Domain Name System: Explained

Domain Name System (DNS) is a database framework that interprets a personal computer’s registered domain name into an IP address and vice versa. Network PCs use IP addresses to find and associate with one another, but IP locations can be hard for individuals to recall. For instance, on the web, it’s a lot simpler to remember the website than it is to recollect its relating IP address ( 

The DNS automatically converts the name we type into our web browsers to IP addresses of servers hosting that site. DNS also enables you to associate with another authorized PC or allow remote management by utilizing its easy to understand area name as opposed to its numerical IP address. On the other hand, Reverse DNS (rDNS) makes an interpretation of an IP address into a domain name. 

Every organization that has a chain of computers has one server dealing with DNS inquiries called a domain server. It will hold all the IP addresses inside its system, in addition to the IP addresses of recently accessed PCs outside the system. DNS can be compared to a telephone directory where you find phone number using easy to remember names.

How DNS Works

DNS resolution involves a process similar to finding a house using the street address. Each device connected to the internet is given an IP address. When someone enters a query, the hostname is converted into an IP address to complete the query. This translation between a web address and machine-friendly address is crucial to for any webpage to load. 

 is a database framework that interprets a personal computer Domain Name System: Explained

On the machine level, when a search query is initiated, the browser looks for information in a local cache. If the address is found, it will look for DNS server in the Local Area Network (LAN). If the DNS server in the LAN is found and receives the query, a result will be returned. If DNS server is not located, the local server will forward the query to DNS cache server provided by the internet service provider.

The DNS cache servers contain temporary DNS records based on cached value acquired from authoritative DNS servers. An authoritative DNS server as the name suggests stores and provides a list of authoritative name servers for each of the top-level domains. The working of DNS is based on a hierarchy, and it is essential to further learn about these servers. 

Types of DNS Servers

  1. DNS recursor – The DNS recursor server gets requests from client machines via apps like internet browsers. The recursor then makes additional requests to fulfil the customer’s DNS query. Think of it as a librarian that goes to find a particular book present somewhere in the library. 
  2. Root nameserver – This is the initial phase in deciphering comprehensible hostnames into the IP. Think of it as the index available in the library that gives you the shelf number based on the name of the book. 
  3. TLD nameserver – The TLD is the subsequent stage in the search for a particular IP, and it has the last segment of a hostname. The common TLD server are .com, .in, .org., etc. 
  4. Authoritative nameserver – This nameserver is the final halt in the inquiry. If the definitive name server approaches the mentioned record, it will restore the IP for the mentioned hostname back to the Recursor, which made the underlying query.

What Is DNS Propagation

If your IP address is similar to the street address used to find your house, what happens if you change your home address? What is the domain name server with the new IP address? Well, this is where DNS propagation gain relevance. In simple terms, DNS propagation is the time it takes for any changes made in the name server to come into effect. 

When you change the nameservers for your domain or change the hosting provider, the ISP nodes across the world may take up to 72 hours to update their caches with the new DNS information of your domain. However, the time required to ensure a complete update of records across all nodes may differ.

New information about the nameservers will not be propagated immediately, and some of your users may still be redirected to your old website. Each ISP node saves the cache to speed up the loading time, and you will have no other option but to wait until all the nodes are updated.

You can bypass or minimize the DNS propagation by pointing your domain to the destination IP address using “A Record” on the side of the current DNS provider, setting the minimal TTL. After updating the “A Record” you can wait for an hour and then change the nameservers of your domain. This will ensure that your website will not have any downtime as both hosts will show the same new website. 

DNS Security Extensions

Given that DNS is vital for redirecting any query to your website, it is hardly surprising that hackers and bad actors will try to manipulate it. DNS inherently has no means of establishing whether the data is coming from authorized domains or has been tampered. This exposes the system to a lot of vulnerabilities and attacks such as DNS cache poisoning, DNS reflection attack, DNS amplification attack, etc.

In a DNS cache poisoning attack, bad actors replace the valid IP address with a malicious IP address. So, virtually all the users reaching for the genuine site will be redirected to this new IP address. This new location could have an exact clone of the original site meant to steal crucial data such as personal information & banking information, or it could redirect to a website and malware would be downloaded on the local computer. 

To address these serious concerns, DNS Security Extensions (DNSSEC) were put in place. DNSSEC is aimed at addressing the weaknesses in DNS and adding authentication to it, making the system more secure. DNSSEC uses cryptographic keys and digital signatures to enforce legitimate connections and accurate lookup data. 

While DNSSEC can substantially reduce the vulnerabilities of DNS, administrative overhead, as well as time and cost, restrict its implementation. A better alternative for many organizations would be to opt for Cloud-based DNS. Similar to cloud web hosting, a cloud-based DNS ensures geographically diverse networks and DNS server infrastructure. It enables high availability, global performance,  scalability, stronger security, and better resource management. Do let us know your thoughts and if you have used cloud-based DNS in the comment section below. 

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Beginner’s Guide to Understanding DDoS Attacks

With the world changing its data storage methodologies and moving to cloud storage, things have become more transparent and safer for storing and accessing files in the easiest way possible. However, most things that are free come with drawbacks, which could be dangerous for your business. Cyber-attacks and deadly viruses can wipe out your servers and lead to a permanent loss of data. 

Regular occurrence of these threats has resulted in companies opting for DDoS protection enabled servers to protect their data from virtual attacks. With both internet and hackers evolving, it has become crucial now more than ever to employ means to mitigate such attacks. Thus, let’s take a closer look into the world of DDoS attacks, dangers, and steps required to mitigate such attacks. 

What is a DDoS attack?

DDoS attack or Distributed Denial of Service attack is aimed at making any service unavailable by flooding it with millions of requests. A DDoS attack can also be carried out using hacking or insertion of a virus into the host to gain access to its services and functions. Such attacks can be triggered by a single system and can affect millions of personal electronic devices such as computers, smartphones, tablets, etc. This denial of services from your device could be in the form of – 

•   Hacking webcams and other video peripherals. 

•   Hijacking ports and other wireless authentication connections. 

•   Restricting or blocking the use of the internet by any kind. 

•   Overloading ports to make them unusable. 

