A file that resides in a specific directory, along with an .htaccess file. The .htpasswd file contains encrypted password information when authentication has been set up for the directory.
A rule that determines where email, delivered to a domain's main email account and meeting certain criteria, will be delivered. See also Filter.
A record for accessing privatized information. For example, your cPanel account lets you manage your website. In cPanel, other instances of the term “account” occur in email and FTP.
An additional domain name associated with your cPanel account. Each addon domain is stored in its own directory which you can configure. This allows you to manage multiple domains from a single cPanel account. Addon domains must be registered with a domain name registrar to work.
A program that provides information about the visitors to your website in both graphical and statistical views. More information about Analog can be found at its website: http://www.analog.cx/.
Anonymous FTP allows anyone to FTP files to and from your website without any access restrictions. We do not support anonymous FTP due to the potential misuse of anonymous user accounts for Warez, viruses, and other malicious files.
A process where by visitors without FTP accounts may upload and download files to and from your site. Although it poses security risks, anonymous FTP can be convenient if you wish to make files publicly available for downloading. When setting up anonymous FTP, it is important to protect any sensitive information by changing file permissions and directory access permissions.
A means of telling the Apache software how to process a given type of file. By default, Apache only handles certain file types. You can configure Apache handlers for other file types using cPanel. For more information, see Apache's handler documentation.
Apache HTTP Server is an open source HTTP web server for Unix platforms (BSD, GNU/Linux, and UNIX systems), Microsoft Windows, and other platforms. The Apache HTTP Server is developed and maintained by an open community of developers under the auspices of the Apache Software Foundation.
A program that receives requests from web browsers. It then responds by “serving” web pages to the browsers; for this reason, it’s called web server software.
ASP Upload is an ASP/.NET upload component you can use in your scripts. Please visit http://www.persists.com for more.
ASP.NET AJAX extensions have been installed on all web servers so you can take advantage of the latest AJAX features on your .NET-enabled web site.
ASPImage is an image manipulation component you can use to resize images on the fly and much more. For more, please visit http://www.serverobjects.com
ASPJpeg is an excellent on-the-fly image resize component for users of ASP and .NET. Please visit http://www.persists.com for more.
Microsoft's quickly growing replacement for ASP scripting, .NET, is a powerful scripting language allowing developers to incorporate programming from C, C#, VB, and other languages. Many newer off-the-shelf applications are now being built in ASP.NET instead of ASP, and it is a popular language among hardcore developers. Infuseweb supports .NET, .NET 2, and .NET 3.5 and this support is included in all hosting plans.
Now install the free ASP Poll polling system on your website as easily as clicking a button. ASPPoll enables you to create quick polls for visitors of your site. For more information click here to visit the ASP Poll web site.
Install a simple online photo gallery with just a single click. For more information, visit http://www.iloire.com/vbscript/online_photo_catalog_vbscript.asp
A process for confirming the identity of someone with whom you want to share sensitive information. On the web, authentication usually involves either a username and password set or a public/private key pair.
Auto responders allow you to automate replies to incoming email. In cPanel, this feature can be useful for confirming the receipt of mail, or for informing correspondents that the recipient is unavailable (for example, while on vacation).
When an email recipient is "Out of the Office" or "Away on Vacation" they often set up an automated reply message alerting the sender to this fact. Some auto-replies are setup at the server level while others take place in the person's email client
Autoresponders allow you to set up an automated response to any mail that comes into your POP mailbox. For example, when you go on vacation, you could turn your autoresponder on with a custom message saying "I'm out of town and will be back Monday". It's also useful for businesses that want to automatically let their customers know they've received a sales inquiry.
A program that provides information about the visitors to your website in both graphical and statistical views. More information about AWStats can be found at its website: http://awstats.sourceforge.net/.
B2B (business-to-business) companies that primarily sell products or provide services to other businesses
B2C (business-to-consumer) companies are those firms that sell products or provide services primarily to end-user consumers
Bounce email messages (or failed Delivery Status Notifications) erroneously sent to a domain whose name has been forged as the sender of spam. Using SPF on your mail server should reduce backscatter.
A copy of your website’s files, directories, databases, and email configurations. Keeping a backup copy of your website on your personal computer is a wise precaution.
The amount of information that can be transmitted over a network such as the Internet in a specific amount of time
The amount of data transferred to and from a web server. Every time a visitor views a file (whether it’s a web page, image, video, or audio file), that file has to be transferred to the visitor’s computer. Bandwidth is the total size of all these files transferred to your visitors’ computers. It is important to keep track of bandwidth usage, as it is limited by web hosts.
Images which appear on a website, often as advertisements at the top or bottom of a page. Often, banners alternate with each successive visit to the page.
Bayesian spam filtering is a method of filtering spam based on statistics. This method uses tokens, generally words, found in emails to determine whether or not an incoming message is spam. This filtering technique relies on Bayesian statistics.
Bayesian classifiers work by correlating the use of tokens (typically words, or sometimes other things), with spam and non spam e-mails and then using Bayesian statistics to calculate a probability that an email is or is not spam.
Blacklists are created lists of IP addresses belonging to organizations that have been identified as senders of SPAM or unsolicited commercial email. Blacklists are often used by ISPs and corporations as part of the filtering process that determines which IP addresses they prohibit from sending mail to their members/users
A list of email addresses from which incoming mail will be automatically blocked. cPanel automatically sends a configurable warning message upon receipt of mail from a blacklisted address. See also BoxTrapper Ignore List and Whitelist.
A list of email addresses from which incoming mail will be blocked. cPanel does not send a warning message upon receipt of mail from an ignored address. See also BoxTrapper Blacklist and Whitelist.
A list of email addresses from which incoming mail will automatically be accepted. See also BoxTrapper Ignore List and Blacklist.
An application included with cPanel that filters spam by requiring would-be senders to reply to a verification email (also known as challenge-response verification). Only after the sender is verified through the reply will his or her original email be accepted.
Formerly, a minor version of cPanel. (These are now referred to as Release Tiers).
Word usage that encourages a reader to take action. For example, "Click here to register for free seminar." or "Quickly signup for our free trial!" Marketers have found that explicit calls to action yield positive results.
An email marketing message or a series of emails designed to accomplish an overall goal. A marketer may have a campaign to drive more traffic to their website or to increase the awareness of a new product line.
The CAN-SPAM Act of 2003 (Controlling the Assault of Non-Solicited Pornography and Marketing Act) is a US federal law that establishes requirements for those who send commercial email. It establishes penalties for spammers and companies whose products are advertised in spam if they violate the law, and gives consumers the right to ask emailers to stop spamming them.
A Completely Automated Public Turing test to tell Computers and Humans Apart is used to determine whether or not the user is a real person or a computer. People are asked to type in a series of distorted images to prove that they are not a machine, since an automated computer program cannot decipher the letters within an image.
