SlideShare a Scribd company logo
1 of 20
cPanel Information
about UsefulTerms
Table of Contents
2
Backscatter
Backup
Bandwidth
Berkeley Internet Name Domain (BIND)
Bayes Testing (Bayesian Spam Filtering)
Blackhole (Black Hole)
Blacklist
Blocker
Bounce Message
BoxTrapper
BoxTrapper Blacklist
BoxTrapper Ignore List
BoxTrapper Whitelist
Branding
Brute Force Attack
Build
 It is the term that is used for bounced email messages (or failed Delivery
Status Notifications) that have been sent erroneously by the system to a
domain. This happens when an attacker forges the domain’s name as the
sender of spam. SPF should be used on the user’s mail server, so that
backscatter can be reduced. Other terms that are used for it are outscatter,
collateral spam and misdirected bounces.
3
Backscatter
 It refers to a copy of the files, databases, directories and email configurations
related to a user’s website or server. It is recommended that the users of cPanel
keep a backup of their website and the system administrators create account and
server backups frequently.
4
Backup
 It is the total size of all of the files that a system transfers to the computer of the
visitors. Whenever a website visitor views a file (image, audio and video file) it is
transferred by the server to the visitor’s computer. The bandwidth of a site owner
is often limited by web hosting providers. This is done to prevent it from affecting
the server’s performance. Bandwidth’s usage can be checked by cPanel users in the
“Bandwidth” interface in cpanel by clicking on cPanel >> Home >> Metrics >>
Bandwidth.
5
Bandwidth
6
1-800-123 -8156
Whoa!That’s a big number, aren’t
you proud?
 It refers to the most used DNS server software and is also referred to as named. It
is meant to perform the main DNS server roles by functioning as an authoritative
name server with regard to domains and working in the network as a recursive
resolver.
 Since cPanel is a web hosting control panel, it is important to mention the concept
of web hosting, which refers to the services and technology provided by a web
hosting provider that makes a website accessible over the Internet.
 Terms that indicate a web hosting company are “Top Cloud Hosting Company”, the
“Best Windows Hosting Company in India” and even “Website Hosting Companies
in India”. Certain other terms can also be used for web hosting service providers.
7
Berkeley Internet Name Domain
(BIND)
 It is that process which aids in filtering spam, based on statistics. In this method
tokens (usually words) in emails are used, to ascertain whether an incoming
message is spam or not. It relies on Bayesian statistics. Spam filters can be created
in the “Spam Filters” interface in cPanel. This can be done by following the path,
cPanel -> Home -> Email -> Spam Filters.
8
BayesTesting (Bayesian Spam
Filtering)
 It is one of the options related to the handling of mail, which is received by the
default or catch-all email addresses of cPanel users. In this option mail is discarded
after the server has accepted it. Hence, it might lead to the users receiving
additional spam. In order to create filters in cPanel’s Spam Filters interface, click on
cPanel -> Home -> Email -> Spam Filters.
9
Blackhole (Black Hole)
It is a method that relates to access control for privileges. It is meant for a
defined list of users, network addresses or programs.
10
Blacklist
Blocker
It refers to a condition that is discovered by the system, which prevents
the system from performing a version update. Compatibility checks are
performed by the cPanel & WHM update process, in order to identify
blockers prior to upgrading to a new version.
Bounce Message
It is an email reply that is meant to inform the sender about a problem with email
delivery.
To digress, certain terms are used to refer to web hosting service providers. These are
“Top Cloud Hosting Company”, the “Best Windows Hosting Company in India” and
even “Website Hosting Companies in India”, to name a few.
BoxTrapper
It is an application. In it the senders need to reply to verification emails. It uses
challenge-response verification to filter spam. In it the system accepts the original email,
post the sender replying to the verification message. It can be configured by following
the path, cPanel -> Home -> Email -> BoxTrapper.
BoxTrapper Blacklist
It refers to a list of incoming email addresses that is blocked automatically by
the BoxTrapper application. A configurable warning message is sent automatically by the
cPanel upon receiving any mail from a blacklisted address.
BoxTrapper Ignore List
It is that list of incoming email addresses that is ignored automatically by
the BoxTrapper.
BoxTrapper Whitelist
It refers to a list of incoming email addresses that is accepted automatically by
the BoxTrapper.
Branding
It refers to the changes in the cPanel’s interface that are done to match a user’s
company’s logo as well as brand. Updates to image assets or text labels are also
included in such changes.
Brute Force Attack
It is a cyber-attack which entails the attacker entering a large number of
characters’ combination in order to decrypt a key. WHM includes cPHulk.
It is a protective measure that lets the user lock out brute force attackers,
once a specified number of failed attempts are reached.
Build
It refers to the release of cPanel & WHM, which uses a specific version
number.
20
Thanks!
ANY QUESTIONS?
www.htshosting.org
www.htshosting.org/best-web-hosting-company-India
www.htshosting.org/best-windows-hosting
www.htshosting.org/best-cloud-hosting-company

