SlideShare a Scribd company logo
1 of 28
CPANEL BRIEF
GLOSSARY
TABLE OF CONTENTS
2
Daemon
Dangling Symlink
Data Center
Dedistribution
Default Address (cPanel Account Default
Address)
Deprecated
Dictionary Attack
Digital Signature Algorithm (DSA)
Directory Harvest Attack (DHA)
Disk Space Quota
Distributed cPanel Account
DNS Zone
dnsadmin
Document root
Domain Control Validation
Domain Name
Domain Forwarding (Redirect)
Domain Name System (DNS)
Domain-Validated (DV) Certificate
DomainKeys Identified Mail (DKIM)
Domain-based Message Authentication,
Reporting, and Conformance (DMARC)
Dovecot
DNSOnly®
Dynamic DNS (DDNS) Domain
◉ It refers to a computer program. This computer program runs as a background process that
cannot be viewed or controlled directly by the user.
3
Daemon
◉ It is a symbolic link. It refers to a pathname which doesn’t exist.
4
Dangling Symlink
◉ It indicates that facility where servers are kept. It is generally a safe place to keep a server. It usually
includes backup power supplies, multiple communication connections and environmental controls.
◉ Web servers are provided by web hosting companies. These companies are often referred to as the “Best
Windows Hosting Company” or as “Cloud Hosting Company in India” or even as “Website Hosting
Companies in India”.
5
Data Center
6
1-800-123 -8156
Whoa! That’s a big number, aren’t you proud?
◉ It refers to the process that involves moving partial or entire functionality of a distributed cPanel
account back to the parent node from a child node.
7
Dedistribution
◉ It is that email address to which cPanel & WHM routes emails related to those email accounts that don’t
exist or those of invalid recipients on the user’s cPanel account. This default address can be checked by
following the path, cPanel -> Home -> Email -> Manage Email Accounts.
8
Default Address (cPanel Account
Default Address)
◉ It is a term used by cPanel, L.L.C. to describe those features that are no longer supported
or would be removed in an upcoming release.
9
Deprecated
◉ It is referred to that method which involves a malicious user’s attempt at guessing a
password with the aid of words from a dictionary. It is similar to a brute force attack. This
type of an attack can be thwarted by enabling the “Dictionary Attack Protection” setting in
the “Exim Configuration Manager” interface in WHM by following the path, WHM ->
Home -> Service Configuration -> Exim Configuration Manager.
10
Dictionary Attack
◉ It is a method that is used to generate public and private keys which are used for signing of
data.
11
Digital Signature Algorithm (DSA)
◉ It refers to a brute force attack technique. It involves spammers trying to find valid email
addresses on a server. This is achieved through guesswork as well as by the aid of various
common addresses’ permutations.
◉ WHM has cPHulk, which is a protective measure that enables the user to lock out brute
force attackers, on reaching a specified number of failed attempts.
12
Directory Harvest Attack (DHA)
◉ It refers to the limit imposed by hosting providers on the amount of disk space that can be
used by an account. The usage data of website owners can be traced in cPanel’s “Disk
Usage” interface by following the path, cPanel -> Home -> Files -> Disk Usage
◉ Users’ disk space quotas are managed by server administrators in the “Quota
Modification” interface in WHM. The path for it is, WHM -> Home -> Account Functions -
> Quota Modification.
13
Disk Space Quota
◉ It is a cPanel account that has its existence on two or more linked nodes.
◉ To digress, web hosting companies provide web servers and the necessary services and
technologies that make a website accessible. The “Best Windows Hosting Company” or
“Cloud Hosting Company in India” or “Website Hosting Companies in India” are certain
terms that are used to refer to web hosting companies.
14
Distributed cPanel Account
◉ It refers to the administrative part of the DNS (Domain Name System). The Internet traffic
is directed to the correct location because of it. DNS zones can be added to the server in
the “Add a DNS Zone” interface in WHM.The path is,WHM -> Home -> DNS Functions -