Catch-all allows you to set up a default mailbox that "catches" all mail that is sent to your domain, but not to a specific account you have created. So, if I send an e-mail to email@example.com, but joe doesn't have a POP3 mailbox or forwarder, that e-mail will go to the catch-all account. The catch-all account can be set up as either a physical POP3 mailbox, or forward mail to another mailbox. Catch-all accounts are well known spam traps so at this time we have disabled the use of catch-alls.
A Microsoft e-mail component we use with our IIS web servers. This component is slowly being phased out in favor of the newer CDOSYS component.
Microsoft's new implementation of their IIS web server mail component that can be used with any web-based scripts. This component is replacing the CDONTS mail component.
This is the maximum number of ColdFusion Data Source Names (DSNs) you can create to connect to your databases from your ColdFusion scripts.
A powerful and popular ColdFusion image resize component. Please visit http://www.kolumbus.fi/jukka.manner/ for more.
Users get their own personal CGI-BIN which allows you to put your executable scripts there. This is usually used with the Perl language.
Adobe's popular ColdFusion scripting language has been around for a while and is one of the easiest, adaptable scripting languages available today. Infuseweb now supports the newest version of Coldfusion, ColdFusion 8, which is more stable and has more features than ever before.
A community portal software allowing you to provide social network to customers. For more information, visit http://www.communityserver.org
With our SmarterMail e-mail software, you can easily define automated methods to handle incoming e-mail, such as forwarding, deleting, and organizing based on specific rules (such as specific words, domains, e-mail accounts, etc) using the built-in content filter of our webmail software.
The email address to which cPanel routes any email message sent to email accounts which do not exist at your domain. Also called a Default Address.
A protocol that lets a web server communicate with scripts and other software. cPanel’s CGICenter provides an array of CGI scripts that let you generate and manage useful features for your website, including a guestbook, clock, hit counter, countdown clock, and banner ads.
An automated message triggered by the receipt of an email for the purpose of identifying the sender as a trusted & real source. The challenge is a message to the sender of the email with instructions for how to validate themselves (often this involves a CAPTCHA test). If the sender provides a valid correct response, their email address is added to the recipient's list of trusted senders and their message is passed along to the recipient.
A routing method that assigns each Internet user to a four-part IP address, with each part separated by a decimal, followed by a slash and a number between 0 and 32.
Classic ASP (Active Server Pages) is an older, but still very popular Microsoft scripting language that allows you to create dynamic web pages, that is, web pages that can change based on dynamically changing data.
A means of communicating with a computer by typing commands. On Unix systems, this is also often called a shell.
An indicator of response to a specific email message, as measured by the percentage of recipients that click on a link included in the email. To determine the click-through rate, divide the number of responses/clicks by the number of emails sent (multiply this number by 100 to express the result as a percentage). Marketers will often benchmark their current click through rate with past click through rates to determine whether campaigns are
Any application that accesses a service on another computer. Web browsers such as Internet Explorer can be called web clients. FTP clients include FileZilla and Cyberduck.
The text/copy, graphics and images that comprise your email, website or marketing materials. Most marketers will spend a lot of time perfecting their content to ensure they can get the best possible results.
The number or percentage of recipients who respond to your desired action in a given email marketing campaign. This is the measure of your email campaign's overall success. You may measure conversion in sales, phone calls, appointments, traffic, etc.
In marketing, CPM commonly refers to the cost per 1,000 (one thousand) names on a given list or impressions served. For example, if you buy a list priced at $10 CPM, you would be paying $0.01 per email address.
Pieces of software that you can install on your website through cPanel. cPAddons provide useful tools to your website. Common examples include bulletin boards, chat programs, and online shopping carts.
The main repository of Perl modules, pieces of Perl software. The CPAN library (located at http://www.cpan.org) contains over 12,000 modules, most of which are free of charge. cPanel allows you to search CPAN and install Perl modules.
cPanel is the de facto standard for turning standalone servers into a fully automated point-and-click hosting platform. Tedious tasks are replaced by web interfaces and API-based calls. cPanel is designed with multiple levels of administration including admin, reseller, end user, and email-based interfaces. These multiple levels provide security, ease of use, and flexibility for everyone from the server administrator to the email account user.
Cron jobs allow you to run a certain command at times set by the job. For example, you could set a cron job to delete temporary files every week so that your disk space is not being used up by those files.
A powerful, free PHP/MySQL shopping cart that can easily be installed on your site with one click. For more information, visit http://www.cubecart.com.
curl is a command line tool for transferring files with a URL syntax.
Don't you just hate that nasty "Error 404" page that appears when you go to a page that doesn't exist on a website anymore? Custom Error Pages allows you to replace several default error page types with a better looking custom page of your own.
Create a powerful blogging application on your site with just one click. For more information, visit http://www.dasblog.info.
A command on a server, executed at regular intervals. These commands are stored in a Unix configuration file called crontab.
A request, which you send to a certificate authority, for an identity certificate. cPanel can generate a CSR for you, but since authorities vary with regard to the information they require, you should check their requirements before applying for a certificate.
A database is a collection of information stored in a computer in a systematic way so that a computer program can easily and quickly lookup information. For email marketing purposes, a database is the software that stores your mailing list. Your database may be in the following forms: MS Excel, Access, ACT!, Filemaker, GoldMine, Outlook, Outlook Express, Oracle, Salesforce or many other programs.
Dedicated SSL certificates allow you to have a web site that can handle secured transactions between the client's computer and your web site and are tailored to your domain name. For example, https://www.yourdomain.com is a dedicated SSL certificate. Whereas Shared SSL certificates are FREE with Infuseweb hosting and use a common SSL certificate for all web sites using it, a dedicated SSL certificate is unique to your site. Therefore, there is additional cost for the purchase of the unique certificate and the Static IP address that is required for your web site to utilized the dedicated SSL certificate. Infuseweb can easily set up a dedicated SSL certificate for you starting at just $99.95/year.
Dedupe or de-duplication refers to a data cleaning technique where duplicate data is removed from a set. For example, if you have a database with the same email address multiple times and you dedupe that data, the results will only have the address once.
The email address to which cPanel routes any email message sent to email accounts which do not exist at your domain. Also called a Catch-All Address.
A repository for files, analogous to a file folder on your personal computer. In website management, directories contain all of the files associated with your website.
Directory browsing allows you to display a list of all the files and folders in your site when a user visits your site. This may be useful if you are just hosting files for people to download and want to make it easy for them to find the files they need.
This is the TOTAL disk space you have available to your account. The TOTAL of all web files, e-mail, databases, etc across ALL web sites under your account must not exceed this amount. Additional disk space can be purchased as needed (prices are listed on this page). For reference, 1000 MB = 1 GB. This equates to roughly 500 high-quality photos.
Our DNS Zone Editor in the Helm control panel allows you to change your DNS Host Records such as A and MX records as needed. Infuseweb sets up your DNS host records automatically when you create your domain so it generally does not need to be adjusted. However, it is available should you need it.