More Related Content

What's hot

10135 a 05
10135 a 0510135 a 05
10135 a 05Bố Su
 
Dhcp Server Linux Server
Dhcp Server Linux ServerDhcp Server Linux Server
Dhcp Server Linux Servermuh kemal
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BMahmmoud Mahdi
 
Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Paulo Bischof
 
DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)Tola LENG
 
NetScaler Web2.0 Push Technology Overview
NetScaler Web2.0 Push Technology OverviewNetScaler Web2.0 Push Technology Overview
NetScaler Web2.0 Push Technology Overviewkvamsi
 
Important Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel UsersImportant Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel UsersHTS Hosting
 

What's hot (12)

Seo2 india devang barot - google public dns
Seo2 india   devang barot - google public dnsSeo2 india   devang barot - google public dns
Seo2 india devang barot - google public dns
 
10135 a 05
10135 a 0510135 a 05
10135 a 05
 
Dhcp Server Linux Server
Dhcp Server Linux ServerDhcp Server Linux Server
Dhcp Server Linux Server
 
Article on SMPT
Article on SMPTArticle on SMPT
Article on SMPT
 
Lession4 Dhcp
Lession4 DhcpLession4 Dhcp
Lession4 Dhcp
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 
Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)
 
DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)
 
Nagios
NagiosNagios
Nagios
 
NetScaler Web2.0 Push Technology Overview
NetScaler Web2.0 Push Technology OverviewNetScaler Web2.0 Push Technology Overview
NetScaler Web2.0 Push Technology Overview
 
Networking in Java
Networking in JavaNetworking in Java
Networking in Java
 
Important Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel UsersImportant Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel Users
 

Similar to cPanel: Information about Useful Terms

Some useful c panel terms
Some useful c panel termsSome useful c panel terms
Some useful c panel termsHTS Hosting
 
cPanel: Brief Glossary
cPanel: Brief GlossarycPanel: Brief Glossary
cPanel: Brief GlossaryHTS Hosting
 
Useful Terms Related to the World Wide Web
Useful Terms Related to the World Wide Web Useful Terms Related to the World Wide Web
Useful Terms Related to the World Wide Web HTS Hosting
 
Useful Terms Related to cPanel & WHM
Useful Terms Related to cPanel & WHMUseful Terms Related to cPanel & WHM
Useful Terms Related to cPanel & WHMMr. Rajendra Mishra
 
Ways to Prevent Email Abuse
Ways to Prevent Email AbuseWays to Prevent Email Abuse
Ways to Prevent Email AbuseHTS Hosting
 
Massive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on RailsMassive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on Railsibelmonte
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLaboraDK
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2BCamp
 
Copying Addon Domains to a New Account
Copying Addon Domains to a New AccountCopying Addon Domains to a New Account
Copying Addon Domains to a New AccountHTS Hosting
 
Pmw2 k3ni 1-3a
Pmw2 k3ni 1-3aPmw2 k3ni 1-3a
Pmw2 k3ni 1-3ahariclant1
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beau Bullock
 
Frequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanelFrequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanelHTS Hosting
 
Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5SURBHI SAROHA
 
How to Manage Your Email Reputation - Rob Van Slyke 4-2010
How to Manage Your Email Reputation - Rob Van Slyke 4-2010How to Manage Your Email Reputation - Rob Van Slyke 4-2010
How to Manage Your Email Reputation - Rob Van Slyke 4-2010vertical traction
 
How To Build A Bulk Email Sending Application In PHP
How To Build A Bulk Email Sending Application In PHPHow To Build A Bulk Email Sending Application In PHP
How To Build A Bulk Email Sending Application In PHPSudheer Satyanarayana
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 

Similar to cPanel: Information about Useful Terms (20)

Some useful c panel terms
Some useful c panel termsSome useful c panel terms
Some useful c panel terms
 
cPanel: Brief Glossary
cPanel: Brief GlossarycPanel: Brief Glossary
cPanel: Brief Glossary
 
Useful Terms Related to the World Wide Web
Useful Terms Related to the World Wide Web Useful Terms Related to the World Wide Web
Useful Terms Related to the World Wide Web
 
Useful Terms Related to cPanel & WHM
Useful Terms Related to cPanel & WHMUseful Terms Related to cPanel & WHM
Useful Terms Related to cPanel & WHM
 
Ways to Prevent Email Abuse
Ways to Prevent Email AbuseWays to Prevent Email Abuse
Ways to Prevent Email Abuse
 
Massive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on RailsMassive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on Rails
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
 
Copying Addon Domains to a New Account
Copying Addon Domains to a New AccountCopying Addon Domains to a New Account
Copying Addon Domains to a New Account
 
Pmw2 k3ni 1-3a
Pmw2 k3ni 1-3aPmw2 k3ni 1-3a
Pmw2 k3ni 1-3a
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
 
Frequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanelFrequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanel
 
Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5
 
How to Manage Your Email Reputation - Rob Van Slyke 4-2010
How to Manage Your Email Reputation - Rob Van Slyke 4-2010How to Manage Your Email Reputation - Rob Van Slyke 4-2010
How to Manage Your Email Reputation - Rob Van Slyke 4-2010
 
How To Build A Bulk Email Sending Application In PHP
How To Build A Bulk Email Sending Application In PHPHow To Build A Bulk Email Sending Application In PHP
How To Build A Bulk Email Sending Application In PHP
 
ecm
ecmecm
ecm
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 

More from HTS Hosting

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress HostingHTS Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingHTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated ServersHTS Hosting
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server PlansHTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated ServersHTS Hosting
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting SolutionsHTS Hosting
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager SetupHTS Hosting
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting PlansHTS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingHTS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreHTS Hosting
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business WebsiteHTS Hosting
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting TermsHTS Hosting
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersHTS Hosting
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingHTS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball ContentsHTS Hosting
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated ServersHTS Hosting
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans HTS Hosting
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansHTS Hosting
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting ServicesHTS Hosting
 

More from HTS Hosting (20)

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 

Recently uploaded

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfSeasiaInfotech2
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
The Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdfThe Future of Software Development - Devin AI Innovative Approach.pdf
The Future of Software Development - Devin AI Innovative Approach.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 