> Add a DNS Zone.
15
DNS Zone
◉ It is that program which manages DNS clustering and DNS services. It is used by DNS
clusters. Custom dnsadmin plugins can be created by third-party integrators.
16
DNSAdmin
◉ It refers to the directory in which a domain’s publicly-available files are maintained. A user’s
primary domain’s document root defaults usually to the public_html directory. Any addon
domain’s or subdomain’s document root directories depend on the user’s server’s settings.
17
Document Root
◉ Domain Control Validation (DCV) is used prior to the issuance of a certificate, to verify
that a specific domain is owned by the certificate requester. Any one of the three following
DCV methods can be used to verify such an ownership:
◉ Email-Validation email is sent to the administrative contact for the domain.
◉ DNS- Special CNAME record is checked for the domain in DNS.
◉ HTTP- Hashed text file is checked on the website of the requester.
18
Domain ControlValidation
◉ It is the name given by a site owner to a website. It appears in the URL of the website and
in email addresses. Domains can be added and managed in the “Domains” interface in
cPanel.The path is, cPanel -> Home -> Domains -> Domains.
19
Domain Name
◉ It is that technique that allows a user or even his clients to direct automatically the visitors
to a particular domain when another domain is accessed by them. Domain forwarding can
be set up and managed through the “Setup/Edit Domain Forwarding” interface in WHM. Its
path is,WHM -> Home -> DNS Functions -> Setup/Edit Domain Forwarding.
20
Domain Forwarding (Redirect)
◉ It refers to that component of the Internet which enables the conversion of domain names
that can be read by humans into IP addresses that can be comprehended by the computer.
◉ To digress, the reference of the Internet reminds us of the numerous websites that are
browsed daily. These websites’ files are stored on the web servers of web hosting
companies. The “Best Windows Hosting Company” or “Cloud Hosting Company in India”
or “Website Hosting Companies in India” are certain terms that are used frequently to
refer to web hosting companies.
21
Domain Name System (DNS)
◉ It is a digital certificate meant for SSL/TLS verification. The verification regarding the
applicant’s control over a specific DNS domain is done by the Certificate Authority (CA)
through phone, email or other method. DV certificates can be purchased and installed by
following the path, cPanel -> Home -> Security -> SSL/TLSWizard.
22
Domain-Validated (DV) Certificate
◉ It refers to an email authentication method. It is used to verify that a message was actually
sent from the same domain that it seems to have come from. It can be enabled in
WHM’s “Enable DKIM/SPF Globally” interface by clicking on WHM -> Home -> DNS
Functions -> Enable DKIM/SPF Globally.
23
Domain Keys Identified Mail (DKIM)
◉ DMARC (Domain-based Message Authentication, Reporting & Conformance) refers to a
technical specification that aids in the reduction of email-based abuse’s potential. A
DMARC policy makes use of DNS, in order to confirm that an email has used a
valid DKIM as well as SPF record. It also ascertains that the From: header matches those
records. It is a requirement of many major email networks that a user uses DMARC policy
to ensure protection against spam email.
◉ DMARC records can be created and managed in the “Zone Editor” interface in cPanel, by
clicking on cPanel -> Home -> Domains -> Zone Editor.
24
Domain-based Message Authentication, Reporting, and
Conformance (DMARC)
◉ It is a mail server software, which is open-source and ensures optimal security. It can be
configured in WHM’s “Mailserver Configuration” interface by clicking on, WHM -> Home -
> Service Configuration -> Mailserver Configuration.
25
Dovecot
◉ It is that version of cPanel & WHM which enables a user to run a dedicated physical
nameserver. This version is extremely minimal. It replicates DNS zones to the user’s other
servers.
26
DNSOnly®
◉ It is a type of domain. It simplifies access to a network which is using a dynamic IP address.
27
Dynamic DNS (DDNS) Domain
28
THANKS!
ANY QUESTIONS?
www.htshosting.org

