Web Hosting

1. Will you place ads on my site?

We will NOT place ads on your site.

2. Do you allow sites to advertise for money, on their web site?

Yes, we allow sites to have commercial advertisements.

3. What forms of payment do you accept?

Credit Card - Visa and MasterCard

4. Are your server's Unix, or NT?

We are using Linux on i686 architecture.

5. What control panel do you use and do you have a demo?

The control panel we use is called Cpanel. A tutorial of Cpanel can be found here

6. How long does it take to setup my account?

Your account will be setup within 24 hours of ordering.

7. Are there any hidden costs, or setup fees?


8. Do you offer telnet or shell access?

No due to security reason's we do not offer telnet or shell access.You are still able to unzip files on the server using our file manager as well as the ability to setup cron jobs.

9. Can I password protect directories?

Yes you can password protect directory's within CPanel.

Web Hosting - DNS

1. How long does it take to get my domain working?

It usually takes 24-48 hours for a domain to fully propagate.

2. Do you have a manual for our control panel?

3. Where do I go to login to my control panel?

4. How do I make sub-domains?

To make a sub-domain login to your control panel and click "domain management" inside of domain management you will see a place to manage and add sub-domains.

Web Hosting - FTP

1. Where can I download a free FTP?

We recommend downloading Smart FTP from here

2. It's not letting me upload my files what's wrong?

Make sure you are uploading to the right web directory which is the public_html folder.

3. Why doesn't my ftp password change when I change my Cpanel password?

Please allow 24 hours for your FTP password to sync with your Cpanel password.

Web Hosting - Paths

1. What is the path to my users files?

The path is /home/username/public_html

2. What is the local path to perl?


3. What is the path to curl?


4. What is the path to ImageMagick?


5. What is the path to convert for ImageMagick?

The path to convert is /usr/bin/

6. What is the path to sendmail?

The path to sendmail is /usr/sbin/sendmail

Web Hosting - Email

1. How do I create email accounts?

To create an email account login to your control panel and click add/remove email account's.

2. What do I put for both incoming and outgoing mail server?

For both incoming and outgoing mail server put

3. Where do I go to check my emails using my browser?

4. How can I setup webmail to go directly to horde, neomail or squirrel mail?

Login to the one you prefer to use after doing so copy the entire url from your address bar. You will not login to your cpanel and create a subdomain to go to the address you just copied.

Web Hosting - CGI/ASP/PHP/PERL/MySql

1. None of my cgi scripts are working on the server. How do I get them to work?

Make sure that they are chmoded to 755

2. How do I create databases and manage them?

Login to your cpanel and click MySQL Databases. After your database is created you can manage it from phpmyadmin. This can be found at the very bottom of the MySQL page.

3. What version of php are you using?

We are using version 5.2.51

4. What version of perl are you using?

We are using version 5.8.8.

5. What version of MySQL are you using?

We are using version 5.1.52.

Web Hosting - Billing

1. How do I get the 30 day money back?

Simply email us your username, password, and why you wish to cancel within thirty days, and we process your refund in less then 24 hours.

2. How do I make a payment?

All online payments are recurring. Your payment will automatically be deducted.

3. How do I stop billing?

If you wish to close your account simply email us your username, password, and why you wish to cancel. You must also include "I give you permission to delete my website and all of it's content."

SiteLock™ Security for Smallbiz

1. What is SiteLock and what does it do?

SiteLock is a service that performs daily scans of a website to identify vulnerabilities and protect against threats like viruses, cross-site scripting, SQL injection and even email blacklisting. The SiteLock™ Trust Seal provides customer confidence and increases your sales and conversions.

