SlideShare a Scribd company logo
cPanel Information
about UsefulTerms
Table of Contents
2
Backscatter
Backup
Bandwidth
Berkeley Internet Name Domain (BIND)
Bayes Testing (Bayesian Spam Filtering)
Blackhole (Black Hole)
Blacklist
Blocker
Bounce Message
BoxTrapper
BoxTrapper Blacklist
BoxTrapper Ignore List
BoxTrapper Whitelist
Branding
Brute Force Attack
Build
 It is the term that is used for bounced email messages (or failed Delivery
Status Notifications) that have been sent erroneously by the system to a
domain. This happens when an attacker forges the domain’s name as the
sender of spam. SPF should be used on the user’s mail server, so that
backscatter can be reduced. Other terms that are used for it are outscatter,
collateral spam and misdirected bounces.
3
Backscatter
 It refers to a copy of the files, databases, directories and email configurations
related to a user’s website or server. It is recommended that the users of cPanel
keep a backup of their website and the system administrators create account and
server backups frequently.
4
Backup
 It is the total size of all of the files that a system transfers to the computer of the
visitors. Whenever a website visitor views a file (image, audio and video file) it is
transferred by the server to the visitor’s computer. The bandwidth of a site owner
is often limited by web hosting providers. This is done to prevent it from affecting
the server’s performance. Bandwidth’s usage can be checked by cPanel users in the
“Bandwidth” interface in cpanel by clicking on cPanel >> Home >> Metrics >>
Bandwidth.
5
Bandwidth
6
1-800-123 -8156
Whoa!That’s a big number, aren’t
you proud?
 It refers to the most used DNS server software and is also referred to as named. It
is meant to perform the main DNS server roles by functioning as an authoritative
name server with regard to domains and working in the network as a recursive
resolver.
 Since cPanel is a web hosting control panel, it is important to mention the concept
of web hosting, which refers to the services and technology provided by a web
hosting provider that makes a website accessible over the Internet.
 Terms that indicate a web hosting company are “Top Cloud Hosting Company”, the
“Best Windows Hosting Company in India” and even “Website Hosting Companies
in India”. Certain other terms can also be used for web hosting service providers.
7
Berkeley Internet Name Domain
(BIND)
 It is that process which aids in filtering spam, based on statistics. In this method
tokens (usually words) in emails are used, to ascertain whether an incoming
message is spam or not. It relies on Bayesian statistics. Spam filters can be created
in the “Spam Filters” interface in cPanel. This can be done by following the path,
cPanel -> Home -> Email -> Spam Filters.
8
BayesTesting (Bayesian Spam
Filtering)
 It is one of the options related to the handling of mail, which is received by the
default or catch-all email addresses of cPanel users. In this option mail is discarded
after the server has accepted it. Hence, it might lead to the users receiving
additional spam. In order to create filters in cPanel’s Spam Filters interface, click on
cPanel -> Home -> Email -> Spam Filters.
9
Blackhole (Black Hole)
It is a method that relates to access control for privileges. It is meant for a
defined list of users, network addresses or programs.
10
Blacklist
Blocker
It refers to a condition that is discovered by the system, which prevents
the system from performing a version update. Compatibility checks are
performed by the cPanel & WHM update process, in order to identify
blockers prior to upgrading to a new version.
Bounce Message
It is an email reply that is meant to inform the sender about a problem with email
delivery.
To digress, certain terms are used to refer to web hosting service providers. These are
“Top Cloud Hosting Company”, the “Best Windows Hosting Company in India” and
even “Website Hosting Companies in India”, to name a few.
BoxTrapper
It is an application. In it the senders need to reply to verification emails. It uses
challenge-response verification to filter spam. In it the system accepts the original email,
post the sender replying to the verification message. It can be configured by following
the path, cPanel -> Home -> Email -> BoxTrapper.
BoxTrapper Blacklist
It refers to a list of incoming email addresses that is blocked automatically by
the BoxTrapper application. A configurable warning message is sent automatically by the
cPanel upon receiving any mail from a blacklisted address.
BoxTrapper Ignore List
It is that list of incoming email addresses that is ignored automatically by
the BoxTrapper.
BoxTrapper Whitelist
It refers to a list of incoming email addresses that is accepted automatically by
the BoxTrapper.
Branding
It refers to the changes in the cPanel’s interface that are done to match a user’s
company’s logo as well as brand. Updates to image assets or text labels are also
included in such changes.
Brute Force Attack
It is a cyber-attack which entails the attacker entering a large number of
characters’ combination in order to decrypt a key. WHM includes cPHulk.
It is a protective measure that lets the user lock out brute force attackers,
once a specified number of failed attempts are reached.
Build
It refers to the release of cPanel & WHM, which uses a specific version
number.
20
Thanks!
ANY QUESTIONS?
www.htshosting.org
www.htshosting.org/best-web-hosting-company-India
www.htshosting.org/best-windows-hosting
www.htshosting.org/best-cloud-hosting-company

