Active X and OLE. The use of the COM API ensures that a software object can be launched within an application using a wide variety of programming languages.
COM+COM+ is an extension of COM. COM+ introducs an improved version of SPM (In-Memory Database). It also provides an asynchronous event service for generating events in multiple clients. And it uses the MSMQ services more transparently. It also automates load balancing when multiple servers are involved in an application.
Crystal ReportsCrystal Reports is a business intelligence application used to design and generate reports based on a wide scale of data sources like Microsoft SQL Server, Microsoft Access, MySQL and Oracle, Microsoft Excel, text files, groupware applications and other data source accessible through ODBC or OLAP.
DCOMDistributed Component Object Model is an addition to COM that facilitates the transparent distribution of objects over networks and over the Internet.
HP OpenviewIT os resource management software from Hewlett Packard. It is similar to IBM's Tivoli.
HTMLHypertext Markup Language (HTML) is a coded format language used for creating hypertext documents on the World Wide Web. HTML is a set of ?markup? symbols inserted in a file that tells the web browser how to display a Web page?s format. Almost every Web page is coded with HTML.
HTTPSHypertext Transfer Protocol over Secure Socket Layers (HTTPS) is a protocol developed to enable secure e-commerce transactions. High Grade RC4 128 Bit Encryption Technology allows credit card data and other sensitive information to be transferred over the World Wide Web safely.
IBM Lotus NotesLotus Notes is a proprietary, client-server collaborative database and email system.
IBM TivoliTivoli is a systems management platform from IBM which allows for remote system administration, configuration, and software installation.
IMAPInternet Message Access Protocol is an application layer Internet protocol used for accessing email on a remote server from a local client.
JSPJavaServer Pages (JSP) allows for rapid web development that is dynamic, easily maintainable, and full of information. JSP separates the user interface from content generation, which leaves the ability to change page output while maintaining the underlying dynamic content.
J2EEThe Java 2 Platform, Enterprise Edition (J2EE) defines the standard for developing multitier enterprise applications.
The J2EE platform simplifies enterprise applications by basing them on standardized, modular components, by providing a complete set of services to those components, and by handling many details of application behavior automatically, without complex programming. The J2EE platform takes advantage of many features of the Java 2 Platform, Standard Edition (J2SE), such as "Write Once, Run Anywhere" portability, JDBC API for database access, CORBA technology for interaction with existing enterprise resources, and a security model that protects data even in internet applications. Building on this base, the Java 2 Platform, Enterprise Edition adds full support for Enterprise JavaBeans components, Java Servlets API, JavaServer Pages and XML technology. The J2EE standard includes complete specifications and compliance tests to ensure portability of applications across the wide range of existing enterprise systems capable of supporting the J2EE platform. In addition, the J2EE specification now ensures Web services interoperability through support for the WS-I Basic Profile.
LDAPLDAP is the IETF designed and specified the Lightweight Directory Access Protocol makes use of X.500 directories and defines a relatively simple protocol for updating and searching directories running over TCP/IP.
Lotus Notes APIProvides a platform and version independent method of accessing Notes data and services.
Macromedia FlashMacromedia Flash is an application published by the Macromedia Company. It is a popular authoring software and is used to create vector graphics-based animation programs with full-screen navigation interfaces and illustrations. Macromedia Flash gives much more creative room than HTML, but requires a Flash plug-in on the computer running it. Most newer browsers automatically come with Flash.
MAPIMessaging Application Programming Interface allows client programs to become (electronic mail) messaging-enabled, -aware, or -based by calling MAPI subsystem routines that interface with certain messaging systems and message stores.
MFCMicrosoft Foundation Class Library is a collection of generalized definitions used in object-oriented programming that can be used in building application programs.
Microsoft Exchange Microsoft Exchange Server is a collaborative software server. The use of Microsoft Exchange is very widespread in large corporations using Microsoft infrastructure solutions.