Methods of DDoS attacks

The attackers or hackers have evolved over the years and developed multiple ways to carry out DDoS attacks. The end goal will always be to flood your servers and shut down your service. Hackers resort to different techniques to carry out the attacks making it difficult to determine the source of the attack and counter it in a shorter period.  The different types of DDoS attacks can be as following: 

•   Volumetric attacks 

Every company is aware of the average visits their website receives, and they have servers capable of dealing with a certain amount of traffic. So, exhausting your bandwidth is not a difficult task, and with millions of requests directed to your server at the same time, your server will be down within no time. Using ‘botnet” i.e a collection of interconnected devices, thousands of infected devices with malware will start hitting your page, bringing it down in a matter of minutes.  

•   Protocol attacks

Instead of sending millions of requests or redirecting malware to one particular webpage or system, the IP connection of the site is clogged. The ping that a website might send to receive data is clogged by fake IP addresses that never really send back any information. Either the site never loads or responds with vast sums of unnecessary information. It not only restricts the use of the site but also impacts resources in completing other tasks. Such an attack may need a significant amount of overhauling to rescue the web server. 

•   Application layer attacks

The internet is built upon seven layers — each layer serving its purpose and following different protocols to carry out its functionality. The seventh layer of the internet is known as the application layer, where all the HTTP and SMTP (Simple Mail Transfer Protocol) communications from email to web browsing is carried out. DDoS attacks on application layer mimics the real activity of humans to consume all the resources. This makes the server useless and takes down your services. 

Why Is Protection From DDoS Attacks Required?

DDoS security is vital because DDoS attacks disrupt the standard functionality of web servers and cause billions of dollars in damages and repairs. Hackers around the world easily send ransomware through emails and IP addresses. Over the years, the frequency of DDoS attacks has increased with about 43 per cent of the attacks targeting smaller cyber businesses. It is estimated that about 124 billion dollars will be spent by the end of this year on repairs and upgrading servers of companies to protect their connection and data from such attacks. Thus, DDoS security is vital and crucial for any company to avoid landing in a situation which can damage their company forever. 

How To Mitigate DDoS Attacks 

So, the crucial question that arises is how to fight DDoS. Unfortunately, the answer may not be simple and straightforward. By nature, DDoS attacks due to its different nature are challenging to handle and bring under control. The best line of action to fight DDoS would be to analyse incoming data, block spam messages, and malicious requests of sorts. However, let us take a closer look at different approaches to mitigating DDoS attacks.

1. Check whether you are under attack. 

It is decisive to know whether you are facing excellent or bad traffic. The good traffic is your customers, and the bad traffic is the DDoS attack. The DDoS protection that you may opt for should have the potential to distinguish between good and bad traffic. Our VPS hosting is backed by Neustar DDoS protection, which is completely capable of identifying a DDoS attack and acting swiftly against it. 

2. Redirection of bad traffic. 

Redirection of bad traffic away from your server is crucial. More significant the quantity of bad traffic, higher are the chances that the server will crash. Redirection is the step where your mitigation plan comes into effect. The strength of your servers and operation centre is tested in sending the bad traffic away and protect the system from any threat. Failure to do so can cause the system as well as the operation centre for your servers to crash down. In case of the service fails, deep packet inspection service come in handy in differentiating the good from the bad. 

3. Make full use of your resources. 

Protection for your servers and operation centres is vital, and various services come with different features that may suit different requirements. DDoS protection can work according to the user’s commands and can be toggled on/off. However, choosing the right kind of protection is vital. It might be based on the type of business and the hardware being used. The DDoS protection provider should fully maintain cloud services and provide an extra level of care, and issue alerts in case of a DDoS attack. 

There are several prominent service providers that offer DDoS protection services. You can opt for any of the top DDoS protection service providers depending on your requirement and the allocated budget. However, in most cases, you will need IT experts to implement it. This would alleviate you from any concerns that you might have in purchasing and setting up DDoS protection.

If you are setting up a new website altogether, then you must look for web hosting plans that are integrated with DDoS protection tools. Do let us know your experience with DDoS attacks and how you have mitigated the disaster in the comments section below.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


How to Compress Website Content Using cPanel

People often abandon website pages that take forever to load. Website load speeds can make or break any visitor’s perception of your business in general, and nobody wants that. So what do you do? You try your best to have a solution in place which keeps your website safe from anything that can possibly delay its load time. Some of the available solutions include enabling caching, optimizing PHP or other application services, fine-tuning the database server settings, enabling distributed DNS that is optimized for speed, enforcing resource limits on shared servers, optimizing resource-heavy services, etc. to name a few. Website content compression is also one of the solutions available.

In this article, we’ll understand how to compress a website using cPanel. But before that let us see what website content compression is.

What is website content compression?

Websites are either hardcoded or built using website builders such as WordPress, Weebly, etc. These websites consist of several pages, each of which contains huge amounts of data. Every page load for these websites require the loading of several CSS and JavaScript files which generally are several MBs in size. Loading these heavy pages takes a toll on the speed of your website. Website content compression can potentially fasten the websites’ load speeds. This step is taken before your website content travels to your users’ browsers. 

What difference does website content compression make?

Website content compression is known to enhance the overall performance of the website by boosting the site load speeds. It enhances the performance of your website which helps your visitors experience instantaneous efficiency and top-notch functionalities while they interact with your website.

How can you implement website content compression?

If your website is hosted on hosting plans that offer cPanel support, for instance, VPS Hosting or Dedicated Hosting, then website content compression is a simple task. 

Using cPanel and WHM you can compress your website using the option called ‘Optimizing Website’. This option does nothing but compresses the website content to a few KBs, thus ensuring that the website loads quickly. This can be helpful not only from the customer experience point of view, but can also aid in better SEO rankings.

Implementing website content compressing within your cPanel is quite an easy task provided you have secured access to the cPanel. Here’s how you can do it:

  1. Log in to your cPanel account from your hosting dashboard
  2. Scroll until you reach the ‘Software’ section
    People often abandon website pages that take forever to load How to Compress Website Content Using cPanel

  3. Click on the ‘Optimize Website’ option
    People often abandon website pages that take forever to load How to Compress Website Content Using cPanel

  4. The ‘Optimize Website’ page will show you three options for content compressions:

    1. Disabled – This setting will be selected by default which means that your files aren’t compressed.
    2. Compress All Content – This option will enable compression of all the files that are sent to your users’ browsers.
    3. Compress the specified MIME types – This option allows you to compress specific content which can be manually selected by you.

    People often abandon website pages that take forever to load How to Compress Website Content Using cPanel

  5. Select the option that best meets your needs and click on ‘Update Settings’

And that’s all! The ‘Optimize Website’ tool is extremely beneficial if you wish to give your website visitors a flawless experience, and is also pretty easy to use. We hope you understood how to compress a website using cPanel. 