More Related Content

What's hot

Seo2 india devang barot - google public dns
Seo2 india   devang barot - google public dnsSeo2 india   devang barot - google public dns
Seo2 india devang barot - google public dns
SEO2India - Devang Barot - SEO2India
 
10135 a 05
10135 a 0510135 a 05
10135 a 05Bố Su
 
Dhcp Server Linux Server
Dhcp Server Linux ServerDhcp Server Linux Server
Dhcp Server Linux Servermuh kemal
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
Mahmmoud Mahdi
 
Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)
Paulo Bischof
 
DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)
Tola LENG
 
NetScaler Web2.0 Push Technology Overview
NetScaler Web2.0 Push Technology OverviewNetScaler Web2.0 Push Technology Overview
NetScaler Web2.0 Push Technology Overview
kvamsi
 
Networking in Java
Networking in JavaNetworking in Java
Networking in Java
Gaurav Agarwal
 
Important Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel UsersImportant Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel Users
HTS Hosting
 

What's hot (12)

Seo2 india devang barot - google public dns
Seo2 india   devang barot - google public dnsSeo2 india   devang barot - google public dns
Seo2 india devang barot - google public dns
 
10135 a 05
10135 a 0510135 a 05
10135 a 05
 
Dhcp Server Linux Server
Dhcp Server Linux ServerDhcp Server Linux Server
Dhcp Server Linux Server
 
Article on SMPT
Article on SMPTArticle on SMPT
Article on SMPT
 
Lession4 Dhcp
Lession4 DhcpLession4 Dhcp
Lession4 Dhcp
 
Lesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol BLesson 6: Dynamic Host Configuration Protocol B
Lesson 6: Dynamic Host Configuration Protocol B
 
Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)Protocolos de E-mail (SMTP, POP e IMAP)
Protocolos de E-mail (SMTP, POP e IMAP)
 
DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)DNS windows server(2008R2) & linux(SLES 11)
DNS windows server(2008R2) & linux(SLES 11)
 
Nagios
NagiosNagios
Nagios
 
NetScaler Web2.0 Push Technology Overview
NetScaler Web2.0 Push Technology OverviewNetScaler Web2.0 Push Technology Overview
NetScaler Web2.0 Push Technology Overview
 
Networking in Java
Networking in JavaNetworking in Java
Networking in Java
 
Important Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel UsersImportant Terms that are Encountered Frequently by cPanel Users
Important Terms that are Encountered Frequently by cPanel Users
 

Similar to cPanel: Information about Useful Terms

Some useful c panel terms
Some useful c panel termsSome useful c panel terms
Some useful c panel terms
HTS Hosting
 
cPanel: Brief Glossary
cPanel: Brief GlossarycPanel: Brief Glossary
cPanel: Brief Glossary
HTS Hosting
 
Useful Terms Related to the World Wide Web
Useful Terms Related to the World Wide Web Useful Terms Related to the World Wide Web
Useful Terms Related to the World Wide Web
HTS Hosting
 
Useful Terms Related to cPanel & WHM
Useful Terms Related to cPanel & WHMUseful Terms Related to cPanel & WHM
Useful Terms Related to cPanel & WHM
Mr. Rajendra Mishra
 
Ways to Prevent Email Abuse
Ways to Prevent Email AbuseWays to Prevent Email Abuse
Ways to Prevent Email Abuse
HTS Hosting
 