This is the number of Domain aliases you are allowed on your domain. Domain Aliases are additional domain names associated with your main web site. So if your primary web site is www.yourdomain.com then an alias might be www.yourdomain1.com and would actually point to www.yourdomain.com.Â Domain aliases also forward e-mail from the domain alias to the corresponding account on the primary domain. So, if you have an e-mail account set up on your main domain called firstname.lastname@example.org then when someone sends and e-mail to your alias, which would be email@example.com, it would automatically be sent to firstname.lastname@example.org. You must register each domain name you wish to use as an alias with a domain registrar before you can use it.
This is the number of completely separate web sites (or domains) you may have simultaneously under your account. A web site is defined as an isolated set of web files, e-mail accounts, FTP, etc.
An e-mail alias allows you to create a "virtual" e-mail address that forwards messages to a physical mail account. For example, say you have a mail account set up at your ISP that you are used to using and want all your mail to forward there. Just set up an e-mail alias and it will forward mail from email@example.com to your ISP mailbox.
We constantly scan all incoming and outbound E-mail for potential viruses using our integrated anti-virus filters. This does not guarantee nor negate the need to ensure your own computer has anti-virus protection installed.
If you just want to have your e-mail forwarded to another mailbox, you can setup e-mail forwarders. Thus, if mail comes in to firstname.lastname@example.org and you want to send it to email@example.com you can do this with a forwarder. You can also choose to store and forward e-mail using a POP3 mail account.
The Exchange ActiveSync add-on uses direct push technology to automatically provide users with over-the-air access to all of their emails, calendars, tasks, and notes. Syncing SmarterMail with most smartphones—including the iPhone, Palm Pre, and Windows Mobile devices—is quick, easy, and automatic with Exchange ActiveSync. Benefits of syncing with Exchange ActiveSync include: Two-way syncing and push technology – The always-up-to-date feature of Exchange ActiveSync ensures any changes to collaboration data are automatically recorded in both SmarterMail and the mobile device in real time. One solution, comprehensive synchronization – Exchange ActiveSync seamlessly handles the real-time synchronization of email, folders, calendars, contacts, notes, and tasks in a single step. Speed – Exchange ActiveSync contains 18 patented methods that improve the speed and efficiency of syncing transmissions. More mobile devices – Numerous device and firmware manufacturers have embraced this technology, including Apple, Motorola, Nokia, Palm, Sony Ericsson, and Symbian, and it is already available on hundreds of different smartphones. Extended mobile battery life – Transmission time is the most power-intensive aspect of cell phone use. Because other sync methods have longer transmission times than Exchange ActiveSync, they dramatically consume battery life.
Due to security reasons, we do not permit users to their Infuseweb databases from their non-Infuseweb hosted websites. Websites hosted with Infuseweb may also not connect to databases hosted outside of Infuseweb for more than a short period for testing. For more information, please see our Acceptable Use Policy.
The component of the Internet which acts as a “phone book,” converting human-readable domain names (such as www.example.com) into computer-readable IP addresses (such as 126.96.36.199, in the case of example.com).
An anti-spam software application that uses a combination of public and private keys to authenticate the sender's domain and reduce the chance that a spammer or hacker will fake the domain sending address. This technology helps fight phishing.
The name you give your website, which will appear in your website’s URL and email addresses. Usually seen as example.com, where "example" is meant for your domain’s name.
An email authentication method that attempts to verify that a message actually came from the domain it appears to have come from.
"Double opt-in", also known as "closed-loop", provides an additional layer of security by requiring that email accounts be both subscribed and then verified by a confirmation email before they are added to the list. As a result, only those people with access to the account can respond to the confirmation message, which greatly reduces the chance of abuse. For this reason, double opt-in is regarded as the industry standard for email marketing.
A method of generating public and private keys for encrypting data. This algorithm was developed by the U.S. government.
Email blocking typically refers to blocking by ISPs or mail providers. Emails that are blocked are not processed through the ISP and are essentially prevented from reaching their actual recipient. ISPs actively block email coming from suspected spammers.
An application used to send, receive, store and view email. Popular email clients include Outlook, Mac Mail, Yahoo! Mail, Thunderbird, Hotmail, Gmail, etc.
An email newsletter is a message that is sent out to subscribers typically on a regular interval. Email newsletters may be sent daily, weekly, bi-weekly, monthly, or even annually. The content of email newsletters varies with each edition. Some email newsletters are so popular that they can sell advertising space.
Email Service Providers (ESPs) are companies like EliteEmail.com that offer a service enabling a user to send permission-based email marketing campaigns to their subscribers. They are usually software-as-a-service providers (saas) who offer their services in an online fashion, although there are desktop software solutions as well.
A script, included with cPanel, that lets you manage rotating banner images on your website.
A script, included with cPanel, that creates a search engine for your website.
These pages display warning messages when visitors encounter problems while trying to access your site. cPanel lets you configure the error messages that display for your site. For an in-depth look at HTTP error codes, please visit our HTTP error codes documentation.
An ezine is an electronic magazine emailed to a list of subscribers. In many cases, advertisers pay to have their ad (text or HTML) inserted into the body of the email. Buying ad space in an ezine, or sponsoring a specific article or segment allows an advertiser to reach a targeted audience.
Legitimate permission-based email that is erroneously and incorrectly blocked due to the limitations of current email blocking and filtering techniques. False positives are an industry wide problem. EliteEmail.com works closely with ISPs to prevent false positives.
Fantastico De Luxe is an amazing cPanel/PHP based Web application. It integrates with cPanel and gives you and your clients the ability to automagically install popular Open Source Applications. With Fantastico the installation procedure of all of the scripts takes only seconds and can be performed by novices without the need of setting up MySQL databases, importing structure, chmoding files and without the need of other tasks usually associated with installations.
Create a powerful information portal with this Wiki application with just one click. For more information, visit http://www.flexwiki.com.
For users of Microsoft FrontPage web design software and its later incarnations, you can enable FrontPage extensions on your website to support specific capabilities of FrontPage.
This is the TOTAL number of File Transfer Protocol (FTP) accounts you are allowed across ALL your web sits. To move files to your website, you need to use FTP. You do this with an FTP client such as FileZilla. Each Infuseweb website is automatically set up with an FTP account. Depending on the number of FTP accounts you are allowed, you can create additional FTP accounts for other users, and grant them read only, or write only privileges to specific directories within your web site FTP root. Infuseweb also supports Secure file transfer with FTP using Explicit SSL (if your FTP client supports it).
GD is an open source code library for the dynamic creation of images by programmers. GD creates PNG, JPEG and GIF images, among other formats. GD is commonly used to generate charts, graphics, thumbnails, and most anything else, on the fly.
FREE with the latest versions of our SmarterMail e-mail software, you can share your calendars, taks, and mailboxes with other users in your domain. This is similar to Microsoft Exchange but without the cost or complexity.