Microsoft AccessAccess is a database software provided by Microsoft and is the bestselling database in the world because it comes bundled in Microsoft Office? Products. Access is noted for its friendly user interface and ease of use. It is great for working on small to medium size applications.
MIMEMultipurpose Internet Mail Extensions is an Internet Standard for the format of e-mail. Virtually all Internet e-mail is transmitted via SMTP in MIME format.
MySQLMySQL or ?My Structured Query Language? is a relational database language. MySQL is the most popular open source language in the world for adding, accessing, and processing data in a database. It is extremely fast, easy to customize and reliable due to its structure though most agree that it works best when managing content and not executing transactions.
.NET Microsoft® .NET is a set of Microsoft software technologies for connecting information, people, systems, and devices. It enables a high level of software integration through the use of Web services?small, discrete, building-block applications that connect to each other as well as to other, larger applications over the Internet.
.NET is infused into the products that make up the Microsoft platform, providing the ability to quickly and reliably build, host, deploy, and utilize connected solutions using Web services, all with the protection of industry-standard security technologies.
Active XActive X is a Microsoft technology for software componentry. It is used to enable cross-software communication.
OracleOracle is a relational database management system developed and copyrighted by the Oracle Corporation. An Oracle database, is a collection of data managed by an Oracle database management system or DBMS.
POPPost Office Protocol is an application layer Internet standard protocol used to retrieve email from a remote server to a local client over a TCP/IP connection. Nearly all individual Internet service provider email accounts are accessed via POP3.
RDBMSRelational Database Management System that is based on the relational model as introduced by Edgar F. Codd.
SMTPSimple Mail Transfer Protocol is the de facto standard for email transmission across the Internet.
SQLStructured Query Language is a standard interactive and programming language for getting information from and updating a database.
Windows APIWindows API is a set of application programming interfaces available in the Microsoft Windows operating systems.
XMLExtensible Markup Language is a simple, very flexible text format derived from SGML (ISO 8879). Originally designed to meet the challenges of large-scale electronic publishing, XML is also playing an increasingly important role in the exchange of a wide variety of data on the Web and elsewhere.
XSDXML Schema Definition is an instance of an XML schema written in the XML Schema language. An XSD defines a type of XML document in terms of constraints upon what elements and attributes may appear, their relationship to each other, what types of data may be in them, and other things.
XSLExtensible Style Language is a style sheet language aimed at activities such as rearranging the document that are not supported by CSS, though XSL and CSS share the same underlying concepts. XSL can be used to style XML documents u sing sets of rules and definitions of actions to be applied. XSL is a specification from the W3C.
XSLTExtensible Style Language Transformations is an XML-based language used in conjunction with specialized processing software, for the transformation of XML documents.
What is SSLSSL allows a web browser or client to authenticate the existence and identity of a website using digital keys and certificates. It also allows for all information that it sends to be encrypted, ensuring that information cannot be intercepted while in transit.
SSL does not include software to process credit card transactions. Although you can securely receive credit card information through SSL, actual processing of the credit card will require a 'Merchant Account' from an accredited financial institution.
If you are creating a web-based form where you want the visitor to enter data and submit the form to the web server for processing, you may want to use SSL encryption. This is especially true if you are entering credit card numbers or other sensitive information.
When using SSL, as the data is transmitted from the client's browser to the web server, all information on the form is encrypted. Once it is received at the web server it is automatically decrypted, and you can then store it or process it as usual on the web server.
What is Sun ASPSun Java System ASP is a licensed Web server plug-in which provides full ASP (Active Server Pages) support for a variety of Web servers (for example Apache and Java System Web Server 6) running on a number of operating systems (for example Linux, Sun Solaris and Win NT / 2000).