2. What types of problems does SiteLock scan for?

SiteLock performs a Deep 360 Scan that encompasses:

bullet Reputation monitoring: ensures the reputation of the website is intact and communication to visitors and customers is uninterrupted.

bullet Malware blacklist: monitors search engine and proprietary malware lists to make sure the site is not blocked by search engines and browsers.

bullet Spam blacklist: ensures that e-mails reach customers' inbox (not their Spam folder), SiteLock verifies e-mail addresses, domains, and email servers against lists used by popular email tools to identify spam.

bullet SSL Verification: ensures users do not see a certificate warning or error when visiting your site.

bullet Network security: validates the security of the network by making sure there is no opportunity for hackers to access the server.

bullet Drive-by-downloads: scans the website to ensure visitors are not being infected with viruses often placed on websites by hackers.

bullet Customer data protection (SQL & XSS): performs forward- and backward-looking scans to make sure current and future visitor/customer data on the site is secure.

bullet Application security: verifies that any 3rd-party applications installed on your website are secure and up-to-date.

bullet Business Verification: certifies the validity of the business and provides a certification badge to display to website visitors to let them know the business or website is legitimate.

bullet Domain ownership: ensures that the domain owner is in control of the website domain.

bullet Postal Address: verifies that the site owner can receive and respond to postal mail, such as customer payments or inquiries.

bullet Phone Verification: ensures that there is a phone number where customers can report issues or request additional products or services.

3. How is SiteLock billed?

SiteLock is a subscription service billed for in advance and available in one-year terms.

4. How does SiteLock notify customers when it finds an issue?

SiteLock will inform the site owner by email, and with an alert in the SiteLock Dashboard. The report will provide complete information about the issue that is found along with help to remove it.

5. What happens if SiteLock finds a vulnerability? Will the SiteLock seal tell visitors that a website has failed?

Site visitors will not be alerted to any problem. The SiteLock seal will simply continue to display the date of the last good scan of the website site. If the site owner fails to rectify the problem, within a few days SiteLock will remove the seal from the site and replace it with a single pixel transparent image. At no point will SiteLock display any indication to visitors that a website has failed a scan.

6. Does SiteLock work with any hosting company, server and software?


7. Will SiteLock impact website performance?

No. SiteLock scans won't impact the performance of a website. The SiteLock seal has no impact on load times.

8. How do I install the SiteLock seal?

Users simply include the JavaScript snippet that SiteLock provides in the footer area of their site or template.

9. Can a SiteLock service subscription be upgraded?

Yes. Customers can upgrade from SiteLock Basic to SiteLock Premium or SiteLock SMB Enterprise, or from SiteLock Premium to SiteLock SMB Enterprise. Downgrades are not possible. When a subscription is upgraded, the expiry date for the subscription is reset to one year from when the order is submitted.

TRUSTe Privacy Policy

1. Who is TRUSTe?

TRUSTe, founded in 1997, is the leading online privacy solutions provider. The company offers a broad suite of privacy services to help businesses build trust and increase engagement across all of their online channels including websites, mobile applications, advertising, cloud services, business analytics and email marketing.

Over 4,000 web properties including those from top companies like Apple, AT&T, Disney, eBay, Facebook, HP, Microsoft, Nationwide and Yelp rely on TRUSTe to ensure compliance with evolving and complex privacy requirements.

Based upon the comprehensive privacy model of Truth in Privacy, which is laid on a foundation of transparency, choice and accountability regarding the collection and use of personal information, TRUSTe’s privacy seal is recognized and trusted by millions of consumers as a sign of responsible privacy practices.

2. What does TRUSTe Privacy Policy service do?

The TRUSTe Privacy Policy service provides a wizard-based system that helps users create a valid, understandable privacy policy that properly reflects the practices used in collecting and sharing information about visitors and/or customers.

TRUSTe Privacy Policy with Seal includes an initial scan and certification, along with a seal that displays when TRUSTe certifies a web site's Privacy Policy. TRUSTe performs additional periodic scans to help preserve consistency between the privacy policy and practices.

3. What's the difference between TRUSTe Privacy Policy and TRUSTe Privacy Policy with Seal?

The Privacy Policy with Seal includes both a verification scan to ensure accuracy and completeness in the privacy policy, as well as a Certified Privacy seal that can be displayed on the website. The TRUSTe Privacy service doesn't include a verification scan and therefore, doesn't provide the ability to display the Certified Privacy seal. The Privacy Policy wizard is the same in both cases.