If you have any queries, you can post your questions/queries below in the comments section.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


The What, Why and How of NoSQL Databases

In today’s social media savvy world, we are all familiar with various social media websites like Facebook, Twitter, etc. or e-commerce giants like Amazon & Flipkart or for that matter any website that stores user data. This data can be anything right from the customer name, age, address, card details, photographs, comments, reviews etc. So, simply put data is information that is stored on a computer system which can then be used by the application whenever needed. When it comes to data being transferred over the internet, it is stored on the website’s web server. From the server, it then is stored in a database. A database is an organised collection of data that can be accessed, managed and updated easily. 

One of the most crucial decisions when developing an application is the choice of the database you would use to store data. And irrespective of whether you have sufficient technical knowledge or not, this decision can seem to be difficult. After all, this is a matter of not just storing data but also retrieving it and all in a short span of time! Especially given the fact that the consumer market is growing at a rapid pace with heaps of data – courtesy, Internet of Things, and all things social and connected. If you’re building a business app then you should anticipate such high-volumes of data and to cope with it, the choice of database is extremely important. 

Take, for instance, Amazon, a popular e-commerce giant. As a customer, if you have shopped from Amazon you would have noticed two things. One, whatever or however long your query is in the search box, it takes a matter of few seconds for the results to be displayed (keep in mind, your internet connection is good and not poor. Secondly, if you’ve added certain items to your cart or are browsing them, you would notice the ‘Frequently bought together’ option. Now, imagine the customers Amazon has and the amount of data as well, to sort this in a matter of seconds is quite a task. But you’ve not experienced this have you? Well, the reason is, Amazon uses its own NoSQL database, DynamoDB that doesn’t store data in tables and hence, it is easier to locate it. That being said, we will cover how it does this in the latter part of the article. 

Moving on, in this article, we aim to help you understand why choosing a NoSQL database would be beneficial to you in the longer run. However, before we move on to that, let us first understand the concept of a database, popular database models available today and the reason you should switch to a NoSQL model.

Types of Databases: 

A database is a collection of data that can be easily accessed, managed, updated and deleted. There are several database types, however, databases can be broadly classified into the following four types: 

  1. OODB or Object-Oriented Database 
  2. RDB or Relational Database 
  3. NoSQL (Not only SQL) and, 
  4. NewSQL (a class of RDBMS)

For the sake of simplicity out of these 4, we will choose the two popular database models viz. Relational Database and NoSQL. 

In a relational database, the data is stored in ‘Tables’ in the form of rows and columns. It uses the SQL (Structured Query Language) pronounced as ‘Sequel’ to perform data-related operations like creating a table, inserting & reading data to/from it, modifying & updating data, and deleting the data or the table. These operations are most commonly known as CRUD operations. The data is connected to each other in a fixed schema. Informally, relational databases are also known as SQL databases. 

Overall, a database is like a central repository or container with all the data and logs. Whereas, the schema is a folder in the database which groups together all connected objects logically. In simple terms, your bedroom is a table, your entire home is the database and your entire floor plan is the schema. 

Some of the commonly used relational databases are, MySQL, Oracle, Microsoft SQL Server, SQLite, etc. 

Moving on to NoSQL databases. NoSQL is a non-relational database model that doesn’t store data in the form of a strict schema or table as opposed to relational databases (we’ll cover how it stores data in the latter part of the article). Thus, your data can be of any type and still it could be stored or retrieved easily.   

Why should you switch to NoSQL 

Although relational databases are being used for good plenty of years and have fulfilled the demands of business in the past, things are now changing. With the increasing presence of the internet and usage of social media, the amount of data being generated is quite high in volume than it was maybe even a few years ago.  

According to Domo, a platform that has been highlighting data in terms of its volume, velocity and variety since 2013, has seen a steep rise in the percentage of internet population and the data being generated every single minute! In its 7th consecutive report, the internet has reached 56.1% of the total world’s population and now represents 4.3 billion people, this is a 9% increase from January 2018. And as far as the trend goes, there won’t be a negative curve in the graph for a long time. This increase can be attributed to increased access to social media, popular internet services like YouTube, Netflix, etc. and interconnected sensors – the building blocks of the Internet of Things. 

Given this staggering increase of data, managing it can be quite a task and relational databases are not quite adept at processing this rapidly. This is due to the fact that the new data coming in does not always fit into the tight schema followed by a relational database. NoSQL database, on the other hand, can easily manage huge volumes of data and the operations performed over it. 

For instance, if you have a website that is popular and say has at least 10,000 registered customers, and growing daily, each of these customers will follow their own life-cycle and processes. On the front end, they would be loading pages, similar items, adding products to cart etc. but on the backend, whenever an operation is performed, the data is retrieved from the database, the similar items are suggested taking into account the number of times a particular type of query was run, and so on and so forth. 

 we are all familiar with various social media websites like Facebook The What, Why and How of NoSQL Databases
Your search

 we are all familiar with various social media websites like Facebook The What, Why and How of NoSQL Databases
Suggestions based on your search

If all these operations take time to run say maybe more than a few seconds or a minute (i.e retrieving/reading from the database, searching, finding and displaying) the user might abandon the cart and go somewhere else. 

The reason for slow operations could either be slow website loading speed or a slow backend that processes your data. If you have a relational database, chances are there would be innumerable rows and columns, and finding the right match would take a long time. On the other hand, if you use a NoSQL database, this problem would be significantly less. 

So is this a real-time example? It is, Amazon uses DynamoDB as mentioned initially, and Google uses  BigTable, both an example of a NoSQL database. 

To put it simply, here are the 4 reasons to switch to a NoSQL database:

  1. Highly scalable
  2. Able to handle large volumes of data – structures,   and semi-structured
  3. Schema-less
  4. Quick iterations

Types of NoSQL Databases 

Having seen the key advantages to switch to NoSQL databases, let us now move on to understanding the types of NoSQL database. Simply put, which type of database should you go for depending on the type of your business. 

There are four types of NoSQL Databases viz. Key-value, Document, Column and Graph. 

  • Key-Value

 we are all familiar with various social media websites like Facebook The What, Why and How of NoSQL Databases

In the Key-value type of database, the data is stored in the form of key/value pairs in a hash table where the key is auto-generated & unique whereas, the value can be anything, for instance, a string, JSON, BLOB etc. This type of database is usually used as dictionaries or collections. 

Where can you use it? This type of database is best for e-commerce or shopping cart based websites.