More Related Content

Similar to cPanel: Brief Glossary

Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCA Technologies
 
Important Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel UsersImportant Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel UsersHTS Hosting
 
Microsoft Word - Web Hosting Services
Microsoft Word - Web Hosting ServicesMicrosoft Word - Web Hosting Services
Microsoft Word - Web Hosting Serviceswebhostingguy
 
Web Hosting Terminology
Web Hosting TerminologyWeb Hosting Terminology
Web Hosting TerminologyHTS Hosting
 
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More SecureLow Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More SecureMongoDB
 
Important Terms Related to Hosting Control Panel
Important Terms Related to Hosting Control PanelImportant Terms Related to Hosting Control Panel
Important Terms Related to Hosting Control PanelMr. Rajendra Mishra
 
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemInfoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemJennifer Nichols
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domainsCTM360
 
2010 5 xpg collaboration
2010 5 xpg collaboration2010 5 xpg collaboration
2010 5 xpg collaborationGuus Disselkoen
 
M4 internet systems & applications I
M4   internet systems & applications IM4   internet systems & applications I
M4 internet systems & applications IJosep Bardallo
 
Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5SURBHI SAROHA
 
Frequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanelFrequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanelHTS Hosting
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Sahira Khan
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSDevOps.com
 
Part 3 - DNS Configuration (IFD)
Part 3 - DNS Configuration (IFD)Part 3 - DNS Configuration (IFD)
Part 3 - DNS Configuration (IFD)Naveen Kumar
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]APNIC
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beau Bullock
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesHTS Hosting
 
VRSN_Top5_DTM_WP_201404-web[1]
VRSN_Top5_DTM_WP_201404-web[1]VRSN_Top5_DTM_WP_201404-web[1]
VRSN_Top5_DTM_WP_201404-web[1]Laura L. Adams
 

Similar to cPanel: Brief Glossary (20)

Case Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on TimeCase Study: Privileged Access in a World on Time
Case Study: Privileged Access in a World on Time
 
Important Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel UsersImportant Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel Users
 
Microsoft Word - Web Hosting Services
Microsoft Word - Web Hosting ServicesMicrosoft Word - Web Hosting Services
Microsoft Word - Web Hosting Services
 
Web Hosting Terminology
Web Hosting TerminologyWeb Hosting Terminology
Web Hosting Terminology
 
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More SecureLow Hanging Fruit, Making Your Basic MongoDB Installation More Secure
Low Hanging Fruit, Making Your Basic MongoDB Installation More Secure
 
Web hosting Introduction- MilesWeb
Web hosting  Introduction- MilesWebWeb hosting  Introduction- MilesWeb
Web hosting Introduction- MilesWeb
 
Important Terms Related to Hosting Control Panel
Important Terms Related to Hosting Control PanelImportant Terms Related to Hosting Control Panel
Important Terms Related to Hosting Control Panel
 
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid ThemInfoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
Infoblox White Paper - Top Five DNS Security Attack Risks and How to Avoid Them
 
DMARC Implementation across all domains
DMARC Implementation across all domainsDMARC Implementation across all domains
DMARC Implementation across all domains
 
2010 5 xpg collaboration
2010 5 xpg collaboration2010 5 xpg collaboration
2010 5 xpg collaboration
 
M4 internet systems & applications I
M4   internet systems & applications IM4   internet systems & applications I
M4 internet systems & applications I
 
Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5
 
Frequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanelFrequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanel
 
Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)Dhcp, dns and proxy server (1)
Dhcp, dns and proxy server (1)
 
Building Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNSBuilding Resilient Applications with Cloudflare DNS
Building Resilient Applications with Cloudflare DNS
 
Part 3 - DNS Configuration (IFD)
Part 3 - DNS Configuration (IFD)Part 3 - DNS Configuration (IFD)
Part 3 - DNS Configuration (IFD)
 
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
DNSSEC Tutorial, by Champika Wijayatunga [APNIC 38]
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
 
Important Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based ServicesImportant Terminology for the Users of Web-based Services
Important Terminology for the Users of Web-based Services
 
VRSN_Top5_DTM_WP_201404-web[1]
VRSN_Top5_DTM_WP_201404-web[1]VRSN_Top5_DTM_WP_201404-web[1]
VRSN_Top5_DTM_WP_201404-web[1]
 

