Frequently Asked Questions

Shared hosting is a form of web hosting in which many web hosting customers share a single (virtual or physical) server.

The customers in a shared hosting environment are partitioned away form each other, so (when everything goes well), they have absolutely no access to each other's files, and are ideally not even aware of each other.

Shared hosting allows for a high customer-to-hardware density, which makes it a very inexpensive way to run a website — shared hosting is the cheapest form of hosting, and relatively high-quality shared hosting plans can be had for less than $10/month (sometimes less than $5/month, with a good coupon).

The problem with shared hosting is that a limited pool of computer resources is being shared by a large number of customers. This can cause slow-downs and site outages if one or more sites on a shared hosting server gets a lot a of traffic.

A VPS is a virtual private server. It is a type of hosting plan in which you, the customer, has complete control over a virtual server. Often (and increasingly so) the VPS runs on top of cloud infrastructure (in other words — a large pool of networked computing resources, rather than a single piece of hardware).

One way to think about hosting plans is that a shared hosting plan is like renting a small apartment and a dedicated server is like a house. From this perspective, a VPS plan is like a condo.

With a VPS plan you get most of the benefits of a dedicated server, at a much lower cost. In the case of cloud-based VPS hosting, you also have the ability to scale up available resources quickly as the need increases.

Dedicated server hosting is a type of web hosting plan where you rent an actual server (a rack-mounted, internet-connected computer).

Most people who need a highly configurable web hosting server with full root access are better off with a VPS hosting plan. They are usually less expensive, and — if it is a cloud-based VPS plan — easier to scale.

The use-cases that specifically for a dedicated server plan, as opposed to a VPS plan, are increasingly rare — and if you have one, you probably know about it already.

The most likely reasons to need a dedicated server plan have to do with security and regulatory compliance — VPS plans may not satisfy certain types of privacy laws, such as HIPAA.

Apache is a web server.

Apache is the most common web server in current use. It open source and freely available to use without cost.

Apache forms the "A" in the somewhat famous LAMP stack: Linux, Apache, MySQL, PHP. This is the software platform most commonly used for many popular web applications, such as WordPress, Drupal, and Joomla.

Nginx is a web server.

Nginx is free and open source, and is one of the more popular web servers in common use. Many people see it as a strong alternative to the more commonly used Apache web server.

Incidentally, Nginx is pronounced like "engine-ex."

A domain name, a series of textual characters that identifies a specific IP address, uniquely identifies a website on the Internet. Domain names locate businesses, organizations, or other entities on the Internet. Domain names are easy to remember, easy to type alternatives to obscure URL's that you receive with free website hosting services. Using a domain name allows you to receive more visitors, less bounced emails, and the chance to make a lasting impression on the Web.

A great benefit of using your domain name is that regardless of how many times you change your access provider, your Email and website address will always remain the same.

Regardless of the extension, all domain names must follow the same character rules... You can use letters (abc), numbers (123) and dashes/hyphens (---). Spaces are not allowed and the domain can't begin or end with a dash.

A little known fact is that you CAN have multiple dashes right next to each other. (e.g. domain--names.com) Opened up a few more possibilities?

Your domain name is registered in your name. So long as it has active DNS entries, all the required fees are paid and it's not in breach of any law, nobody else can either use it or take it without your consent.

Be VERY careful when registering your domain name. Once you purchase your domain, the order is non-refundable.

You will receive an email confirmation of your domain name registration once it is complete. You can also login into your account and see that your name has been added to your account management area.

Your domain name is registered immediately, but it can take up to 24 hours for some domain names to appear in whois. If you've received confirmation from Derbi, you can be sure that your name has been registered.

There are several services that can be used with your Domain name:

Email Accounts: unique Email addresses [email protected]' (e.g. [email protected], [email protected], etc.). Set up each employee or family member with their own Email address.

Catch All Email: If you don't want to be limited to individual Email addresses, then this is the account for you. Simply tell us 'one' address to have all your messages sent to and [email protected] will be forwarded to that address.

URL Forwarding: If you already have a website, start using your domain name without the additional cost of hosting. When a user enters your new Domain name into their browser, they'll be redirected to your existing website.

Web Hosting: Derbi offers several levels of web hosting to suit your needs. Each package provides you with at least 500MB of disk storage on our server, plus 24hr access to maintain your website from anywhere in the world.