Sun Java System ASP supports the following Microsoft standards: ASP 3.0, MS VBScript 5.5, MS Jscript 5.5 and MS ADO 2.0. As a result of this standard compliance, ASP pages can be ported to Sun Java System ASP with little or no changes. Availability: Sun Java System ASP is only available with a Basic hosting package and higher on the shared hosting environment. It is not available on Managed Dedicated servers
What is SSHSSH (Secure Shell) is a protocol, which works much the same way as Telnet, for creating a secure connection between two computers. The secure SSH connection provides authentication and encryption to ensure that your password and all data sent and received during your session are kept safe.
What is eCommerceIn simple terms 'eCommerce' refers to trading on the Internet. If your website generates sales, 'eCommerce', in its simplest form, has occurred. The trading system can become more refined, reaching proportions of an online shopping cart, where any number of items can be selected for purchase and the consumer commits to pay either on receipt or an invoice, on order delivery, or immediately by credit card.
The consumer browses the Internet to the merchant's website and decides to purchase an item. The credit card details are received by an online transaction server in encrypted format. Once he has placed his order, the information moves through a private gateway to a processing network, where the issuing and acquiring banks complete or deny the transaction. This generally takes place in no more than 5-7 seconds.
Our servers support a number of eCommerce applications. osCommerce, an Open Source based online shop e-commerce solution, is available as an install from the konsoleH control panel of all Basic hosting packages and higher.
What is JSPJSP (JavaServer Page) An extension to the Java servlet technology from Sun that allows HTML to be combined with Java on the same page. The Java provides the processing, and the HTML provides the layout on the Web page.
Dynamic Web Pages in J2EEJSPs are the primary method in the J2EE platform for displaying dynamic Web pages. Special tags let Java code be included on the page as well as inserted into HTML statements without invalidating the HTML syntax. It thus lets non-Java programmers maintain HTML pages in their favorite authoring programs without interfering with the Java code on the page. With the use of standard and custom JSP tags, the Java code can be completely hidden (see JSTL and JSP tag).
From JSPs to Java ServletsAt runtime, the application server turns the JSP into a Java servlet (.jsp to .java file) using a JSP converter, which is a part of the servlet container. The servlet is then compiled into bytecode (.class) and run on the server like any other servlet.
The JSP can also call Enterprise JavaBeans (EJBs) for additional processing. JSPs are the Sun/Java counterpart to Microsoft's ASPs (Active Server Pages). See servlet and servlet container.
What Is TelnetTelnet is a protocol that allows you to connect to remote computers over a network, for example the Internet. Software known as a 'Telnet client is used to make a connection to the remote host.
Once your Telnet client establishes a connection to the remote host, your client becomes a virtual terminal, allowing you to communicate with the remote host from your computer.
Telnet clients are available for all major operating systems. Command-line Telnet clients are built into most versions of Windows, UNIX and Linux.
What is PostgreSQLPostgreSQL is an object-relational database management system that allows storage and retrieval of data according to variuos parameters given in a query. It has the features of traditional commercial database systems with enhancements to be found in next-generation DBMS systems.
PostgreSQL is free and the complete source code is available
Email SettingsAll Dial-up accounts come with 1 e-mail address included in the package in the format @webstorm.co.za to obtain your e-mail addresses fax the Webstorm NCC (National Call Centre) on 0866738633. Our e-mail service comes with POP and SMTP access as well as webmail in instances where you may not have access to your own computer.
Webstorm Dial-up Mail settingsIncomming Mail Server (pop3): mail.webstorm.co.za
Outgoing Mail server (smtp) : smtp.webstorm.co.za
Webmail : www.webstorm.co.za/webmail
ABC's of the NetViruses, Spam and Some Fun
- Virus filtering
- Junk mail filtering
- What is a computer virus?
- What can a virus do to my PC?
- How will I know my computer is infected with a virus?
- How do computers get infected by viruses?
- What is a worm?
- What is a trojan?
- Why do people create these things?
- Internet safety tips
- Handy Internet resources
- Some Fun
Webstorm takes your security very seriously. For some time now, we have been taking concrete steps to improve our members' online safety. We offer you the following:
Virus filtering:Most viruses are transmitted via e-mail. At Webstorm all incoming mail is automatically scanned for viruses - which helps to keep infected messages from reaching your mailbox. This service is provided free to Webstorm members!
