Hosting Glossary of Common Terms
Allows visitors to upload and download
specified files from designated directories without usernames
or passwords. Anonymous FTP differs standard "FTP Access" which
requires userames and passwords.
Sends an automated email response
to each incoming message that is sent to a specific address.
Each email address on your account can have a different autoresponder.
An example: Joe sends an email to email@example.com. The autoresponder
for this email address sends an prewritten message back to Joe
Used to supplement
basic HTML to make your website more interactive and functional.
Hit counters, guest books, order forms, and many other useful
features can all be programmed in CGI scripts. crosshosting.com
offers a free library of CGI scripts that you can use to enhance
your web site. All of our plans come with its own local cgi-bin
directory, where you can store custom cgi scripts that you may
have written yourself or found else where on the web.
Used for secure processing of credit
card transactions. CyberCash works with all popular browsers
in the market and other Web store software applications.
Transfer per Month
Each time a web page, image, audio, video, and other elements
of your website is accessed by your visitor, traffic is generated.
Your aggregate traffic is the sum of outward-bound, inward-bound,
email, and anonymous FTP traffic.Your monthly traffic allowance
is calculated as 31 times the daily traffic allowance. Our daily
data transfer allowances are high enough that most of our users
stay within the limit. If your account goes over it will be
upgraded to the plan that the overage fits into. If you feel
it will go over. Your account should be upgraded now. Your
account can be upgraded here.
Usage Statistic/ Access to Raw Log File
crosshosting.com gives you detailed graphical
and tabular usage statistics for your website grouped by weeks,
days, and hours. Using this information, you can track how many
hits you are getting, where those hits are coming from, which
page is the most popular, how much data transfer is occurring,
and more. Access to raw log files allows you to analyze the
usage using even more sophisticated programs.
to your website is stored on disk: your regular html files,
images, multimedia files, anonymous ftp files, POP mail messages,
cgi-scripts and so on.
domain names to point to a common website. This feature is useful
when you want users to be able to access the same web site through
a number of different addresses. An example: Acme Corporation
registers two domain names, A and B. It places its web site
at A, and makes B a domain alias of A. Whenever someone types
in the address of domain B, they are automatically redirected
to domain A.
Computers connected to
the Internet identify each other using numerical IP addresses,
which are very difficult for humans to remember. A Domain Name
is an easy-to-remember Internet address in plain alphabet (such
as "crosshosting.com ") which is translated automatically into
the IP address. A more formal definition is given by InterNIC:
"An addressing construct used for identifying and locating computers
on the Internet. Domain names provide a system of easy-to-remember
Internet addresses, which can be translated by the Domain Name
System (DNS) into the numeric addresses (Internet Protocol (IP)
numbers) used by the network. A domain name is hierarchical
and often conveys information about the type of entity using
the domain name. A domain name is simply a label that represents
a domain, which is a subset of the total domain name space.
Domain names at the same level of the hierarchy must be unique,
for example there can be only one com at the top level of the
hierarchy, and only one netsol.com at the next level of the
In order for visitors to find your website
using the domain name of your choice, you need to do two things.
First, you need to reserve your domain name with InterNIC, the
organization that registers domain names. Second, you need to
provide InterNIC with the nameserver of your domain name, so
that the IP address for your domain name can be disseminated
throughout the Internet.
crosshosting.com can help with both steps. If you order any
of our web hosting plans, we will handle the above process free
of charge. If you are not yet ready to have a web site but want
to reserve just the name, crosshosting.com can handle this procedure
for you also.
names are going fast. Go to our domain
registration page. to register yours!
When email forwarding
is activated, messages sent to a certain email address are forwarded
to another address. For example: Joe sends an email to firstname.lastname@example.org.
The message is forwarded immediately to you@your-ISP.com.
In order for you to use all the features
that come with your Microsoft® FrontPage® 2000/02 WebPages editor,
FrontPage Extension should be installed for your account. You
may request installation of this feature when you place your
Used to upload and download your website
between your own computer and the crosshosting.com web servers.
You have unlimited FTP access to your account 24 hours a day
365 days a year, allowing you to set up, change, or maintain
your web site at any time.
These are your
email mail boxes in our server that can be accessed directly
to retrieve your mail using such programs as Eudora, Outlook
Express, and Netscape Mail. Each POP3 account has its own password
to ensure privacy. You can check your email from anywhere around
the world that you have access to the Internet.
Real Networks' RealAudio/Video®
system is a streaming audio/video delivery system for the Internet.
It is client-server based, meaning both the browser and the
server must have RealAudio/Video® components for it to work.
You can create and deliver streaming multimedia content through
the Internet to audiences worldwide. We include step-by-step
instructions for including RealAudio/Video® in your Web pages.
Keeps track of what your
customers have ordered from your Internet store. Customers add
and remove items from their shopping cart, and tallies their
order when they are ready to check out. If the customer decides
to submit the order, the program emails the order information
to the address of your choice and sends a conformation to the
A method of ensuring
that information entered through your website is protected from
prying eyes. Information submitted via a secure form is transmitted
in an encrypted mode. SSL is most commonly used for credit card
transactions. See "CyberCash" for an alternative method.