Example: Riak and Amazon’s DynamoDB are popular key-value NoSQL databases.

  • Document

 we are all familiar with various social media websites like Facebook The What, Why and How of NoSQL Databases

In Document-based NoSQL databases, the data is stored and retrieved as a key-value pair, however, here the value is stored in the form of JSON. BSON or XML type document. One of the key differences between a key-value database & document is that the latter embeds the attribute metadata that’s associated with the stored content, which then helps to query the data easily based on the content.

Where can you use it? This type of database is mostly used for Blogging or CMS platforms, e-commerce apps or real-time analytics, etc.

Examples: MongoDB and CouchBase are popular document-based NoSQL databases.

  • Column

 we are all familiar with various social media websites like Facebook The What, Why and How of NoSQL Databases

In Column-based databases, the data is written in the form of columns as opposed to the traditional row structure. Column-based databases use column orientation where each column is associated with a column key.

Where can you use it? Column-based databases are usually used to manage data warehouses, CRM, business intelligence, etc. 

Examples: Google’s BigTable and HBase & Cassandra that were inspired by BigTable are some of the widely known Column databases. Cassandra was originally developed to solve the needs of Facebook’s Inbox search problem.

  • Graph

 we are all familiar with various social media websites like Facebook The What, Why and How of NoSQL Databases

In a Graph-based database, the data is usually arranged in a flexible graphical representation as opposed to the strictures of tables or columns. Here, the database stores not only the object but also the relations amongst those objects. 

For example, with reference to this diagram, the object/data is stored as a ‘node’ with the ‘relationship’ as edges. An edge establishes a relationship between nodes, and every node and edge has a unique identifier. 

Where can you use it? Graph-based NoSQL databases are widely used for social networks, spatial data, logistics, etc. 

Examples: Neo4J, Infinite Graph, OrientDB are some of the popular Graph-based databases.

How does it help your business:

We’ve seen the different types of NoSQL databases and various applications where to use them. If your business model falls into one of these and at the same time you deal with lots of real-time data, it would be a good decision to switch to a NoSQL database. At the same time, it is not necessary to have just one database in place, depending on the operations and the queries, you can have multiple databases. 

For example, it can even be a combination of using MySQL (an RDBMS) for one particular operation because it is the best for that and use MongoDB for another. 

In the end, what really matters is how much is your data and the best way you think is to handle it! 

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Understanding Co-browsing: How it Solves Queries of Users in Minutes

Einstein quoted, “If I had one hour to save the world, I would spend 55 minutes to define the problem and only 5 minutes to find a solution.”

The above quote very much states the difficulty a customer service agent goes through a typical day. Most agents lack the necessary skills to interpret a customer’s problem, and as a result, end up giving suggestions and solutions that the customer is not looking for in the first place. 

Whether the customer is interacting with your agents or with your product, in both the scenarios, the customers expect well-designed user journeys that facilitate clear communication and a seamless transaction. 

In fact, a recent study by Accenture found that 89% of customers get exhausted because they need to repeat their issues multiple times. On the other side, the customer service agents delineate customers as – someone who doesn’t know what he/she are looking for – someone who has a vague idea of their own needs. This different aspect of customers and customer service agents clears the void between listening to customers and identifying their true needs and expectations. It Indicates where the gap is and where improvisation is needed in service.

 minutes to define the problem and only  Understanding Co-browsing: How it Solves Queries of Users in Minutes

However, when customers experience issues, they want agents to resonate with the situation they are experiencing,

Visual engagement tools like Livechat, chatbot, co-browsing, video calls, webinars, live streaming on social media break this communication barrier and facilitate transparency and understanding between the customer and the Agent. 

Co-browsing software empowers your agents to have real-time conversations with your customers by sharing screens – Agents can get access over the customers’ browsers and exactly see where the customer is stuck and solve the problem in one glance. 

Cobrowse software a.k.a collaborative browsing ease the communication process between the user and the Agent. 

The Agent can 

  • Connect with the customer or website visitor with one click
  • Have access over the customers’ web or mobile browser
  • Exactly see where the customer is stuck
  • Perform complex task on customers’ behalf
  • Highlight sections or data field with visual cues
  • Simultaneously work with customers on the same Web browser ( resource ) using dual cursors.
  • Receive real-time feedback on issue resolution 

Customers can

  • Restrict the agent to see other tabs 
  • Hide confidential and sensitive data 
  • Highlight an element of the web resource with visual cues
  • Ask for help anytime, anywhere due to remote support
  • Connect with Agent without downloading any external software
  • Communicate technical issues without the use difficult terminologies
  • Get their problem solved in one interactive session

 minutes to define the problem and only  Understanding Co-browsing: How it Solves Queries of Users in Minutes

How Co-browsing is effective in solving customer problems?

Example 1: Co-browsing for Website designing

Co-browsing helps in designing a website too. Suppose, a customer who wants to design a website on WordPress, so he will connect with a customer support agent.  The agent can easily help customer to understand different plugins and the usage of plugins using Live chat & Coborwse. It makes very easy to understand the process of designing a website. 

Designing a website can be difficult on ownself when a customer is new to the world of technology, or even if the customer is not new it is not an easy task to design a complete website. But these visual engagement tools makes the process very easy. If need to be, the agent can access customers screen with the limited access and can show the customer how to complete a task. 

Tips to Utilize Co-browsing

  1. Encourage buyers to take the next steps

If they are hovering over your product for long, chances are that they comparing your product with your competitor’s product, you can show them the benefits by visually comparing the products. 

  2. Convert leads into paying customers 

Once a visitor interacts with your service or product, the next step would be to encourage the prospect to sign up, co-browsing come in handy. Co-browsing is a quick and easy way to provide real-time assistance on how to effectively use your service and product. 

Example 2: Co-browsing for Customer Support

Co-browsing allows customers to connect with support agents across multiple touchpoints and allows them to 

  • Locate mouse on the customer’s page
  • Perform a certain action on their page 
  • Provide remote assistance from their device.

Co-browsing can be exceptionally useful in providing technical assistance, for instance, your customer can get stuck while integrating your App or software to their product:

  • The client might not be able to follow your API 
  • They are not able to access the document they are looking for
  • Your implementation process might be buggy and can’t be solved without the involvement of your support agent.