If you decide you're not happy with Infuseweb hosting within the first 30 days of signing up, we will refund your money at your request. For more information about our guarantee, please click here. DISCLAIMER: Money back guarantee does not apply to dedicated servers, VPS, or domain name registrations. If you purchased a plan with a free domain name, the cost of the yearly domain registration will be subtracted from your refund.
In cPanel, a tool that processes mail according to your preferences. For example, a filter can automatically discard spam or save mail from a specified sender to its own folder. In cPanel, filters can be applied to the main email account on a domain (Account Level Filters), or customized for each individual account (User Level Filters).
A specific size and style of type within a type family. The font of this text is Verdana. While there are lots of available today, only certain fonts are considered web-friendly.
A tool that lets you forward a copy of every email message you receive to another address. When a forwarder is set up, you will still receive mail at the original recipient address. If, however, you create a forwarder without first creating the original address, messages will be forwarded to the end address without being sent to the original address, as it does not exist.
The "from address " or "sender address " is part of the email header that shows the recipient the email address that sent the email. All email clients show the from/sender address when a message lands in your inbox. In most cases, clicking 'reply' will send the message to the from/sender address.
The "from name" or "sender name" is part of the email header that shows the recipient who (the person or company) sent the email. All email clients show the from/sender name when a message lands in your inbox.
A discontinued Microsoft® application that allows you to edit your web page in WYSIWYG (what-you-see-is-what-you-get) format, rather than using HTML code. cPanel provides FrontPage extensions, so you can publish your site using FrontPage, allowing you to skip the FTP process. Newer versions of FrontPage allow you to publish your site using FTP or WebDAV. See the FrontPage User Manual for more information about publishing.
A method of transferring files from one computer to another. cPanel comes equipped with an FTP server that can be configured to your preference. An FTP client must be installed on your computer in order to send files to and receive files from the FTP server. Some FTP clients include FileZilla (for Windows®, Linux, and Unix), and Cyberduck (for Mac®).
GESTUREprovides support for Microsoft Access databases. Microsoft Access is a popular, easy-to-use desktop database application. Microsoft Access database files (.mdb) can be used with web hosting as an inexpensive way to add a dynamic database-driven capability to your site. Infuseweb provides support for Microsoft SQL Server 2000 and 2005 depending on your plan. MS SQL Server is very powerful and highly recommended over Microsoft Access for high usage sites. You can easily create MS SQL databases through the Helm control panel and administer them by connecting from your desktop with Enterprise Manager or SQL Management Studio software (available free from Microsoft) or you can use our MyLittleAdmin online MS SQL editor. Infuseweb is proud to provide you with the MyLittleAdmin online editor for editing your MS SQL databases. You can edit data, create tables, manage relationships, and do almost anything you can do in SQL Management Studio but all online. For more information on MyLittleAdmin please visit www.mylittletools.com. Infuseweb provides support for MySQL 4 and MySQL 5 databases. MySQL is a powerful database that's becoming increasingly popular, especially with PHP users. This number reflects the number of MySQL databases you can create for your site. Your Infuseweb-hosted MySQL database can easily be created through the Helm control panel and edited through our PHPMyAdmin online database editor. This is the maximum number of Data Source Names (DSNs) you can create to connect to your databases. DSNs are a simple, "friendly" ways to call databases from your scripts. Our trouble ticket and online support system is available 24/7 online so if you have an issue at 3 AM and our phone support isn't available, just submit a ticket and we'll get to it as quickly as we can. We try to respond to support tickets in under 12 hours (usually much less) during normal business hours and within 24 hours on weekends and holidays, unless it's an emergency in which case we try to work your issue as quickly as we can. A powerful, open source shopping cart application that can be easily installed with one click. For more information, visit http://www.oscommerce.com. Allows you to restrict access to a specific folder in your web site. When a user visits a pasword protected directory, they will see a popup login box. Any files contained within a protected folder are not accessible until a user logs in. You can define individual users, groups and directories to protect. With our SmarterMail e-mail software, you can now synchronize your Windows-Mobile or Blackberry PDA's with your e-mail account using the downloadable sync software.
A suite of tools used for data encryption and signing. These tools are most commonly used for signing emails. For more information, see the GnuPG website.
A program which compresses files for quick transfer. The compressed files use the filename extension .gz.
An email address that is rejected for a permanent reason that cannot be corrected, such as: "the address does not exist". When an email address produces a hard bounce it should generally be taken off your mailing list.
The illegal and heavily frowned upon process of obtaining lists of email addresses to send bulk emails or spam. Harvesting can include purchasing lists and/or spam ‘bots’ scanning web pages for email addresses.
The header in an email is the part of the email that is not transparent to the recipient unless they have their "View Headers" option turned on. This tells the recipient what servers the email is coming from and what programs are being used to generate this email. Headers contain detailed information on the email itself and the route it's taken across the Internet. Recipients can normally see the "to" (identity of recipient), "from" (identity of sender) and "subject" headers in their inbox.
Helm Control Panel - To take a thing as complex as hosting management and convert it into a tool users can easily use to effectively manage their web hosting needs takes great skill. The folks at Web Host Automation have done this with their Helm control panel. Helm is a web-based management console that allows you to manage every aspect of your website from billing to databases, FTP to statistics, Helm does almost everything you need to manage and maintain your web hosting account. We are currently using the Helm 3 control panel and have plans to add Helm 4 services in the future.
A hotlink occurs when content from your site is embedded on another site, using your bandwidth to serve the files. cPanel allows you to prevent hotlinks to your site.
If you have a question, we're here to help. Phone support is available free of charge during normal business hours (9 AM to 7 PM Monday through Friday, excluding U.S. Holidays) and if we don't answer, don't worry. Leave a message and we'll call you back as soon as we can.
Infuseweb uses the Internet Information Server (IIS) 6 on its Windows 2003 servers. IIS 6 is one of the most popular web servers today.
Your cPanel account’s highest-level directory, which contains all of the files and directories used by domains managed through your account. Files placed in your home directory are not accessible online unless they reside in the public_html directory or a subdirectory of public_html.
Also known as an “inline link.” A hotlink is a direct link that embeds a file (such as an image or video) from your site into another website. When another site embeds your files, it is using your bandwidth to serve those files.
The language in which most pages on the World Wide Web are written.
An email that is formatted using Hypertext Markup Language (HTML) instead of plain text. HTML makes it possible to include unique fonts, images and background colors. HTML typically makes an email more dynamic and when well executed can generate higher response rates than traditional plain text.
The method (protocol) for transferring data over the Internet.