More from HTS Hosting

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress HostingHTS Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingHTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated ServersHTS Hosting
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server PlansHTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated ServersHTS Hosting
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting SolutionsHTS Hosting
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager SetupHTS Hosting
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting PlansHTS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingHTS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreHTS Hosting
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business WebsiteHTS Hosting
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting TermsHTS Hosting
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersHTS Hosting
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingHTS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball ContentsHTS Hosting
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated ServersHTS Hosting
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans HTS Hosting
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansHTS Hosting
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting ServicesHTS Hosting
 

More from HTS Hosting (20)

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 

Recently uploaded

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 

Recently uploaded (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 

cPanel: Brief Glossary

  • 2. TABLE OF CONTENTS 2 Daemon Dangling Symlink Data Center Dedistribution Default Address (cPanel Account Default Address) Deprecated Dictionary Attack Digital Signature Algorithm (DSA) Directory Harvest Attack (DHA) Disk Space Quota Distributed cPanel Account DNS Zone dnsadmin Document root Domain Control Validation Domain Name Domain Forwarding (Redirect) Domain Name System (DNS) Domain-Validated (DV) Certificate DomainKeys Identified Mail (DKIM) Domain-based Message Authentication, Reporting, and Conformance (DMARC) Dovecot DNSOnly® Dynamic DNS (DDNS) Domain
  • 3. ◉ It refers to a computer program. This computer program runs as a background process that cannot be viewed or controlled directly by the user. 3 Daemon
  • 4. ◉ It is a symbolic link. It refers to a pathname which doesn’t exist. 4 Dangling Symlink
  • 5. ◉ It indicates that facility where servers are kept. It is generally a safe place to keep a server. It usually includes backup power supplies, multiple communication connections and environmental controls. ◉ Web servers are provided by web hosting companies. These companies are often referred to as the “Best Windows Hosting Company” or as “Cloud Hosting Company in India” or even as “Website Hosting Companies in India”. 5 Data Center
  • 6. 6 1-800-123 -8156 Whoa! That’s a big number, aren’t you proud?
  • 7. ◉ It refers to the process that involves moving partial or entire functionality of a distributed cPanel account back to the parent node from a child node. 7 Dedistribution
  • 8. ◉ It is that email address to which cPanel & WHM routes emails related to those email accounts that don’t exist or those of invalid recipients on the user’s cPanel account. This default address can be checked by following the path, cPanel -> Home -> Email -> Manage Email Accounts. 8 Default Address (cPanel Account Default Address)
  • 9. ◉ It is a term used by cPanel, L.L.C. to describe those features that are no longer supported or would be removed in an upcoming release. 9 Deprecated
  • 10. ◉ It is referred to that method which involves a malicious user’s attempt at guessing a password with the aid of words from a dictionary. It is similar to a brute force attack. This type of an attack can be thwarted by enabling the “Dictionary Attack Protection” setting in the “Exim Configuration Manager” interface in WHM by following the path, WHM -> Home -> Service Configuration -> Exim Configuration Manager. 10 Dictionary Attack
  • 11. ◉ It is a method that is used to generate public and private keys which are used for signing of data. 11 Digital Signature Algorithm (DSA)
  • 12. ◉ It refers to a brute force attack technique. It involves spammers trying to find valid email addresses on a server. This is achieved through guesswork as well as by the aid of various common addresses’ permutations. ◉ WHM has cPHulk, which is a protective measure that enables the user to lock out brute force attackers, on reaching a specified number of failed attempts. 12 Directory Harvest Attack (DHA)
  • 13. ◉ It refers to the limit imposed by hosting providers on the amount of disk space that can be used by an account. The usage data of website owners can be traced in cPanel’s “Disk Usage” interface by following the path, cPanel -> Home -> Files -> Disk Usage ◉ Users’ disk space quotas are managed by server administrators in the “Quota Modification” interface in WHM. The path for it is, WHM -> Home -> Account Functions - > Quota Modification. 13 Disk Space Quota