In the above scenarios, with co-browsing, your support agents can take hold of the customer’s web resources and guide them across your API with visual apparatus, identify the bugs and resolve it in one go – to make the third-party integrations a cakewalk for your clients.

 minutes to define the problem and only  Understanding Co-browsing: How it Solves Queries of Users in Minutes

Example 3: Co-browsing in the Banking and Finance sector

Taking an example of the Banking and financial sector where agents provide financial aid to customers –  their manual loan approval process was proving to be cumbersome and the customers have to go through tons of documents and forms for claiming insurance, figure out the spots that need their sign, attach the required proof, and verify it with the insurance agent.

With co-browsing, the agents were able to access the customers’ document and address their queries in a single session. The security concern is also taken care of with data masking. The customers can hide confidential details from the agent by masking a particular data field.

Example 4: Co-browsing in Sales

An eCommerce agent can use it to escort customers through their online store, display products that customers are looking for and assist them through the check-out process. In e-commerce, collaborative browsing can also be useful to reduce shopping cart abandonment rate, – the agents can fix bugs related to the checkout process or even help customers fill complex forms to ease order placement. 

Co-browsing solution is not just useful for visual interaction, but it also enables you to garner data across the user journey – you can segment customers based on behaviour, location, usage, and individual profiles to send personalized and customized messages. 

In this digital era, a customer is likely to use multiple communication touchpoints to have an interaction with your brand or agent, with co-browsing, the agents can have a unified view of the conversation that takes place across the disparate systems and carries the conversation more contextually.

Over to you:

Rather than asking your customer to do something, Co-browsing allows you to go that extra mile by performing a task on the customer’s behalf. Co-browsing is a smart and efficient way to offer customer service as it not only aids in first contact resolution but also saves your agents time by almost 50% – This is one reason that co-browsing users achieve a 7.2% annual increase in their revenue

Adopting new technology always helps a business to reduce human efforts, initially, it may cost a bit high, but when you will look up to the  -term advantage, it will definitely going to be beneficial and lower the costing as well.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Linux Distros to Try Out in 2019

Technology changes every day – it’s a dynamic and surprising field. Every year, new innovations, new versions and new advancements take the place of the old, making for better experiences. Today, we’re going to discuss about Linux Distros. More specifically, the most polished versions of Linux Distros that are available to us this year – 2019. However, before we do that, a refresher course seems necessary. If you’re new to the subject, don’t worry. We’re going to answer some fundamental questions! What is a Linux Distro? What are the types of Linux Distros? Finally, we’re going to talk about the best Linux Distros of 2019. So, let’s start with the first question:

What is a Linux Distro?

A Linux Distro (full form distribution) is an Operating System, which is made from a software collection based on the Linux Kernel. Those who use Linux usually obtain this Operating System (OS) by downloading a Linux Distro, which is easily available for a wide range of systems like personal computers, embedded devices and even powerful supercomputers. This is a Linux package management system. 

This operating system is in direct contrast to Windows or Mac OS. When it comes to Windows, Microsoft compiles all the parts of the OS and releases and distributes it as a single package. To buy Windows, you’ll need to select one of the packages that Microsoft offers. Linux doesn’t work the same way because of a fundamental difference: the Linux Operating System isn’t created by one, single organisation. Different people and organisations work on different elements, like the Linux Kernel (the core component of the OS), the X server (which creates the graphical desktop), the GNU shell utilities, the desktop environment (which utilises the X server in order to provide a graphical desktop) etc. All these open-source components are produced independently of each other and are distributed in source code form. 

Now you could take the source code from all these independent programs and compile them yourself. However, this is a time-consuming process, not to mention the kind of effort you’ll need to put in to make sure all these different programs work together. The Linux Distro does all of that hard work, compiling it together and offering it as a single Operating System that you can then install on your system. The packages are simple, fast and easy to install. Which brings us to our next question: what are the types of Linux Distros?

Types of Linux Distros

There are broad classifications of Linux Distros, that we’ve put down here. Most of them are centred around what these Distros are designed for:

  1. For home users, enterprise users or power users
  2. Distros that are supported on different hardware types, those that are platform-specific, or certified by a platform vendor
  3. For desktops, embedded devices or servers 
  4. For the highly specialised or general purpose for particular machine functions (for e.g. firewalls, computer clusters or network routers)
  5. Created for comprehensiveness, usability, security or portability

So, it’s clear that there are a lot of different Linux distributions. Some like Fedora, refuse on principle, to include closed source software. Others, like Mint, allow closed sourced software to make it easier for users. Many include different default software, for e.g. Ubuntu includes Unity, Fedora uses GNOME Shell and Mint uses Cinnamon. 

The other differentiators of Distros are the use of different package managers and more.  

The variety can be confusing, and you may be asking yourself – what Linux Distro should I use?

Well, as you’ve seen above different Linux Distros are designed for different purposes. The Linux Distro you choose will be based on what you choose to do and your own personal preferences. For a desktop user, a simple Distro like Ubuntu or Mint should suffice. Or you could choose Fedora or openSUSE. 

If you’re looking for more stability, and a well-tested system, you could look at Debian, CentOS or Ubuntu LTS. The choice is entirely yours, and in 2019 there are some exciting ones to choose from:

  1. Ubuntu: One of the most popular Distros and one of the most widely used Distros, Ubuntu is a simple and productive option. Ubuntu 18.10 is full of new features that improve the user experience, such as GNOME 3.30, greater battery life for laptops, support for fingerprint scanning, Linux kernel 4.18 and faster installation and boot times.  You can also explore the more recent Ubuntu 19.04, which was released on April 18th, 2019. 
  2. Mint: Those looking to shift from a Windows or Mac OS platform, may want to look at Linux Mint. This Distro comes with the choice of four desktop environments (Cinnamon would be the closest to the Windows environment). Resource-wise, Mint is a good option as it is light, loads quickly and uses less memory than Ubuntu. It is also a stable option and is conservative when it comes to updates.
  3. Antergos: Antergos adheres to some pretty great principles – clean, simple, modern, versatile and practical. It is always fresh and never frozen, which means it’s on a rolling release cycle, so you don’t have to download and install new builds as and when they are available. This principle also extends to the applications, which means you don’t work with outdated software. Antergos is based on Arch Linux but comes without its complications. Another benefit of this Distro is that it is 100% functional from the box. Antergos is said to be the “prettier” of all Linux-based Distros and is a pretty good start for newcomers.
  4. Fedora: This is a flexible and innovative OS that offers three separate options, based on your needs. A workstation, cloud-centric version and server version are all available. Fedora primarily uses the GNOME interface but also allows other versions for different desktop environments. It also has frequent version updates, which are sometimes just weeks and months apart. This is to your advantage as it keeps you on the cutting edge of Linux development. 
  5. Manjaro: This is a simple and user-friendly OS based on Arch Linux. Manjaro has an intuitive installation process, automatic hardware detection, conducts stable updates with every release and more. It comes with a variety of flavours like GNOME 3.26, KDE 5.11, Mate 1.18, Cinnamon 3.6. Budgie 10.4 and Xfce 4.12.  Manjaro is also backed by a large software repository and a community that will extend its assistance to both newcomers and advanced users, alike. 