4. In which countries can the TRUSTe Privacy Policy be used or sold?

TRUSTe Privacy Policy is available to customers in the following countries:

bullet Australia

bullet Austria

bullet Belgium

bullet Bulgaria

bullet Canada

bullet Cyprus

bullet Czech Republic

bullet Denmark

bullet Estonia

bullet Finland

bullet France

bullet Germany

bullet Greece

bullet Hungry

bullet Iceland

bullet Italy

bullet Latvia

bullet Liechtenstein

bullet Lithuania

bullet Luxembourg

bullet Malta

bullet New Zealand

bullet Norway

bullet Poland

bullet Portugal

bullet Republic of Ireland

bullet Romania

bullet Singapore

bullet Slovakia

bullet Slovenia

bullet Sweden

bullet Switzerland

bullet The Netherlands

bullet United Kingdom

bullet United States

5. Why should I use TRUSTe Privacy Policy?

Consumer confidence in how their privacy is protected is key to a successful online business. When TRUSTe certifies a Web site, customers get over a decade of expertise in the issues that matter most in online privacy.

6. Does TRUSTe check to see if the Privacy Policy is correct?

Yes, in the case of the TRUSTe Privacy Policy with Seal. TRUSTe performs a series of checks (both automated and manual) to ensure that the privacy policy is accurate. TRUSTe will often suggest changes to the generated Privacy Policy based on what it finds during these verification checks. It may take up to two days to complete this verification.

For TRUSTe Privacy Policy (without seal), it's up to the user to input correct information during the creation of the policy. TRUSTe's wizard provides an easy-to-use wizard that helps ensure that the generated policy is accurate. In this case, the policy is provided immediately.

7. Why does the verification take up to two days?

TRUSTe performs a series of automated and manual scans and checks to ensure that the privacy policy is accurate. This process can take as long as a couple of days, but ensures that the TRUSTe Policy is accurate, and allows the display of the TRUSTe Certified Privacy.

8. How does the Seal or link to the Privacy Policy get added to a website?

For the TRUSTe Privacy Policy (without seal), TRUSTe provides HTML code that links to the privacy policy (hosted by TRUSTe). For users of the TRUSTe Privacy Policy with Seal, TRUSTe provides a JavaScript code snippet that displays the TRUSTe Certified Privacy seal which includes a link to information about the user's company and to the hosted privacy policy.

9. What happens if changes are required to the Privacy Policy?

No problem. Users can simply log in and make any required changes. This can be done at any time, and users can make as many changes as required over the length of the TRUSTe subscription.

10. Who takes responsibility for creating and maintaining the TRUSTe Privacy Policy?

TRUSTe provides Program Requirements that outline user responsibilities. Those requirements can be found at

SSL Certificate

1. What is SSL?

SSL is an acronym for "Secure Sockets Layer" and is a method for establishing a secure, encrypted link between two different systems such as a web browser and a web server.

2. What do SSL Certificates provide?

SSL Certificates provide two important roles for systems that use them:

  1. SSL certificates provide security by encrypting the data between the browser and the web server.

    Data encryption is critical for financial transactions or other situations where websites are requesting sensitive data from visitors. Many web users will not have confidence that their interactions with the website is secure and encrypted, unless they see the lock icon which provides a visual cue that an SSL certificate has been used to protect data.
  2. SSL certificates provide identity verification, through domain and organization validation. Only the verified owner of a domain name may purchase an SSL certificate for that domain. For Organization validated SSL certificates, only verified, approved representatives of the organization are permitted to purchase an SSL certificate for domains in use by the organization.

    Extended Validation (EV) certificates take identity validation even further. Sites with an EV SSL certificate will cause the address bar on the web browser to turn green. Users are able to view information about the website that will help them to confirm that they are dealing with who they believe they are dealing with.

Both applications of SSL Certificates are important for building a trust relationship with end-users that is required before they will pass along personal, or financial information to websites or online service providers.