cPanel: Information about Useful Terms

  • 2. Table of Contents 2 Backscatter Backup Bandwidth Berkeley Internet Name Domain (BIND) Bayes Testing (Bayesian Spam Filtering) Blackhole (Black Hole) Blacklist Blocker Bounce Message BoxTrapper BoxTrapper Blacklist BoxTrapper Ignore List BoxTrapper Whitelist Branding Brute Force Attack Build
  • 3.  It is the term that is used for bounced email messages (or failed Delivery Status Notifications) that have been sent erroneously by the system to a domain. This happens when an attacker forges the domain’s name as the sender of spam. SPF should be used on the user’s mail server, so that backscatter can be reduced. Other terms that are used for it are outscatter, collateral spam and misdirected bounces. 3 Backscatter
  • 4.  It refers to a copy of the files, databases, directories and email configurations related to a user’s website or server. It is recommended that the users of cPanel keep a backup of their website and the system administrators create account and server backups frequently. 4 Backup
  • 5.  It is the total size of all of the files that a system transfers to the computer of the visitors. Whenever a website visitor views a file (image, audio and video file) it is transferred by the server to the visitor’s computer. The bandwidth of a site owner is often limited by web hosting providers. This is done to prevent it from affecting the server’s performance. Bandwidth’s usage can be checked by cPanel users in the “Bandwidth” interface in cpanel by clicking on cPanel >> Home >> Metrics >> Bandwidth. 5 Bandwidth
  • 6. 6 1-800-123 -8156 Whoa!That’s a big number, aren’t you proud?
  • 7.  It refers to the most used DNS server software and is also referred to as named. It is meant to perform the main DNS server roles by functioning as an authoritative name server with regard to domains and working in the network as a recursive resolver.  Since cPanel is a web hosting control panel, it is important to mention the concept of web hosting, which refers to the services and technology provided by a web hosting provider that makes a website accessible over the Internet.  Terms that indicate a web hosting company are “Top Cloud Hosting Company”, the “Best Windows Hosting Company in India” and even “Website Hosting Companies in India”. Certain other terms can also be used for web hosting service providers. 7 Berkeley Internet Name Domain (BIND)
  • 8.  It is that process which aids in filtering spam, based on statistics. In this method tokens (usually words) in emails are used, to ascertain whether an incoming message is spam or not. It relies on Bayesian statistics. Spam filters can be created in the “Spam Filters” interface in cPanel. This can be done by following the path, cPanel -> Home -> Email -> Spam Filters. 8 BayesTesting (Bayesian Spam Filtering)
  • 9.  It is one of the options related to the handling of mail, which is received by the default or catch-all email addresses of cPanel users. In this option mail is discarded after the server has accepted it. Hence, it might lead to the users receiving additional spam. In order to create filters in cPanel’s Spam Filters interface, click on cPanel -> Home -> Email -> Spam Filters. 9 Blackhole (Black Hole)
  • 10. It is a method that relates to access control for privileges. It is meant for a defined list of users, network addresses or programs. 10 Blacklist
  • 11. Blocker It refers to a condition that is discovered by the system, which prevents the system from performing a version update. Compatibility checks are performed by the cPanel & WHM update process, in order to identify blockers prior to upgrading to a new version.
  • 12. Bounce Message It is an email reply that is meant to inform the sender about a problem with email delivery. To digress, certain terms are used to refer to web hosting service providers. These are “Top Cloud Hosting Company”, the “Best Windows Hosting Company in India” and even “Website Hosting Companies in India”, to name a few.
  • 13. BoxTrapper It is an application. In it the senders need to reply to verification emails. It uses challenge-response verification to filter spam. In it the system accepts the original email, post the sender replying to the verification message. It can be configured by following the path, cPanel -> Home -> Email -> BoxTrapper.
  • 14. BoxTrapper Blacklist It refers to a list of incoming email addresses that is blocked automatically by the BoxTrapper application. A configurable warning message is sent automatically by the cPanel upon receiving any mail from a blacklisted address.
  • 15. BoxTrapper Ignore List It is that list of incoming email addresses that is ignored automatically by the BoxTrapper.
  • 16. BoxTrapper Whitelist It refers to a list of incoming email addresses that is accepted automatically by the BoxTrapper.
  • 17. Branding It refers to the changes in the cPanel’s interface that are done to match a user’s company’s logo as well as brand. Updates to image assets or text labels are also included in such changes.
  • 18. Brute Force Attack It is a cyber-attack which entails the attacker entering a large number of characters’ combination in order to decrypt a key. WHM includes cPHulk. It is a protective measure that lets the user lock out brute force attackers, once a specified number of failed attempts are reached.
  • 19. Build It refers to the release of cPanel & WHM, which uses a specific version number.