There are a variety of other Distros you can look at, such as openSUSE, CentOS, Gentoo (for experienced users), Arch Linux (for gamers), POP Linux, Debian, Solus and Zorin. 

Each of these options provide excellent features. At ResellerClub, we also believe that you need to be spoilt for choice, which is why we offer, Ubuntu, Fedora, Debian and CentOs in our Linux VPS server specs. You can look at our VPS Hosting Packages, which are secure, stable, pack power and performance and provide you with great infrastructure, here.  All you need to do is look at the packages and the variety of distros and make the choice that works best for you!

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


All You Need to Know About Hypervisors

Sitting at the core of virtualization is a well-known but little-discussed technology called the Hypervisor. The hypervisor is a layer of software which enables single hardware to host multiple, isolated virtual machines. It also helps with the management of those virtual machines. But before we talk about how the hypervisor works, the types of hypervisors and the benefits of this technology, let’s put some basic definitions in place. We’ll start with a technology that is tied very closely to hypervisors – virtualization.

What is virtualization?  

Virtualization is the creation of a “virtual” form of a resource, such as a server, a desktop, an operating system, storage space, network or files. With virtualization, traditional computing is transformed, as these resources become scalable as per a client or organisation’s needs. Virtualization has been around for decades and is now split into three distinct types – Operating System (OS) virtualization, hardware virtualization and server virtualization.

Virtualization is used to consolidate workloads, systems and multiple operating environments on one single physical system. Essentially the underlying hardware is partitioned, and each partition runs as a separate, isolated Virtual Machine – which has its own Operating System. Now, this is where the hypervisor comes in.

What is a hypervisor?

The function of partitioning, or more specifically, abstracting and isolating these different OS and applications from the underlying computer hardware is what the hypervisor does. Therefore, it wouldn’t be incorrect to say that virtualization is enabled by the functions of the hypervisor.

What this means is that the underlying hardware (which is known as the host machine) can independently operate and run one or more virtual machines (known as guest machines). The hypervisor also helps manage these independent Virtual Machines by distributing hardware resources such as memory allotment, CPU usage network bandwidth and more amongst them. It does this by creating pools of abstracted hardware resources, which it then allocates to Virtual Machines. It also can stop and start virtual machines, when requested by the user.

Another key component of hypervisors is ensuring that all the Virtual Machines stay isolated from others – so when a problem occurs in one Virtual Machine, the others remain unaffected. Finally, the hypervisor also handles the communication amongst Virtual Machines over virtual networks – enabling VMs to connect with one another.

How does a hypervisor work?

To understand how hypervisors work, it’s important to understand – what are the types of hypervisors? How do they work? What is the difference?

There are 2 types of Hypervisors. They’re also referred to as Native or Bare Metal Hypervisors (Type 1) and Hosted Hypervisors (Type 2).

Type 1 Hypervisors:

Type 1 hypervisors run on the host machine’s hardware directly, without the intervention of an underlying Operating System. This means that the hypervisor has direct hardware access without contending with the Operating System and drivers.

Sitting at the core of virtualization is a well All You Need to Know About Hypervisors

Type 1 is widely acknowledged as the best-performing and most efficient hypervisors for enterprise computing. The ability to directly assign resources makes these hypervisors more scalable, but the advantages go further than that:

  1. Optimisation of Physical Resources: Organisations often burn funds quickly by buying separate servers for different applications – an endeavour that is time-consuming and takes up data centre space. With Type 1 hypervisors, IT can utilize server hardware, which frees up data centre costs and real estate and cuts down on energy usage.
  2. Greater Resource Allocation: Most Type 1 hypervisors give admins the opportunity to manually set resource allocation, based on the application’s priority. Many Type 1 hypervisors also automate resource allocation as required, allowing resource management to be a dynamic and customised option.  

The best-known examples of Type 1 hypervisors are VMware’s ESXi and Microsoft’s Hyper-V.

Type 2 Hypervisors

Typically, these hypervisors are built on top of the Operating System. Because of its reliance on the host machine’s underlying Operating System (in direct contrast to Type 1), it is referred to as “hosted hypervisor”. The hypervisor runs as an application within the Operating System, which then runs directly on the host computer. Type 2 hypervisors do support multiple guest machines but are not allowed to directly access the host hardware and its resources. The pre-existing Operating System manages the calls to the CPU for memory, network resources and storage. All of this can create a certain amount of latency.

Sitting at the core of virtualization is a well All You Need to Know About Hypervisors

However, this is only the case for more complex and high-performance scenarios. Type 2 hypervisors are still popular home and test labs.  Furthermore, Type 2 hypervisors come with their own set of benefits, like:

  1. Type 2 Hypervisors are much easier to set up and to manage as you already have an Operating System to work with.
  2. It does not require a dedicated admin.
  3. It is compatible with a wide range of hardware.

Examples of type-2 hypervisors include Oracle Solaris Zones, Oracle VM Server for x86, Oracle VM Virtual Box, VMware Workstation, VMware Fusion and more.  


KVM (Kernel-based Virtual Machine) a popular and unique hypervisor – seeing as it has characteristics of both Type 1 and Type 2 hypervisors. This open sourced virtualization technology is built into Linux, and more specifically turns Linux into a hypervisor.

To be clear, KVM is a part of the Linux code, which means it benefits from every Linux innovation or advancement, features and fixes without additional engineering.

KVM converts Linux into a Type-1 (native/bare-metal) hypervisor. It is a secure option, that gives you plenty of storage, hardware support, memory management, live migration of your VM (without any service interruption), scalability, scheduling and resource control, low latency and greater prioritization of apps. KVM also creates more secure and better isolated Virtual Machines, while ensuring that they continue to run at peak performance. Excited to use all of these features? Well, when you sign up for a Linux VPS Hosting plan with us, KVM will automatically become a part of the packages you create. Check out our array web hosting packages, here.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Understanding the Architecture and Setup of VPS Hosting

From our previous articles on what VPS Hosting is, to types of VPS Hosting, or how to install or enable a certain plugin, etc. we’ve covered it all, however, there are two things that we haven’t, that is the architecture and setup. For anything to be built or function properly there needs to be a process or an architecture in place. And it is true even when it comes to your web hosting. The aim of this article is to make you the reader understand how VPS Hosting works and how to setup VPS Hosting on your hosting package.