Junk Mail Filtering:It isn't just viruses we try to keep out of your mailbox. We also scan all incoming e-mails for junk mail (also called spam) - unsolicited and sometimes offensive e-mails that flood the Internet. This service is also provided absolutely free of charge to Webstorm members. Every month we block over 15 million spam messages. You can control your Junk Mail Filter by simply visiting the Webstorm Message Centre. You can also alert Webstorm as to which mail you do not want to receive and we will filter it for you.
What is a computer virus?A computer virus is a set of instructions that infiltrates your computer and is designed to alter the way your computer works.
What can a virus do to my PC?This can range from simply slowing down your computer to damaging files, deleting information and crashing your computer. Viruses usually make programmes on your computer do things you don't expect them to.
How will I know my computer is infected with a virus?Many viruses don't call attention to themselves until it's too late. But often there are early warning signs such as unusual activity on your computer. The best way to tell if your PC is infected is to scan it with an up-to-date virus scanner.
How do computers get infected by viruses?You can get a virus by sharing disks, downloading an infected file from the Internet, visiting a web page carrying malicious code, starting (booting) your computer from an infected disk, opening infected Microsoft Word (and other) documents, or opening suspicious e-mail attachments
What is a worm?It's a small program that constantly reproduces itself, filling up hard drives and memory throughout a computer network until all resources are swamped.
What is a trojan?This is a hidden programme that opens a 'back door' into your computer system, which its creator can then access while you're online. It is often disguised as something harmless, such as a screensaver or a game, which is how it usually gets onto one's computer in the first place.
Why do people create these things?They could be seeking recognition, or they could be trying to steal data, or they may want to sabotage someone's computer out of spite or for financial gain.
Internet safety tips:
- Most importantly, install good anti-virus software - and keep it up to date, since new viruses come out all the time.
- If you use Outlook Express, open it now. On the toolbar at the top, click Tools, then Options, then Security. Tick the circle next to "Restricted sites zone", and tick the box next to "Warn me when other applications try to send mail as me". Now click the OK button. This makes it harder for worms or viruses to secretly mail themselves to everyone in your address book!
- Let your anti-virus software scan e-mail attachments before you open them, even if they have been sent by a friend. Don't open e-mail attachments from complete strangers.
- Be careful when using a public computer, e.g. at an Internet Cafe. Don't let people see your username or password ... and don't let Internet Explorer save your login details if it offers to do so.
- When using an Internet banking site, check that the address of the page where you enter your login details begins with https:// (i.e. make sure there's an "s" after the "http"), and that there is a closed padlock icon at the bottom of your browser window.
- If you transfer work on a stiffy disk between your home and office computers, be sure to scan the stiffy with anti-virus software.
Internet safety tips:
- If your computer is infected and you know the name of the virus, you may be able to download a quick fix for it. Click here to visit Webstorm's Security Services.
- Our Security Services site also offers additional safety tips and an opportunity to request e-mail advice on what to do if you're infected but you don't know what with.
- If you're often online for long periods of time, you may consider installing a programme known as a Firewall. To read more about firewalls, visit the MWEB Search page and type in "understanding firewalls".
- You could also take advantage of these free online anti-virus services
Trend Micro Housecall: click here.
Symantec Virus Detection: click here.
eTrust AV Web Scanner: click here.
Some funThe Internet is a place where you can express yourself like nowhere else. And this is where "smileys" or emoticons come in. They can be great fun, but don't overdo it - it could get seriously annoying for the person receiving your e-mail.
Here are a few smiley's for you to play with. If you don't get it, turn your head to the left. See the face?
:-} wry smile
:-P sticking tongue out
:'-( big tear
:-@ angry, yelling
:-X mute or big kiss
:-3 has eaten a lemon
:-* sorry, I didn't want to say that
?-( sorry, I don't know what went wrong