Search Engine Submission: Submit your website to 1000+ search engines, increasing both your web presence and your website traffic!

o. Once a registration is complete, it is valid for the time frame specified in the purchase (1-10 years) and is non-refundable.

Social Media Marketing is now an essential tool for any business which is looking to gain an advantage over their competitors, without wasting a lot of time, money or resources.

The ratio between visitors coming to your website (traffic) and the amount of people who actually perform a desired ‘goal’ activity (like filling in a contact form, adding an item to their shopping cart, completing a poll, etc.) is known as your ‘conversion rate’;

If you take the time to carefully monitor your conversion rate before and after implementing a Twitter feed on your website, there is a very good likelihood that you’ll spot a noticeable percentage increase within a relatively short space of time.

One of the main reasons why Twitter feeds can have such a massive impact on your site stats is the simple fact that a frequently-updated stream of content demonstrates that your brand is active, professional and ‘switched-on’ to the demands of its potential customers.

Users who follow your business using social media applications will be exposed to your brand in an environment which they feel perfectly at home in: They’ll receive news about your business right next to updates from their friends, family, colleagues, or anyone else within their social circle.

By engaging with your users via social media, you’ll have a chance to promote your products and services in a manner which is not as ‘in your face’ as most other forms of advertising.

By harnessing the power of social media marketing and providing quality information to your audience, you’ll be able to build more trust in your brand.

Any content which is useful, informative or entertaining will go a long way towards boosting your credentials.

By harnessing the power of social media marketing and providing quality information to your audience, you’ll be able to build more trust in your brand.

Any content which is useful, informative or entertaining will go a long way towards boosting your credentials.

Except our main service directions like Design, Developing, Promotion, Hosting and etc. we also provide you next paid services. You can add this extra features to your hosting plan or domain.

A firewall is a network security system designed to prevent unauthorized access to or from a private network. Firewalls can be implemented in both hardware and software, or a combination of both. Network firewalls are frequently used to prevent unauthorized Internet users from accessing private networks connected to the Internet, especially intranets. All messages entering or leaving the intranet pass through the firewall, which examines each message and blocks those that do not meet the specified security criteria.

To understand a security certificate, you first have to understand Public Key encryption.

Public Key encryption works like this: there are two "keys" — a key is a very long string of seemingly random data that is used as a value in an encryption formula. One key is Private, known only to one party (in this case, the website owner). The private key has a "matching" Public key, which is published and available for anyone to use.

A message can be encrypted using the Public Key, and it can only be decrypted with the Private Key. This way you can send sensitive data securly, and only the one who is supposed to get it will be able to decrypt it.

The other interesting thing is that you can encrypt data with the Private key, and only the Public key will be able to decrypt it. This may seem meaningless — if the Public key is Public, then anyone can read the message. That's true, but this accomplishes something more important: it verifies that the message was in fact sent by the party who who says they sent it — only the owner of the Private Key could encrypt the data this way. (This is called "signing.")

When you use HTTPS, you are communicating with a website via a series of encrypted messages. Your messages are sent encrypted via the Public Key (ensuring only the website gets your data) and responses from the web server are sent signed by the Private Key (ensuring that they are authentic).

So what does the SSL certificate have to do with this?

Once you are certain that the Public Key you are using belongs to the website that you are visiting, and that the website is trustworthy, the rest of the process is secure. But the Public Key doesn't guarantee identity by itself — a malicious agent could create a fake Public Key and send it to site visitors, and intercept data between site and visitor.

You need some way of verifying that the Public Key is the right one, that it authentically identifies the correct party.

This is what an SSL Certificate does — it certifies the identity of the Public Key.

Web analytics is the measurement, collection, analysis and reporting of web data for purposes of understanding and optimizing web usage. However, Web analytics is not just a process for measuring web traffic but can be used as a tool for business and market research, and to assess and improve the effectiveness of a website. Web analytics applications can also help companies measure the results of traditional print or broadcast advertising campaigns. It helps one to estimate how traffic to a website changes after the launch of a new advertising campaign. Web analytics provides information about the number of visitors to a website and the number of page views. It helps gauge traffic and popularity trends which is useful for market research.

Our data sources will help reduce the number of bad bots and crawlers hitting your site automatically (not all). If you would like to place a block of your own for a bad bot or crawler, you can block them by IP in your Firewall app.

In addition, customers that are on a paid plan can look at turning on Web Application Firewall (WAF) to further help reduce the threat of bad bots and crawlers that don't follow good behavior guidelines.