ImageMagick is a software suite to create, edit, and compose bitmap images. It can read, convert and write images in a variety of formats (over 100) including DPX, EXR, GIF, JPEG, JPEG-2000, PDF, PhotoCD, PNG, Postscript, SVG, and TIFF. Use ImageMagick to translate, flip, mirror, rotate, scale, shear and transform images, adjust image colors, apply various special effects, or draw text, lines, polygons, ellipses and Bézier curves. The IP Deny Manager allows you to prevent an IP address, domain name, or block of IP addresses from accessing your web site. If someone is using a lot of your bandwidth, posting malicious content, or should not be allowed to access your site for another reason, you can preventing them from doing so in the IP Deny Manager. Our online knowledgebase (or KB) is packed full of answers to common issues so often you can find the answers to your questions quickly and easily there. Of course, if you can't find the answer, you can always open a support ticket or call us. With cPanel, you can manually download complete backups of your web site any time you like and restore the entire site if necessary. You can also extract individual files from the downloaded backup .tar file and then FTP them back to your site as necessary. Unfortunately we do not offer a customer-available automated backup solution at this time. This is the maximum number of recipients you can have on your mailing list. A mailing list is an e-mail account, such as firstname.lastname@example.org, used to send out to multiple recipiets at one time. If you have a group of people you want to receive e-mails, rather than adding each name to your e-mail To: line, you can send your e-mail to email@example.com and the message will be sent to all users on the list. In reverse, if someone sends a message to the list address, it will go to all recipients on the list. This is the maximum amount of space each of your databases can take up. This is the maximum number of separate user accounts that can be created to administer your MS SQL database. Add additional file types not supported by default, such as .mp3, so it triggers the right application in the user's browser when clicked on in your web site. Our advanced automated monitoring system runs 24x7 to keep an eye on all of our servers. It queries our servers and major services every few minutes, and also executes certain web pages to ensure no application services are down. If it does discover a problem, it tries to rectify the situation automatically and if it can't, it notifies us by e-mail and pager so we can respond quickly to resolve the issue and keep downtime to a minimum. We also have a sophisticated system that determines when any of our physical servers fail and automatically restarts the failed server on another physical machine. This way even if we have a hardware failure, your site will continue to operate!
Along with POP3, one of the two most widely used email transfer methods. IMAP synchronizes email account information with the mail server on a regular basis. If you log in to multiple computers to check your email, IMAP will allow you to see what messages you have viewed, replied to, forwarded, etc. POP3 does not allow you to see this information.
The page viewed by default when a visitor accesses a directory of your website. If no index page exists for the specified directory, the visitor will see a list of files in that directory, unless you turn off indexing in cPanel. This page is most often titled index.html, index.htm or index.php.
Infuseweb performs nightly backups of each of its servers so that your information is protected in case you accidentally delete your files or a server fails. Not all data is recoverable and we do not guarantee that your data will always be recoverable so it is prudent to ensure you have backups of your files locally just in case. If you ever need your files restored, we charge a negligible $15 fee for simple file or folder recovery to help defray the cost of maintaining and supporting these backups. More time-consuming recovery services are billed at $15 per 15 minute increment. This is the total amount of Internet traffic that can flow to and from your website in the last 30 days. This includes your e-mail, web, and FTP traffic. As a reference, 10 GB bandwidth is equivalent to about 1 million visitors to your site! We provide you with some very simple web site stats standard as part of your web hosting plan from within the Helm control panel. You can easily see how much disk space and bandwidth your site is using
A number that identifies a computer on a network, making it possible for other computers to find and communicate with it.
The Internet Protocol (IP) address is a computer's address. The IP address refers to the numerical component of an internet address or domain name. An IP address looks something like: 123.456.789.012. All websites you may visit have an IP address, just like any email you send originates from a computer with an IP address.
Internet Service Provider (ISP) is a company that provides access to the Internet. AOL, Yahoo!, MSN, Comcast, Bell, Rogers, and various local phone & communication companies are common ISPs.
A computer programming language used by many web applications. cPanel uses the Java language to provide the SSHTerm and Java Telnet features. These small applications, which run within the context of a web browser, are called applets.
In cryptography, a key is used to encrypt or decrypt information. Keys are an important part of encryption and security and should be guarded appropriately.
A page on a website that is linked to an email for the purpose of providing additional information directly related to products/ services promoted in the email. Many marketers use specialized landing pages when they use email or search engine advertising.
A term for an old software program or computer system that is still in use.
Text links or images that when clicked or pasted into a browser send the person to another online location, such as a web page, PDF file, etc. To be most effective in encouraging clicks, links should be visible and clear
The length of time it takes for a page or email to open completely in the browser window. The goal is to have the fastest load time possible. Large images increase the overall load time.
A groups of email addresses designated for receiving specific email messages. A quality mailing list should all be double opt-in.
A list of email addresses which list members can use to communicate. Alternatively, such a list can be used to send email messages to a large group of people. cPanel uses a program called Mailman for mailing list software; for more information, please see its website, http://www.list.org.
Now called an Internet media type, this component of a file identifies the file type, so that web browsers know how to handle it. cPanel lets you specify which application should be used to open files with a given extension.
Multipurpose Internet Mail Extensions (MIME) is an Internet standard for the format of email. Almost all email is transmitted in MIME format. This means that two versions of the email are sent, one graphical/HTML and one just text. The appropriate version is then displayed to the recipient based on the recipient's email client preferences.
A record that specifies where email should be sent for a domain. If you are using an email scanning service or custom mail delivery, you may need to change the MX record for your domain.
A relational database management tool and server. Databases are an integral part of web applications such as bulletin boards and blogs. cPanel provides an integrated MySQL interface as well as a MySQL database editing tool called phpMyAdmin.
A computer that contains a list of domain names and their corresponding IP addresses. These computers are spread through the Internet and allow you to find where a domain is located. Nameservers gather data about domains over time; therefore, changes to DNS records can take up to a week to reach all the nameservers on the Internet (or “propagate”).
The number of HTML email recipients who opened your email, generally measured as a percentage of the total number of emails sent (measurements do vary). The open rate is considered a useful metric for evaluating response to an email campaign but it should be noted that open rates can be deceiving because if a recipient does not download images, an 'open' is usually not recorded.
An open relay is an email server configured (poorly!) so that anyone on the internet can send email. In the past this was an acceptable method for sending email, but now spammers use open relay to re-route their email through a third party to avoid detection. The CAN SPAM Act of 2003 made it illegal to send spam through an open relay. Most ISPs will not accept email from known open relays.
An opt-in subscriber is someone who expressly requests to receive emails from a person or company, thereby giving them permission to send them their email campaigns. In most cases an opt-in subscriber can edit their preferences to control the emails they receive.
An opt-out list or "Do Not Mail" list is a set of email addresses representing people who you cannot (and should not!) email. The opt-out list is typically comprised of people who have previously unsubscribed from your mailing list.
A person who chooses to opt-out or unsubscribe from your mailing list is expressly communicating that they do not want to receive future email messages from you. In EliteEmail.com, these people are added to your "Do Not Mail" list so that you do not accidentally make a mistake and send someone who previously opted-out another email.