Massive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on RailsMassive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on Rails
ibelmonte
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
OWASP Delhi
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
KVH Co. Ltd.
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
CoLaboraDK
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
B2BCamp
 
Copying Addon Domains to a New Account
Copying Addon Domains to a New AccountCopying Addon Domains to a New Account
Copying Addon Domains to a New Account
HTS Hosting
 
Pmw2 k3ni 1-3a
Pmw2 k3ni 1-3aPmw2 k3ni 1-3a
Pmw2 k3ni 1-3ahariclant1
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beau Bullock
 
Frequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanelFrequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanel
HTS Hosting
 
Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5
SURBHI SAROHA
 
How to Manage Your Email Reputation - Rob Van Slyke 4-2010
How to Manage Your Email Reputation - Rob Van Slyke 4-2010How to Manage Your Email Reputation - Rob Van Slyke 4-2010
How to Manage Your Email Reputation - Rob Van Slyke 4-2010
vertical traction
 
How To Build A Bulk Email Sending Application In PHP
How To Build A Bulk Email Sending Application In PHPHow To Build A Bulk Email Sending Application In PHP
How To Build A Bulk Email Sending Application In PHP
Sudheer Satyanarayana
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)webhostingguy
 

Similar to cPanel: Information about Useful Terms (20)

Some useful c panel terms
Some useful c panel termsSome useful c panel terms
Some useful c panel terms
 
cPanel: Brief Glossary
cPanel: Brief GlossarycPanel: Brief Glossary
cPanel: Brief Glossary
 
Useful Terms Related to the World Wide Web
Useful Terms Related to the World Wide Web Useful Terms Related to the World Wide Web
Useful Terms Related to the World Wide Web
 
Useful Terms Related to cPanel & WHM
Useful Terms Related to cPanel & WHMUseful Terms Related to cPanel & WHM
Useful Terms Related to cPanel & WHM
 
Ways to Prevent Email Abuse
Ways to Prevent Email AbuseWays to Prevent Email Abuse
Ways to Prevent Email Abuse
 
Massive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on RailsMassive emailing with Linux, Postfix and Ruby on Rails
Massive emailing with Linux, Postfix and Ruby on Rails
 
DMARC Overview
DMARC OverviewDMARC Overview
DMARC Overview
 
KVH MailScan MX
KVH MailScan MXKVH MailScan MX
KVH MailScan MX
 
CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015 CoLabora - Exchange Online Protection - June 2015
CoLabora - Exchange Online Protection - June 2015
 
B2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the InboxB2B Email Deliverability - Getting to the Inbox
B2B Email Deliverability - Getting to the Inbox
 
Copying Addon Domains to a New Account
Copying Addon Domains to a New AccountCopying Addon Domains to a New Account
Copying Addon Domains to a New Account
 
Pmw2 k3ni 1-3a
Pmw2 k3ni 1-3aPmw2 k3ni 1-3a
Pmw2 k3ni 1-3a
 
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
Beyond the Pentest: How C2, Internal Pivoting, and Data Exfiltration Show Tru...
 
Frequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanelFrequently Used Terms Related to cPanel
Frequently Used Terms Related to cPanel
 
Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5Web hosting and concepts of SEO UNIT 5
Web hosting and concepts of SEO UNIT 5
 
How to Manage Your Email Reputation - Rob Van Slyke 4-2010
How to Manage Your Email Reputation - Rob Van Slyke 4-2010How to Manage Your Email Reputation - Rob Van Slyke 4-2010
How to Manage Your Email Reputation - Rob Van Slyke 4-2010
 
How To Build A Bulk Email Sending Application In PHP
How To Build A Bulk Email Sending Application In PHPHow To Build A Bulk Email Sending Application In PHP
How To Build A Bulk Email Sending Application In PHP
 
ecm
ecmecm
ecm
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 
Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)Symantec AntiSpam Complete Overview (PowerPoint)
Symantec AntiSpam Complete Overview (PowerPoint)
 