3. How does SSL work?

In the case of web browsers surfing secure web sites, SSL communication starts with the web browser requesting the digital certificate from the web server. The certificate contains the hostname of the web server, an expiration date of the certificate, the public key of the web server, and is signed by a Certificate Authority. The web browser can validate all of these pieces of information except for the public key of the web server. If all of the verifiable components pass validation, the web browser will generate its own public key and send it back to the web server. When the web browser's public key is sent back to the web server as a response, it uses the web server's public key, which was contained within the certificate, to encrypt the browser's public key being sent. Now both the web server and web browser will be able to communicate with each using secure, encrypted communications because they have exchanged each of their public keys.

4. What is a Wildcard certificate?

A wildcard SSL Certificate helps enable SSL encryption on multiple sub-domains using a single certificate as long as the domains are controlled by the same organization and share the same second-level domain name. For example, a Wildcard certificate issued to Company ABC using the Common Name ("*") may be used to secure subdomains like, and

5. What are Site Seals?

Site Seals are static or dynamic images that can be placed on SSL secured websites that allows visitors to tell at a glance that they can trust who they are dealing with, that the online site is validated and that they can transact safely and securely. Each of the three brands of SSL Certificates offer different site seals:

bullet VeriSign Secured Seal is available with all VeriSign-branded SSL certificates for installation on pages secured with a VeriSign SSL Certificate. Customers not only see the trust mark, they can click the seal and verify the site in real time. More than any other trust mark, 79% of U.S. online shoppers are familiar with the VeriSign Secured Seal.

bullet GeoTrust True Site Seal is available with every GeoTrust SSL Certificate and shows web site visitors that their information is protected. The GeoTrust True Site Seal can be added to home pages, buy pages, log-ins or any other page on your authenticated site where visitors need to verify a web site. Depending on the certificate, True Site Seals are either dynamic or static and may contain further information about the identity of the certificate owner.

bullet thawte Trusted Site Seal is a dynamic image appearing on websites secured with thawte SSL certificates allowing visitors to tell at a glance that they can trust the site, that the online site is validated and that they can transact safely and securely.

6. How does an SSL Certificate create trust in visitors to websites?

Security is a concern for many people who use the Internet. People on the Internet also recognize that websites that use digital certificates are ones that are more secure and trustworthy. Digital certificates give users confidence that their data is protected and they have a reduced risk of their information being divulged beyond the organization they are dealing with.

In addition to having a digital certificate, the Certificate Authorities that OpenSRS uses all offer Trust Seals which allow an image seal to be placed on the website itself. The banner links through to a trusted external organization that further validates the trustworthiness of the website.

7. What are Dynamic vs. Static Site Seals?

A Dynamic Seal is dynamic image displayed on a website that shows the current time and date of when the web page was loaded which indicates that the seal is valid for the domain it is installed on and is current and not expired. When the image is clicked, it will display information from the Certificate Authority about the website's profile which validates the web site's legitimacy. This will give visitors of the website increased confidence in the site's security.

A Static Seal is simply an static graphic image that can be placed on the website to indicate where the digital certificate was obtained from, however there is no click-through validation of the website and the image does not show the current time and date.

8. What is a Root Certificate Authority?

A Root Certificate Authority is the highest level of digital certificate within the trust relationship of certificates. Web browsers, and other applications which use digital certificates, have a limited set of Root Certificates from organizations that have been recognized as Root Certificate Authorities. All certificates they create will include a link back to their Root Certificate so web browsers will understand that the certificate is valid and can be trusted.

Most applications that use digital certificates, such as web browsers, will have a list of the official Certificate Authorities so they are aware they are legitimate and trusted. Certificate Authorities who are not in this list will cause the application to display warnings that the Certificate Authority is unknown, and may also suggest there are security issues associated with unknown Certificate Authorities.

9. What is a public/private key pair?

Public and Private keys are a pair of unique codes used to encrypt data sent to another computer. When a computer wishes to speak securely with another computer, it sends its Public Key to the other computer. This Public Key can be used by the second computer to encrypt information sent back to the first computer.