Parallels Plesk Panel is the leading hosting automation control panel on the market. Powering more than 200,000 servers, 6 million domains and 10 million mailboxes worldwide, use the Parallels Plesk Panel to create service offerings that will improve your bottom line. Plesk’s tiered self-administration and uniform multi-platform design is perfect for the management of a shared hosting environment. The control panel empowers providers to manage thousands of domains running reliably on highly scaleable architecture optimized for the reseller channel. Non-technical staff can easily create, setup, and manage accounts while customers self-administer their virtual domains without technical support. Parallels Plesk Panel is the solution that meets both simple and complex hosting system configuration needs while allowing complete customization for differentiation while reducing costs. For more information, please visit http://www.parallels.com/plesk.
A second domain that points to your primary domain. When users attempt to access the parked domain, they will see your main website. For example, both http://www.cpanel.net and http://www.cpanel.com go to the same place, as cpanel.com is a parked domain for cpanel.net.
A repository of PHP code. cPanel allows you to search for and install PEAR packages consisting of PHP programs which can perform useful functions for your website.
Perl has been around since the beginning of dynamic web pages. While somewhat difficult to learn, it is still in use quite a bit today, though its use is diminishing as more powerful and easier to learn scripting languages such as ASP, PHP and ColdFusion are taking hold. We use ActiveState Perl for Windows and Perl is included as part of every hosting plan.
A piece of software written in the Perl language. Modules are common pieces of software that are reused often. For example, rather than writing a set of functions to display calendars, you can simply use a calendar module.
Known for its ability to process text, Perl is a useful language for web applications. Perl applications are commonly found as .pl, .pm, and .cgi files and may require Perl modules. Perl modules can be installed within cPanel.
Permission based email is email sent to recipients who have opted-in or subscribed to receive email messages from a specific company, website or individual. Permission from your subscribers is a mandatory requirement for legitimate and successful email marketing.
The common practice of writing an email to make the recipient feel that it is more personal and was sent with him/her in mind (as opposed to a mass email). This often includes using the recipient's name in the salutation or subject line, referring to previous purchases or past messages, or offering suggestions based on previous buying patterns.
Phishing (which is pronounced "fishing") refers to email scams whose purpose is identity theft. Identity thieves send fraudulent email messages with return addresses, links, and branding that appear to come from banks, credit card companies and some of the Web's most well known websites including PayPal®, eBay®, MSN®, and AOL®. These messages are designed to "phish" for personal and financial information (e.g. passwords, usernames, social security numbers, credit card numbers, etc.) from the recipient. For more info visit: www.anti-phishing.org.
PHP is a very popular scripting language that has a huge following and many commercial and open source PHP software is available today. We provide full support for the latest PHP technologies included as part of every Infuseweb hosting plan.
A piece of software written in the PHP language.
A computer scripting language in which many web-based applications are written. PHP applications are commonly found with the filename extensions .php, .php4, or .php5. Some PHP applications require PEAR packages, which can be installed in cPanel through the PHP PEAR Packages feature.
PHPMyAdmin is an online management interface for your MySQL databases. We provide this free as part of your web hosting plans.
A graphical application that allows you to manipulate and manage MySQL databases. Full documentation for phpMyAdmin can be found at its creators’ website: http://www.phpmyadmin.net.
The Plesk PowerPack is a set of high-quality add-ons for the Plesk Control Panel. The PowerPack includes: MS SQL Server Support Tomcat Support Multi-Level Helpdesk Application Pack w/ Site Builder Software ColdFusion Support SpamAssassin Anti-SPAM Software. This is the TOTAL number of POP3 or IMAP mail accounts you can have across all domains in your account. Connect via the standard POP3 protocol to download your e-mail messages into your e-mail client (such as Outlook) or use IMAP to access your stored mail on the server and always have your e-mail and e-mail folders readily available to you anywhere. The amount of space, per mailbox, you have to store your messages. All POP/IMAP e-mail accounts have a maximum send/receive message size of 20MB. If you have to send or receive files larger than 20MB by e-mail, you should upload them to your web site and provide a link to download the attachment. If your mailbox reachs your mail limits, your mail will start getting rejected back to the sender with a message your mailbox is full.
Along with IMAP, one of the two most widely used email transfer methods. POP3 simply copies every message in your email account to your local computer. No information is sent back to your email account about message replies, forwarding, etc. If you use multiple computers to check your email, it is advised that you use IMAP instead of POP3.
A standardized collection of commands for the Unix operating system.
Email programs such as Microsoft Outlook and Mac Mail allow users to view email content through a preview pane whereas other programs require the user to fully open the email. The preview pane is important to keep in mind when composing the opening lines of an email.
A string of characters that a computer uses to encode or decode encrypted messages it receives. Encryption schemes use a matching pair of keys (one public, one private) to create a secret code so that anyone looking at messages sent from or received by your computer will be unable to determine the contents of those messages without access to the private key. A private key is integral to protecting your confidential information and should be safeguarded appropriately.
In computing, a computer or program that serves as an intermediary between two other entities. For instance, a proxy server receives a request from a client, finds the requested resource, and returns it to the client.
A string of characters that a computer uses to encode or decode encrypted messages it receives. Typically, a public key will be placed on a server so that you can established an encrypted connection to that server.
A subdirectory, located inside your home directory, that contains files that are publicly accessible via FTP. FTP users may also upload files to this directory. This is the default directory users will access when they connect to your site via anonymous FTP.
A subdirectory, located inside your home directory, that contains files that are publicly accessible via HTTP. The www directory is a link to public_html. Any files and folders inside of public_html are visible over the Internet, unless you specifically protect them with password protection or using the .htaccess file.
Python is an interpreted, object-oriented, high-level programming language with dynamic semantics. Its high-level built in data structures, combined with dynamic typing and dynamic binding, make it very attractive for Rapid Application Development, as well as for use as a scripting or glue language to connect existing components together. Python's simple, easy to learn syntax emphasizes readability and therefore reduces the cost of program maintenance. Python supports modules and packages, which encourages program modularity and code reuse.
From reundant hard disks, to rundant backbone network and power generators, Infuseweb strives to ensure its equipment infrastructure is as reliable and available as possible and has proven this with an infrastructure availability of around 99.99% or greater.
Shared SSL allows you to user our shared SSL certificate so you can secure through https a section of your site without the need to purchase your own SSL certificate or pay the monthly cost of a static IP. All you need to do is place the files you wish to SSL-enable into your SSL folder under your FTP root, and then you'd browse to those secured files by entering something like https://ssl1.oursslcert.com/yoursslfolder.
SmarterStats detailed site stats is included standard as part of some plans. SmarterStats provides you with detailed analysis of the visitors to your web site including country of origin, state (if in the U.S.), what files are being downloaded, what pages are being viewed the most, what search engines are indexing your site, and much, much more.
Synchronize your Outlook calendar, e-mail, and tasks with your webmail so that you can always take your e-mail with you wherever you go.
Create a customer bulletin board (aka forum) simply and easily. For more information, visit http://forum.snitz.com.
A feature that allows you to send visitors who try to access one URL to another URL. cPanel allows you to set up either temporary or permanent redirects. Redirects are useful when you change the URL of a page on your website. You can put up a redirect at the old URL to make sure your visitors are automatically sent to the new URL.
