RSS Feed
Knowledgebase : cPanel - Tutorials
Forwarders: Forwarders allow you to send a copy of all mail from one email address to another. For example, if you have two different email accounts, user@example.com and user1@example1.com, you could forward example.com to example1.com so that you do n...
Mailing List: Mailing lists allow you to use a single address to send email, newsletters, and other updates to multiple email addresses. To configure specific settings for your mailing list after you create it, click Modify. Create a Mailing List: 1. T...
Email Accounts: This section allows you to manage the email accounts that are associated with your domain. How to create an email account: 1. Login to your cpanel and goto "Email Accounts" 2. Type a new email address in "Email" 3. Type your new passwo...
Redirects: Redirects allow you to redirect a specific page to another page and display the contents of that second page. You can use this method to make a page that has a long URL accessible through a page with a shorter and easier-to-remember URL.. How...
Backup: Backups allow you to download a zipped copy of your entire site or specific parts of your site, such as your home directory, databases, email forwarder configuration, or your email filters configuration. The server does not automatically schedul...
Subdomains: Subdomains are URLs for different sections of your website. They use your main domain name and a prefix. For example, if your domain is "nexus.com", a subdomain of your domain might be "support.nexus.com". Creating a Subdomain: 1. Type you...
Web Disk Account: Web Disk is a cPanel implementation of the WebDav protocol. Web Disk allows you to manage, upload, and download your website's files as though they were local to your personal computer. You Can Create an Additional Web Disk Account. ...
FTP accounts allow you to access your website's files through a protocol called FTP. Use a third-party FTP program to access your files. To log into your account via FTP, enter "Domain.com" as your FTP host, the username, and password. To create your FTP...
Creating Mysql Database. Mysql Database: MySQL databases allow you to store a large amount of information in an easy to access manner. The databases themselves are not easily read by humans. MySQL databases are required by many web applications includin...
This feature allows you to block a range of IP addresses access to your site. If you enter an FQDN, the system will attempt to resolve it to an IP address. You can Add an IP address or Domain.
GnuPG Keys: GnuPG is a publicly-available encryption scheme that uses the public key approach. The GnuPG system uses a public key to encrypt messages. You can only decrypt them with the private key, which the intended recipient of the message retains. ...
Parked Domains: Parked domains allow you to "park" additional domain names to your existing hosting account. This allows users to reach your website when they enter the parked domain in their browsers. You must register your domains with a valid registra...
Addon Domain: Addon domains allow you to host additional domains from your account, if your hosting provider allows you to do so. Visitors can enter the addon domain's URL in a browser to reach a subdomain of your site. Your web host must enable this fe...
Autoresponders: You can use autoresponders to automatically send a message back to anyone who sends an email to a specified account. Possible scenarios in which you may use autoresponders include when you are on vacation, unavailable, or if you have a ge...
File manager contains all of your account data, you can create files/folders, upload or download new files, copy, move, edit, change permission, view, extract or compress your files.
Hotlink Protection: When hotlink protection is enabled, other websites cannot directly link to specified file types on your website. External websites can still link to any file type that you do not specify below (for example, .html files). Hotlinking m...
SSH allows you to perform secure file transfers and remote logins over an encrypted internet connection. Because you must have the private SSH key in order to authenticate a session, it is almost impossible to perform a brute force attack against an SSH c...