More from HTS Hosting

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
HTS Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
HTS Hosting
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
HTS Hosting
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
HTS Hosting
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
HTS Hosting
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
HTS Hosting
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
HTS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
HTS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
HTS Hosting
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
HTS Hosting
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
HTS Hosting
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
HTS Hosting
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
HTS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
HTS Hosting
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
HTS Hosting
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
HTS Hosting
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
HTS Hosting
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
HTS Hosting
 

More from HTS Hosting (20)

Web Hosting and WordPress Hosting
Web Hosting and WordPress HostingWeb Hosting and WordPress Hosting
Web Hosting and WordPress Hosting
 
Availing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS HostingAvailing Windows Dedicated Servers of HTS Hosting
Availing Windows Dedicated Servers of HTS Hosting
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Linux Dedicated Server Plans
Linux Dedicated Server PlansLinux Dedicated Server Plans
Linux Dedicated Server Plans
 
HTS Dedicated Servers
HTS Dedicated ServersHTS Dedicated Servers
HTS Dedicated Servers
 
Common Web Hosting Solutions
Common Web Hosting SolutionsCommon Web Hosting Solutions
Common Web Hosting Solutions
 
Basic Web Host Manager Setup
Basic Web Host Manager SetupBasic Web Host Manager Setup
Basic Web Host Manager Setup
 
Essential Features in Web Hosting Plans
Essential Features in Web Hosting PlansEssential Features in Web Hosting Plans
Essential Features in Web Hosting Plans
 
VPS Hosting
VPS HostingVPS Hosting
VPS Hosting
 
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS HostingDifference Between Managed VPS Hosting Self-Managed VPS Hosting
Difference Between Managed VPS Hosting Self-Managed VPS Hosting
 
Web Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and MoreWeb Hosting, Web Servers, Web Hosts and More
Web Hosting, Web Servers, Web Hosts and More
 
Know about Hosting a Business Website
Know about Hosting a Business WebsiteKnow about Hosting a Business Website
Know about Hosting a Business Website
 
Web Hosting Terms
Web Hosting TermsWeb Hosting Terms
Web Hosting Terms
 
Reseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web ServersReseller Hosting and Dedicated Web Servers
Reseller Hosting and Dedicated Web Servers
 
Reseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS HostingReseller Hosting and Managed VPS Hosting
Reseller Hosting and Managed VPS Hosting
 
Backup Tarball Contents
Backup Tarball ContentsBackup Tarball Contents
Backup Tarball Contents
 
VPS and Dedicated Servers
VPS and Dedicated ServersVPS and Dedicated Servers
VPS and Dedicated Servers
 
Best WordPress Hosting Plans
Best WordPress Hosting Plans Best WordPress Hosting Plans
Best WordPress Hosting Plans
 
Best Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting PlansBest Linux Dedicated Hosting Plans
Best Linux Dedicated Hosting Plans
 
Different Types of Web Hosting Services
Different Types of Web Hosting ServicesDifferent Types of Web Hosting Services
Different Types of Web Hosting Services
 

Recently uploaded

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
DianaGray10
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
ViralQR
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
UiPathCommunity
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
Dorra BARTAGUIZ
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
Jemma Hussein Allen
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Thierry Lestable
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 

Recently uploaded (20)

Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4UiPath Test Automation using UiPath Test Suite series, part 4
UiPath Test Automation using UiPath Test Suite series, part 4
 
Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.Welocme to ViralQR, your best QR code generator.
Welocme to ViralQR, your best QR code generator.
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
Empowering NextGen Mobility via Large Action Model Infrastructure (LAMI): pav...
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 