  • 14. ◉ It is a cPanel account that has its existence on two or more linked nodes. ◉ To digress, web hosting companies provide web servers and the necessary services and technologies that make a website accessible. The “Best Windows Hosting Company” or “Cloud Hosting Company in India” or “Website Hosting Companies in India” are certain terms that are used to refer to web hosting companies. 14 Distributed cPanel Account
  • 15. ◉ It refers to the administrative part of the DNS (Domain Name System). The Internet traffic is directed to the correct location because of it. DNS zones can be added to the server in the “Add a DNS Zone” interface in WHM.The path is,WHM -> Home -> DNS Functions - > Add a DNS Zone. 15 DNS Zone
  • 16. ◉ It is that program which manages DNS clustering and DNS services. It is used by DNS clusters. Custom dnsadmin plugins can be created by third-party integrators. 16 DNSAdmin
  • 17. ◉ It refers to the directory in which a domain’s publicly-available files are maintained. A user’s primary domain’s document root defaults usually to the public_html directory. Any addon domain’s or subdomain’s document root directories depend on the user’s server’s settings. 17 Document Root
  • 18. ◉ Domain Control Validation (DCV) is used prior to the issuance of a certificate, to verify that a specific domain is owned by the certificate requester. Any one of the three following DCV methods can be used to verify such an ownership: ◉ Email-Validation email is sent to the administrative contact for the domain. ◉ DNS- Special CNAME record is checked for the domain in DNS. ◉ HTTP- Hashed text file is checked on the website of the requester. 18 Domain ControlValidation
  • 19. ◉ It is the name given by a site owner to a website. It appears in the URL of the website and in email addresses. Domains can be added and managed in the “Domains” interface in cPanel.The path is, cPanel -> Home -> Domains -> Domains. 19 Domain Name
  • 20. ◉ It is that technique that allows a user or even his clients to direct automatically the visitors to a particular domain when another domain is accessed by them. Domain forwarding can be set up and managed through the “Setup/Edit Domain Forwarding” interface in WHM. Its path is,WHM -> Home -> DNS Functions -> Setup/Edit Domain Forwarding. 20 Domain Forwarding (Redirect)
  • 21. ◉ It refers to that component of the Internet which enables the conversion of domain names that can be read by humans into IP addresses that can be comprehended by the computer. ◉ To digress, the reference of the Internet reminds us of the numerous websites that are browsed daily. These websites’ files are stored on the web servers of web hosting companies. The “Best Windows Hosting Company” or “Cloud Hosting Company in India” or “Website Hosting Companies in India” are certain terms that are used frequently to refer to web hosting companies. 21 Domain Name System (DNS)
  • 22. ◉ It is a digital certificate meant for SSL/TLS verification. The verification regarding the applicant’s control over a specific DNS domain is done by the Certificate Authority (CA) through phone, email or other method. DV certificates can be purchased and installed by following the path, cPanel -> Home -> Security -> SSL/TLSWizard. 22 Domain-Validated (DV) Certificate
  • 23. ◉ It refers to an email authentication method. It is used to verify that a message was actually sent from the same domain that it seems to have come from. It can be enabled in WHM’s “Enable DKIM/SPF Globally” interface by clicking on WHM -> Home -> DNS Functions -> Enable DKIM/SPF Globally. 23 Domain Keys Identified Mail (DKIM)
  • 24. ◉ DMARC (Domain-based Message Authentication, Reporting & Conformance) refers to a technical specification that aids in the reduction of email-based abuse’s potential. A DMARC policy makes use of DNS, in order to confirm that an email has used a valid DKIM as well as SPF record. It also ascertains that the From: header matches those records. It is a requirement of many major email networks that a user uses DMARC policy to ensure protection against spam email. ◉ DMARC records can be created and managed in the “Zone Editor” interface in cPanel, by clicking on cPanel -> Home -> Domains -> Zone Editor. 24 Domain-based Message Authentication, Reporting, and Conformance (DMARC)
  • 25. ◉ It is a mail server software, which is open-source and ensures optimal security. It can be configured in WHM’s “Mailserver Configuration” interface by clicking on, WHM -> Home - > Service Configuration -> Mailserver Configuration. 25 Dovecot
  • 26. ◉ It is that version of cPanel & WHM which enables a user to run a dedicated physical nameserver. This version is extremely minimal. It replicates DNS zones to the user’s other servers. 26 DNSOnly®
  • 27. ◉ It is a type of domain. It simplifies access to a network which is using a dynamic IP address. 27 Dynamic DNS (DDNS) Domain