What is VPS Hosting?

VPS (Virtual Private Server) Hosting, is the kind of a server that hosts several websites on a single physical server but gives the user the experience of an isolated server. Here, each individual server gets its own resources like CPU, RAM and OS with users having complete root access. Thus, VPS Hosting is said to be a combination of Shared and Dedicated Hosting.

Working of VPS Hosting

To segregate your physical server into multiple virtual servers, your hosting provider requires a virtualization software, known as a hypervisor. The hypervisor acts as a virtualization layer. It essentially extracts resources on the physical server and lets your customers have access to a virtual replica of the original server. This server is known as a Virtual Machine (VM). Each VM has its own dedicated resources like CPU, RAM, OS and individual applications.

 For anything to be built or function properly there needs to be a process or an architect Understanding the Architecture and Setup of VPS Hosting

As you can see from the above diagram, in the virtual architecture a single physical server is divided into three separate servers and there is a layer of virtualization between the operating system and the physical server. Also, all these servers are isolated from each other.

The advantage of VPS Hosting is that each user has full root access due to the isolated nature of the servers, which ensures privacy and better security.

Now that we’ve seen how VPS Hosting works let us now move onto understanding how to set up a Virtual Private Server. For our benefit, we will be provisioning VPS on a ResellerClub hosting package. Let’s begin!

Setting up VPS Hosting

  1. Login to your Reseller Account
    Login to our ResellerClub Control Panel, using your Reseller ID and Password. Go to the top right side of the dashboard and click on Buy to purchase orders.
     For anything to be built or function properly there needs to be a process or an architect Understanding the Architecture and Setup of VPS Hosting

  2. Place an Order
    In order to purchase VPS Hosting you first need to have a domain name linked to it. For your benefit, we would be purchasing both the Domain and VPS Hosting.
  3. Purchasing Domain Name

    1. To purchase a domain, go to ‘Select Product’ and select Domain Registration from the drop-down list
    2. Enter the domain you want and check if it is available. Should you want Privacy Protection you can add it at an added cost
       For anything to be built or function properly there needs to be a process or an architect Understanding the Architecture and Setup of VPS Hosting

  4. Purchasing VPS Hosting

    1. After you’ve purchased your domain name it is time for you to link it to your choice of hosting. Refresh the page and in the same ‘Select Product’ drop-down, select Linux KVM VPS
    2. Type the domain name you want to link the hosting with, as well as, all the product specification details as well (we will link it with the domain we purchased)
    3. Next, choose if you want any Add-ons, the control panels viz. cPanel and Plesk and, WHMCS (Billing) Add-on available with VPS Hosting. We have selected cPanel and WHMCS. If you don’t want any Add-On select None
       For anything to be built or function properly there needs to be a process or an architect Understanding the Architecture and Setup of VPS Hosting For anything to be built or function properly there needs to be a process or an architect Understanding the Architecture and Setup of VPS Hosting

  5. Accessing your VPS Hosting

    1. Post purchasing your domain name and VPS Hosting are now automatically added to your control panel
    2. To access the orders, go to the main dashboard and click on Products → List All Orders → Click on the Order you want to access. We will be choosing VPS Hosting
       For anything to be built or function properly there needs to be a process or an architect Understanding the Architecture and Setup of VPS Hosting

  6. Setting up your VPS Hosting
    With ResellerClub, your VPS server is provisioned instantly post purchase of the order and you need not set it up manually.
     For anything to be built or function properly there needs to be a process or an architect Understanding the Architecture and Setup of VPS Hosting

    To access your VPS server, click on the ‘Admin Details’ tab and a new window opens. You can now access the Server Management Panel, WHMCS and cPanel to manage your orders.

     For anything to be built or function properly there needs to be a process or an architect Understanding the Architecture and Setup of VPS Hosting


With this, we come to an end on our series of VPS Hosting. We hope you now know how VPS Hosting works, as well as, how to setup VPS Hosting. With ResellerClub, setting up VPS is very easy. If you have any suggestions, queries, or questions feel free to leave a comment below and we’ll get back to you.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Difference Between VPS SSD and VPS Cloud

Over the past few posts, we have been writing about Virtual Private Server (VPS) Hosting- the different types, the advantages, and disadvantages. In today’s post we’ll go a step further and compare the infrastructure your VPS is based on viz. VPS HDD, VPS SSD and VPS Cloud. In our last article, we covered the difference between VPS HDD and VPS SSD.

In this article, we will be covering what VPS SSD and VPS Cloud are, VPS SSD vs VPS Cloud, and figure out which is the best for your website.


VPS SSD is a Virtual Private Server powered by a Solid State Drive (SSD). In this type of hosting, the hosting provider uses a physical SSD disk on their physical server. The advantage of an SSD is that there is less power drainage while at the same time website speed and performance are higher.

VPS Cloud:

In VPS Cloud, as the name suggests your server is set up over a cloud. In VPS Cloud your hosting service provider would combine the availability of VPS with the scalability offered by the cloud. The advantage of using the cloud with VPS is that your load is distributed fairly amongst the different servers which ensure you have better performance and website speed.

Pros and Cons of VPS SSD vs VPS Cloud


Pros of VPS SSD Pros of VPS Cloud
Powered by the efficient SSD drives Powered by the scalable cloud architecture
SSD ensures low risk of mechanical failure as there are no moving parts There is no mechanical failure as everything is stored over the cloud and can be
accessed even if one server is down
Here the boot time of the server is faster as compared to VPS Cloud Even though the boot time of the server is slightly slow, VPS Cloud is instantly scalable
Comes with cPanel and is fully managed as the hosting provider Offers Unmanaged hosting thus, you can customize it as per your own needs.


Cons of VPS SSD Cons of VPS Cloud
VPS SSD is costlier compared
to VPS Cloud
VPS Cloud though cheaper compromises on the booting speed and time
Even though read speed is fast
in VPS SSD, the write is slower
The read and write speed is comparatively slower
Even though the life of VPS SSD is longer compared to other VPS hosting plans it
doesn’t give a warning signal if it is about to fail. Hence, you can lose your data if a
real-time backup isn’t enabled
Have to add, cPanel add-on and only basic support is offered

Which is best for your website?