10. What are practical applications for SSL Certificates?

The perception of SSL Certificates is that they are primarily used to secure the transmission of financial information in ecommerce. But with identity theft on the rise and more and more businesses opening up their networks via the Internet, protecting all types of personally identifiable information (social security numbers, login information, etc.) and key business information is important. SSL Certificates can be used to secure the following:

bullet Web servers

bullet Mail servers

bullet Web forums

bullet Blogging platforms

bullet Control panels

bullet Corporate intra - and extranets

bullet Wikis

bullet VPNs

bullet Customer portals

bullet and more!

11. How can certificates be used to secure additional services other than web servers?

Digital certificates are a method to encrypt communications between two programs, and although they are most commonly used for secure web surfing they can be used for an unlimited number of communications including:

bullet Email

bullet Instant messaging or other communications protocols

bullet FTP servers

12. What are the Validation methods performed?

There are three methods of validation performed:

  1.  Domain-validated certificates: Only the verified owner of the domain name can purchase an SSL certificate for the domain. Validation is done via email sent to the domain owner. Domain validated SSL certificates can be issued very quickly - often in minutes.
  2.  Organization-validated certificates: When corporate identity validation is important, an SSL Certificate for the organization assures customers that the website is trustworthy and secure. Only verified representatives of the organization may purchase these certificates and business licences or other proof is required. The Certificate Authority will verify through phone call to ensure that the certificate request is legitimate.
  3.  Extended Validation (EV) certificates: With Extended Validation, as well as displaying the certificate seal, the address bar is displayed in green, providing customers with an extra level of confidence. The green address bar is a strong visual indication that the site has an Extended Validation Certificate. The Security Status bar displays the organization name and the name of the Certificate Authority (CA).

    In order to be approved for an Extended Validation certificate, the certificate authority will actively check the Organization and the individual applying for the certificate. This is to verify that the Organization is positively the Organization they claim to be, and the individual requesting the certificate is someone who is authorized to request a digital certificate. Extended Validation may take as long as one week to complete.

13. What benefit is there to purchasing a digital certificate with higher assurance?

All certificates ensure that the information transmitted is encrypted and secure, but Extended Validation certificates have additional validation of the organization requesting the certificate. This is indicated in web browsers by turning the address bar green, as well as displaying the organization name contained within the certificate. Users visiting a web site with this level of validation will have a higher amount of confidence in conducting transactions with that site.

14. How many domain names does a certificate secure?

Certificates will only secure one domain name, and depending on the type of cert you obtain, it will be valid for only one hostname beneath that domain name. (ie: only and not

Wildcard certificates are valid for an unlimited amount of hostnames beneath a single domain name. With Wildcard certificates, the computers using,, as well as any other host based on domain will all be able to use the same certificate.

15. What does the green address bar indicate? How does this provide value to those who purchase digital certificates from me?

Web sites using an Extended Validation certificate will cause web browsers to change the address bar to a green colour and also display the name of the Organization the certificate was issued to. Certificate Authorities will only grant Extended Validation certificates to organizations after the Certificate Authority verifies that the genuine organization is requesting the certificate.

The green address bar gives assurance to visitors of the web site that they are definitely visiting a web site run by the organization they should be dealing with, rather than a fraudulent site posing as that organization.

16. How does a Wildcard SSL Certificate Work?

Most types of digital certificates will only secure a computer under a single hostname (ie:, but Wildcard certificates will secure an unlimited number of different hostnames beneath a single domain name. (ie: If you have a large number of servers under a domain name with a variety of hostnames, or you need the flexibility of not being confined to a single hostname, a Wildcard certificate is an excellent option for flexibility, management. It eliminates the need for multiple individual certificate orders for multiple hostnames.

17. Why buy your SSL Certificate from Danipa?

There are a number of reasons digital certificates sold by Danipa are a great choice, including:

bullet Certificates sold through Danipa are compatible with all current web browsers (mobile or desktop) and web servers they will be used with. Their use is not limited to just web servers as they can be used to secure communications with other protocols such as SMTP, IMAP, POP and many more.

bullet There are a variety of certificates at different prices to suit your particular needs and budget.

bullet Certificate purchasing is supported by our excellent Support and Sales staff.

bullet Danipa uses Certificate Authorities who are leaders in the digital certificate industry.

Download our Toolbar to receive products and service offering updates!