cPanel: Information about Useful Terms

  • 2. Table of Contents 2 Backscatter Backup Bandwidth Berkeley Internet Name Domain (BIND) Bayes Testing (Bayesian Spam Filtering) Blackhole (Black Hole) Blacklist Blocker Bounce Message BoxTrapper BoxTrapper Blacklist BoxTrapper Ignore List BoxTrapper Whitelist Branding Brute Force Attack Build
  • 3.  It is the term that is used for bounced email messages (or failed Delivery Status Notifications) that have been sent erroneously by the system to a domain. This happens when an attacker forges the domain’s name as the sender of spam. SPF should be used on the user’s mail server, so that backscatter can be reduced. Other terms that are used for it are outscatter, collateral spam and misdirected bounces. 3 Backscatter
  • 4.  It refers to a copy of the files, databases, directories and email configurations related to a user’s website or server. It is recommended that the users of cPanel keep a backup of their website and the system administrators create account and server backups frequently. 4 Backup
  • 5.  It is the total size of all of the files that a system transfers to the computer of the visitors. Whenever a website visitor views a file (image, audio and video file) it is transferred by the server to the visitor’s computer. The bandwidth of a site owner is often limited by web hosting providers. This is done to prevent it from affecting the server’s performance. Bandwidth’s usage can be checked by cPanel users in the “Bandwidth” interface in cpanel by clicking on cPanel >> Home >> Metrics >> Bandwidth. 5 Bandwidth
  • 6. 6 1-800-123 -8156 Whoa!That’s a big number, aren’t you proud?
  • 7.  It refers to the most used DNS server software and is also referred to as named. It is meant to perform the main DNS server roles by functioning as an authoritative name server with regard to domains and working in the network as a recursive resolver.  Since cPanel is a web hosting control panel, it is important to mention the concept of web hosting, which refers to the services and technology provided by a web hosting provider that makes a website accessible over the Internet.  Terms that indicate a web hosting company are “Top Cloud Hosting Company”, the “Best Windows Hosting Company in India” and even “Website Hosting Companies in India”. Certain other terms can also be used for web hosting service providers. 7 Berkeley Internet Name Domain (BIND)
  • 8.  It is that process which aids in filtering spam, based on statistics. In this method tokens (usually words) in emails are used, to ascertain whether an incoming message is spam or not. It relies on Bayesian statistics. Spam filters can be created in the “Spam Filters” interface in cPanel. This can be done by following the path, cPanel -> Home -> Email -> Spam Filters. 8 BayesTesting (Bayesian Spam Filtering)
  • 9.  It is one of the options related to the handling of mail, which is received by the default or catch-all email addresses of cPanel users. In this option mail is discarded after the server has accepted it. Hence, it might lead to the users receiving additional spam. In order to create filters in cPanel’s Spam Filters interface, click on cPanel -> Home -> Email -> Spam Filters. 9 Blackhole (Black Hole)
  • 10. It is a method that relates to access control for privileges. It is meant for a defined list of users, network addresses or programs. 10 Blacklist
  • 11. Blocker It refers to a condition that is discovered by the system, which prevents the system from performing a version update. Compatibility checks are performed by the cPanel & WHM update process, in order to identify blockers prior to upgrading to a new version.
  • 12. Bounce Message It is an email reply that is meant to inform the sender about a problem with email delivery. To digress, certain terms are used to refer to web hosting service providers. These are “Top Cloud Hosting Company”, the “Best Windows Hosting Company in India” and even “Website Hosting Companies in India”, to name a few.
  • 13. BoxTrapper It is an application. In it the senders need to reply to verification emails. It uses challenge-response verification to filter spam. In it the system accepts the original email, post the sender replying to the verification message. It can be configured by following the path, cPanel -> Home -> Email -> BoxTrapper.
  • 14. BoxTrapper Blacklist It refers to a list of incoming email addresses that is blocked automatically by the BoxTrapper application. A configurable warning message is sent automatically by the cPanel upon receiving any mail from a blacklisted address.
  • 15. BoxTrapper Ignore List It is that list of incoming email addresses that is ignored automatically by the BoxTrapper.
  • 16. BoxTrapper Whitelist It refers to a list of incoming email addresses that is accepted automatically by the BoxTrapper.
  • 17. Branding It refers to the changes in the cPanel’s interface that are done to match a user’s company’s logo as well as brand. Updates to image assets or text labels are also included in such changes.
  • 18. Brute Force Attack It is a cyber-attack which entails the attacker entering a large number of characters’ combination in order to decrypt a key. WHM includes cPHulk. It is a protective measure that lets the user lock out brute force attackers, once a specified number of failed attempts are reached.
  • 19. Build It refers to the release of cPanel & WHM, which uses a specific version number.