Both VPS SSD and VPS Cloud are good when compared to the traditional/classic VPS which used HDD drive for the physical server. Moreover, they both have their own sets of advantages and disadvantages. If your website traffic increases at a faster speed then VPS Cloud is the go-to choice, however, if you are looking for more speed then VPS SSD is the go-to choice.

We at ResellerClub, offer VPS SSD with all our VPS Hosting plans and storage space from 20-120 GB. Moreover, with our SSD VPS Hosting you get an intuitive control panel, DDoS protection, easy upgrades and much more.

VPS SSD vs VPS Cloud, irrespective of the hosting plan choosing the right storage and infrastructure for your VPS Hosting depends on your business needs. In the end, it is your content, marketing, and the website design that adds to the success of your website. Therefore, research more before choosing!

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”


Managing Web Host Manager (WHM) Packages: All You Need to Know

WHM, which stands for Web Host Manager, is a tool which service providers offer, and lease, to individual clients. The same hosting provider will also handle all the server related issues, leaving you, the client, free to look after your business and to look forward to its growth.

Now that we’ve covered the basic question of what web host manager is, let’s dive a bit deeper. To understand WHM, we’ve also got to look at cPanel. cPanel is a popular, Linux-based control panel for web hosting accounts. With cPanel, you can manage all your services through one single panel. Whether that refers to creating new FTP users and email ids, monitoring the utilization of resources, installing software or creating subdomains.

WHM offers administrative access to the backend of cPanel. It also allows you a lot of flexibility and control – whether you’re managing a few, resource-intense heavy sites, or a large number of smaller websites. With WHM, you get the option of selling hosting services to clients. Furthermore, you also get to create and manage multiple cPanels.

What can WHM offer you?

With WHM, you get a suite of tools, so that you easily carry out the following:

  1. Manage and monitor your sites
  2. Create custom hosting packages
  3. Delete, create or even suspend your cPanel accounts
  4. Access to look and change all of your DNS (Domain Name System) zones
  5. Permission to access server information and status to help with server management
  6. Create your own default page when you create a new account
  7. Brand and customize your hosting and control panel
  8. Change domain names and usernames
  9. Move between multiple cPanels in your account, and change anything that doesn’t need SQL access

There are two basic types of WHM. The basic WHM enables you to do all of the above. However, root WHM (also known as rWHM) has features which need root access to the servers, and as a result, you gain access to more tools.

Now, we’ve mentioned WHM and cPanel and explained the basics of both. They tend to be interchanged in people’s minds. However, there are differences between the two.

When you buy a web hosting package, you’re given a tool to manage your hosting service. Both cPanel and WHM help users manage and take charge of their web hosting. The key difference between cPanel and WHM is one we’ve mentioned earlier – WHM can have multiple cPanel accounts. However, it goes beyond that.

WHM is used primarily by a reseller to manage all the hosting accounts in each of their reseller plans. cPanel, on the other hand, is used by the customer to manage their own individual hosting accounts. While WHM provides root access to resellers, cPanel only provides access to the web hosting account to its users. The password details for your WHM and cPanel accounts are linked, that is, if you change your WHM password, your cPanel password will also change. cPanel enables its users to set the password. With WHM, you are restricted to adding domains, while cPanel makes it possible to remove add-ons and subdomains.

How to use WHM

If you are a web hosting reseller and provide web hosting as a service, then WHM will play a key role in the process. You, as a reseller, could use Web Host Manager to create a whole range of WHM packages that go from basic to advanced, to premium. The basic package might contain a smaller allocation of resources for disk space and bandwidth, while the premium packages are designed for far more resource heavy websites.

Once you’ve created a package with WHM, you can go ahead and create your account. Your new account will include:

  1. cPanel
  2. FTP account
  3. Website functionality
  4. SSH access (if it has been enabled in the packaged)

Creating a WHM package

If you’re looking to create a new package, here are the steps:

  1. Look for the Search box in the upper left hand of the screen, type package and then select Add Package once the option becomes visible
     is a tool which service providers offer Managing Web Host Manager (WHM) Packages: All You Need to Know

  2. You can type the name of the package (basic, premium etc.) in the package name text box
  3. Under Resources, you can set up quotas or limits based on the package you are designing
     is a tool which service providers offer Managing Web Host Manager (WHM) Packages: All You Need to Know

  4. Go to Settings and select the checkboxes for the resources you want to enable for that particular package
  5. Choose your cPanel theme after scrolling through the cPanel theme options (the default pattern is paper_lantern)
  6. For the feature list for the package, go to “Feature List” list box and select the options you want to use for the package. Alternatively, you can go with the default value.
  7. Select language locale from the Locale list box.
  8. The process ends when you click “Add”. WHM will then create the package
     is a tool which service providers offer Managing Web Host Manager (WHM) Packages: All You Need to Know

Editing the package:

  1. Type package into the Search box in the upper left hand of the WHM screen and click on the option “edit a package” when it is visible
  2. Choose which package you want to edit, hit the Edit option, and make the necessary changes
  3. If you make a mistake you can hit the reset
  4. If you make a mistake you can hit the Reset button and WHM will restore the package values to their last saved state
  5. Click Save changes, once you are done with your edits
     is a tool which service providers offer Managing Web Host Manager (WHM) Packages: All You Need to Know

Deleting a package

  1. Type package into the Search box in the upper left hand of the WHM screen and click on the option “delete a package” when it is visible
  2. Select the packages you want to remove and hit Delete – WHM will delete them immediately
     is a tool which service providers offer Managing Web Host Manager (WHM) Packages: All You Need to Know

WHM and Reseller Hosting

Reseller hosting is considered to be one of the smoothest and easiest gateways for small to medium-sized businesses to join the web hosting business. WHM is the control panel that allows Resellers the opportunity to manage their hosting company. So, if you’re looking to venture into the world of Reseller Hosting, check out our different packages on our Reseller Hosting page. We also provide free WHM and cPanel with our reseller hosting packages. We have also been rated #1 by

By maintaining state of the art data centres and scalable servers, we provide quick solutions for your (or your customer’s) technical problems. We offer incredible and effective domain management through WHM and a sturdy infrastructure that can handle any network interface bottleneck.

class = “fb-comments”
data-href = “”
data-numposts = “10”
data-colorscheme = “light”
data-order-by = “social”