A web page which links to your site; also called an “HTTP referer.” This spelling is the industry standard term, though it is based on a misspelling of “referrer.”
These exist in four types which are, in order from least to most stable, EDGE, CURRENT, RELEASE, and STABLE. Please visit our documentation on cPanel versions and the release process for an in-depth discussion of Release Tiers.
A list of prospects or a targeted cluster of recipients who have opted-in to receive information about specific subjects. Using permission-based rental lists, marketers can send email campaigns to audiences targeted by interest category, profession, demographics, location and more. Renting a list usually costs between $.10 and $.40 per name, although prices to vary. It is important your rental list is a certified permission-based, opt-in list. Permission-based lists are rented, not sold. Be very careful you don't get scammed!
1) Specific to Unix and Unix-based systems, the system account, used by a system administrator, that carries full privileges for configuring a computer system. Also called “superuser.” 2) The highest level directory in a Unix or Unix-based system, usually notated by a forward slash (/).
An algorithm for generating public and private keys when sending encrypted data between a local machine and a remote machine. The name of this method is not an abbreviation; it is named after its three inventors.
A method of transferring encrypted files from one computer to another. This method prevents data from being intercepted and read.
Dividing or segmenting your mailing list based on interest groups, purchasing behavior, demographics, location and more for the purpose of targeting specific email campaigns to the audience most likely to respond to your messaging or offer. Quality mailing list segmentation and targeting often results in higher open rates and click-through rates.
The Elite University Glossary is filled with all of the most common email marketing lingo so that you can learn and use all the proper terminology as you become an email marketing expert.
Please select a word from the list below.
Software that allows you to interact with a computer. Many Unix shells allow you to type commands, and are often referred to as CLIs, or command line interfaces.
A link to an application which allows you to access it from a convenient location, like your computer’s desktop.
A signature is the tagline or short block of text at the end of an email message. It generally identifies the sender and provides additional information such as company name, contact info, website, etc. Usually the information you would find on someone's business card appears in their signature.
Single opt-in is when a person joins your mailing list by visiting your website. Instead of requiring them to click a confirmation link in an email you send them (which would be a double opt-in process), you simply add them to your list. Even when using a single opt-in system it is a best practice to send an email out right away notifying the person what they have subscribed to.
The standard method (protocol) that email clients use for sending messages. Email clients use the POP3 or IMAP protocols to receive mail from a server.
An email address that is rejected for what is most likely a temporary reason, such as a mailbox that is too full. Soft bounces can often be resolved and many marketers choose to leave addresses that return soft bounces on their mailing list.
When you launch your internet browser (ie. Internet Explorer or FireFox) or while viewing your email in your email reader, the bottom of the window is commonly referred to as the "fold". The viewable areas before one has to start scrolling are "above the fold".
SPAM or Unsolicited Commercial Email (UCE) is an unsolicited email, usually of a commercial nature. Sending email to people who have not requested to receive messages from you will likely result in SPAM complaints. EliteEmail.com works closely with many organizations to help fight the battle against spam, while ensuring legitimate emails land in the inbox.
Chiefly, unsolicited email sent in bulk, usually by an automated system. As spam is considered a costly nuisance to the recipient, cPanel includes features like SpamAssassin and BoxTrapper that can cut down on the amount of spam received.
SpamAssassin is a mail filter to identify spam. It is an intelligent email filter which uses a diverse range of tests to identify unsolicited bulk email, more commonly known as Spam. These tests are applied to email headers and content to classify email using advanced statistical methods. In addition, SpamAssassin has a modular architecture that allows other technologies to be quickly wielded against spam and is designed for easy integration into virtually any email system. With our SmarterMail e-mail software, you can manage rules for spam filtering on your e-mail accounts. This gives you greater control over the spam that you receive in your e-mail inboxes. You can easily manage your MS SQL database with either Microsoft Enterprise Manager (for SQL 2000) or SQL Management Studio (for SQL 2000/2005) by following some simple steps outlined in our knowledgebase.. Server Side Includes. SSI is often used to include something into an HTML page. An example of a practical usage for this would be to include your e-mail address at the bottom of each page. If you do this as an include, then when your e-mail address changes, you will only have to update it on one page and not your entire web site. A static IP address allows you to access your web site on a dedicated IP address, for example, 188.8.131.52. Usually, the only reason you'd need a static IP address is if you need a dedicated SSL certificate on your site. Some software, such as eCommerce, may require a static IP as well. Normally, all sites are configured on a shared IP and sites are resolved in IIS using Host Headers. This is the number of TOTAL subdomains you are allowed across ALL domains in your account. A subdomain is a logical division of your main web site. For example, in mysubdomain.yourdomain.com the mysubdomain part is your subdomain. It allows you to essentially create a website within a website without your needing to purchase an additional domain name. This is good if you need to separate content on your site into different distinct areas. We provide you with a library of FREE and easy-to-follow Flash-based tutorials to help you through common tasks with our hosting environment and across a wide variety of web hosting topics. Create virtual directiories, which easily allow you to point a URL path to a physical folder or redirect the URL to another site altogether. When you rent a VPS from Infuseweb, you get total administrative/root access over your VPS. You have the freedom to install any apps you want and change permissions as you see fit. Easily backup your server at any time, then restore to that point if you need to. You can also repair your VPS if it does not boot, and even reinstall the VPS back to the default settings if necessary. This is the amount of TOTAL monthly bandwidth your server will allowed to use. Additional bandwidth can be purchased easily if needed. This is the amount of physical disk space your VPS will have available to it. Keep in mind the operating system takes up some of this disk space but the total amount of disk space, operating system included, will be this amount. Your VPS comes configured with one static IP address. Additional IP addresses can be added to your server for a nominal $2/ip/mo. With Parallels Virtuozzo Containers' VPS Management Console, you have an easy web-based tool to manage all aspects of your VPS, including: Start/Stop/Reboot Container Control containers with Start, Stop, Fast Stop and Restart functions Container Services Management Manage container services and processes such as stopping an unresponsive task or restarting a service Container Resource Monitoring Monitor container resource utilization for CPU, system, disk space and disk inodes Backup/Restore Container Back up and restore containers including all system and user files Container Repair Start the container in repair mode when a container is broken and does not boot Container Re-install Reinstall the container from scratch, either saving or discarding existing files Container Actions Log View the container actions log to monitor resource shortage alerts and various container events Embedded SSH or RDP Client This is the amount of dedicated memory your VPS will get. If your server needs the entire amount, it will be readily available for your server to use. You can connect to your VPS easily using the Remote Desktop Connection (RDP) client that is included on any Windows XP or Vista desktop. With RDP, you can manage the server just like you were sitting at your desktop. We guarantee the hardware and network your VPS is running on will be available 99.9% of the time and probably much more. While we cannot guarantee changes you make to your server that would cause it to become corrupt, we will certainly help you get your server back up and running as soon as possible. Web Forwarding allows you to redirect your web site to another web site. You may wish to do this if you are switching to a new domain name, or have a need to redirect users to another web site temporarily. Our powerful SmarterMail webmail allows you to manage your Infuseweb-hosted e-mail, including composing, deleting, viewing, and sending e-mail from your mail account from anywhere you have access to a web browser and an Internet connection. You can also have webmail collect e-mail from other mail accounts you have at different providers so you only have to look in one place to view your e-mail. Sites created on Infuseweb servers now run on Windows Server 2003 and IIS6 technology.Â More stable, more secure, and more efficient, Windows Server 2003 and IIS 6 are a fast growing and powerful web server combination. Infuseweb now supports easy installation of the WordPress blog, a powerful free blogging software. More information is available at WordPress.org.
An application which can filter suspected spam before you receive it. SpamAssassin can be configured to filter spam more or less aggressively, according to your needs. Learn more about SpamAssassin at its website: http://spamassassin.apache.org/.
A feature that allows a recipient server to verify that an email message has really been sent from the domain specified in the From: field. Enabling SPF can prevent your server from receiving replies to spam that has forged your domain name as part of the sender’s address. SPF only works if both the sending and receiving mail servers have SPF enabled.
When you launch your internet browser (ie. Internet Explorer or FireFox) or while viewing your email in your email reader, the bottom of the window is commonly referred to as the "fold". The viewable areas before one has to start scrolling are "above the fold".
The falsification of an email header so that the email appears to have be sent from someone or somewhere other than the actual source. Illegitimate marketersa use spoofing to disguise their identity in an attempt to commit fraud and avoid getting in trouble for sending spam or UCE. There are several email authentication practices currently in use to prevent spoofing, but it does still happen to many of the most popular brands on the internet.
In email, this term is used to describe the forgery of a domain name as the sender in the header of an email. Enabling SPF makes it more difficult for spammers to spoof your domain.
A network protocol that allows a user to log into a remote machine user account securely. cPanel can create keys for authenticating your identity during SSH login, and provides a Java applet for accessing SSH through your web browser.
TLS is simply the more recent version of SSL. Both are cryptographic schemes that allow for secure interaction between a web browser and a web server. All sensitive data (credit card numbers, login information, etc) that is transmitted over the internet should be protected by SSL/TLS. You can install an SSL certificate on your web site to allow your site to be protected by SSL/TLS.
An electronic document (using the filename extension .crt) which binds a public key to an identity consisting of an email address, company, and location. This electronic document is a key piece in an authentication process.
A subsection of your website that exists as a subdirectory in your home folder. If your domain were example.com, then the subdomain URL would appear as subdomain.example.com.
The subject line is the part of the email that indicates what the message is about. Your subject line should be short and to the point (30 - 50 characters including spaces, or 5-9 words), and it should accurately reflects the contents of the email. Using misleading subject lines is a very bad email practice.
Originally derived from “Tape Archive,”a program that collates files for transfer or distribution. Files processed by this program are usually compressed, commonly called “tarballs,” and use the filename extension .tar. Due to the compression commonly used, .tar often precedes the .gz file extension.
A file collated by the tar program, and usually compressed.
Choosing a selective audience or group of individuals likely to be interested in a certain product or service. Targeting is very important for an email marketer because targeted and relevant email campaigns generally return a higher open rate and result in fewer unsubscribes.
A network protocol that allows a user to log into a remote machine user account remotely. Telnet is similar to SSH, but less secure. Telnet should not be used to connect to your web site except for testing purposes. Login information is sent through Telnet as plain text and can be easily intercepted.
A version of an image file that is reduced in size, allowing for easy viewing of multiple images. cPanel includes a Thumbnailer tool as part of its Image Manager section.
A cPanel tool that automatically sizes down all the images in a directory. The new thumbnails are stored in a subdirectory named */Thumbnails, where * is meant to represent the parent directory containing the original images.
Your USP or unique selling proposition is the unique attribute(s) of your business that makes your company or offering the ideal solution to a problem, the best way to fulfill a need/want or the best way to achieve a goal. Your unique selling proposition answers the recipient's question: "Why should I do business with you instead of your competitor?" Before launching an email marketing campaign you should determine your unique selling proposition.
When the user of an email address unsubscribes, this indicates that he or she no longer wishes to receive emails from your you or your organization. People can unsubscribe in a variety of ways including clicking the "Unsubscribe" link at the bottom of each email sent through EliteEmail.com, or by replying to the sender with the word "Unsubscribe" in the subject line or message body. This process is also known as opting-out. Including an unsubscribe method is part of the CAN-SPAM Act.
On the web, a URI is a string of characters that identifies a website. URI is often used synonymously with the terms “URL” and “web address,” although there are technical differences among the three.
A Uniform Resource Locator (URL) is the technical term for a web address, such as http://www.eliteemail.com.
On the web, a URL is a string of characters that identifies the location of a website. Since IP addresses are difficult to remember, URLs are used instead. For example, it is much easier to remember to go to http://www.example.com than http://184.108.40.206. URL is often used synonymously with the terms “URI” and “web address,” although there are technical differences among the 3.
A person who uses a computer to accomplish some purpose.
Elements and functions included in a communication that encourages and allows recipients to pass the offer along to other people, and as such further leveraging the marketing effort. Examples of this are a "Forward To Friend" link or an "Add This To Your MySpace Profile" link.
A person who views your website.
An application used to view and interact with sites and pages on the World Wide Web. Examples include Firefox®, Internet Explorer®, and Safari®.
A feature of cPanel that lets you manipulate your web files by dragging and dropping, just as you do on your local computer’s operating system.
Almost all web browsers and email clients are capable of displaying four primary fonts properly: Verdana, Times, Arial, and Helvetica, including their variants (Arial Narrow, Times New Roman, etc.) If a web developer or email marketer decides to use a different font he or she risks compatibility problems and the potential that their pages/emails may render inaccurately when viewed by these people.
The top-most directory of your website (namely, public_html or www), inside which all of the files and subdirectories for your website reside.
A program, such as Apache, which receives requests from clients (web browsers), retrieves the requested web pages, and “serves” them to the clients
A program that displays various statistics for your website using tables and graphs. Full documentation for The Webalizer can be found at its creators’ website: http://www.webalizer.com.
Any application which allows you to access your email through a web browser. The main advantage to webmail is the ability to access your email account from any computer connected to the Internet without having to install or configure a specific mail program.
Whitelists are lists of commercial emailers (including ESPs like EliteEmail.com) who have been approved to send mail through the ISP. The ISP requires a list of IP addresses that email will be sent from, and in some cases a test period where the commercial emailer will be approved or rejected. Many email clients allow a person to add a sender to a 'trusted list', which is similiar to a whitelist at the user level.
Companion software to cPanel, designed for web hosts, resellers, and system administrators.
For the purposes of cPanel, www is a link to the directory that holds the files that make up your website (/public_html).