Wednesday, December 16, 2009

Thursday, October 15, 2009

Reported Web Forgery! - nerrasssp.co.uk

Recently a lot client received an email from hacker as bellow

Please don't open the link.

If you accidentally open the link please don't download any things from the website



Reported Web Forgery!

This web site at http://entertop.net.nerrasssp.co.uk has been reported as a web forgery

Web forgeries are designed to trick you into revealing personal or financial information by imitating sources you may trust.

Entering any information on this web page may result in identity theft or other fraud.

Entertop.net - Support Index

Friday, September 25, 2009

How to Study and Analyzing the AWStats (Plesk-Stat / Webstat )

AWStats Summary and When Reports

AWStats provides several summary reports that show the overall website trends over different time intervals for the reporting period, usually monthly.

Summary

The General Summary report breaks down unique visitors, number of visits, pages, hits and bandwidth by human and non-human visitors for the current reporting interval. Metrics to watch are:

Unique visitors
The overall number of users coming to a site is useful to track the general trend over time. Declines, unless due to seasonal fluctuations, are trouble indicators. Is a competitor drawing away your potential traffic? Did site changes remove you from search engines? Did you make changes in your marketing activity?
Unique visitors/Number of visits ratio
This answers the question "Are visitors returning?" If they are not, they might not be finding what they were looking for--did you tell a search engine that you offer poker when you really sell widgets? Can a mere mortal survive your navigation system?
Pages
This is most useful relative to the number of visitors.
Pages/visitors ratio
This indicates the extent to which your site engaged a visitor. Generally, the higher the better, but a high number can also indicate the presence of convoluted site flows and processes that force motivated visitors to slog through page after page of obstacles in order to accomplish their goals.
Monthly history

This provides a breakdown of visitors and pages, month by month, for the current year. In month-to-month comparisons, do not forget to adjust for the variable number of days in a month. Keep an eye on the Unique visitors/number of visits and Pages/visitors ratios that you must manually calculate.

Days of month
Over the course of a month, unusual peaks may indicate your site is receiving promotion from elsewhere--review referral traffic. Abnormally low traffic, if not on a holiday, may indicate difficulty in reaching your site, whether it was down or performing poorly. Review monitoring reports if available.
Days of week
This is useful to see what days are most popular. For marketing, it indicates when the greatest number of eyeballs is generally present. For technical staff, this can suggest when to perform scheduled maintenance. There is a slight skew in that each of the seven days is not consistently present each month (30 and 31 not being evenly divisible by 7).
Hours
This is a more granular breakdown of general peaks as in the days of the week report. Hourly peaks are useful to technical staff responsible for capacity planning. Sometimes an hourly breakdown for a specific day is necessary. To generate this, see the AWStats unofficial daily reports feature documentation.

Day-to-day and month-to-month trends are useful in evaluating the impact of marketing initiatives and/or external traffic drivers.

User Provenance: Traffic Building and Monitoring

Qualified traffic building (and monitoring) is an essential marketing activity for most sites, regardless of business model. On the technical side, changes in traffic patterns are useful for technical capacity planning and management. Traffic comes from:

  • Bookmarks or direct URL entry.
  • Search engines and directories.
  • Other sites that refer (link) to a site.

The relevant AWStats reports are in the "Referers" section. The misspelling is due to a historic mistake.

Bookmarks or Direct URL Entry

AWStats reports on visitors where a "refering" URL is missing in the first page request during a visit/session. The Referrers report calls this "Direct address/Bookmarks." Some privacy software, such as Norton Internet Security, can block transfer of referring URL information, meaning that those visitors will appear in this report even if they came from a link on another site or a search engine.

Search Engine Usage Reports

Search engine reports show which search engines and queries brought visitors to the site. The main report contains the top listings; each section has a link to the complete listing for the reporting period.

Links from an Internet Search Engine
This answers the question, "Which search engines are sending us the most traffic?" See the related "Search engine crawlers" report to ensure that search engines are indexing your site.
Search Key Phrases
The top ten multiple-word combinations entered by users.
Search Keywords
The top ten individual words entered by users. This list results by aggregating the phrases into single words.

Search activity information is extremely useful in validating and refining merit-based search engine optimization efforts. Key word phrases identify the language used by site visitors, language that is usually rather colloquial compared to the jargon often prevalent in site copy. Consider revising the site copy to ensure it contains the language used by your target audience while maintaining a professional tone. The absence of keyword synonyms may be more of an indicator that these words are not present in your site's content rather than a lack of the use of these terms by internet users.

Referrers (a.k.a. "Referers")

While most indirect traffic comes through search engines, traffic can also come from external site inbound links--links due to compelling content, advertising agreements, etc. Monitor inbound links from external sites to:

  • Confirm search engine optimization reciprocal link agreements.
  • Check the progress of advertising campaigns.
  • Verify what other sites are saying about you.

By default, AWStats shows the specific page that referred to your site. It is also possible to aggregate the referrers by domain, by taking advantage of AWStats' custom report feature. Simply add the following logic to your AWstats configuration file:

ExtraSectionName1="Referring Sites by domain - Top 25"
ExtraSectionCodeFilter1="200 304"
ExtraSectionFirstColumnTitle1="Site"
ExtraSectionFirstColumnValues1="REFERER,^http:\/\/([^\/]+)\/|^HTTP:\/\/([^\/]+)\/"
ExtraSectionFirstColumnFormat1="%s"
ExtraSectionStatTypes1=PHBL
ExtraSectionAddAverageRow1=1
ExtraSectionAddSumRow1=1
MaxNbOfExtra1=25
MinHitExtra1=1

This section will appear for data after the configuration file has been updated. To retroactively generate this report, you must delete the AWStats statistics files and regenerate them as well, as the reports run from them.

Geographic Provenance

To the extent it's possible to associate a visitor's host name with a physical location, it is possible to report on the geographic provenance. By default, AWStats offers country-level reporting.

Countries
The countries report generally indicates the countries of traffic origin. As noted earlier, some users may access the internet though large company proxies, masking their true location. Nevertheless, country information can assist strategic planning relative to foreign markets--should a commerce site accept foreign payment methods? Should you translate the site into local languages? Are you big in Japan? Tip: If country information is missing, you probably haven't performed reverse DNSLookup on your logs. Alternatively, you can use the Maxmind Geoip plugin.
Region
City
ISP
Organization
Additional geographic granularity is in theory possible by purchasing commercial AWStats plugins from Maxmind. There are, however, limitations based on how visitors connect to the internet through ISPs. U.S. visitors may appear disproportionately in Virginia, having entered the internet though AOL proxies located there.



User Behavior Within the Site Reports

Several marketing reports assist in the understanding of how users behave once they have arrived at your site.

Visit duration
This is the time from the first page request up until the last page request, without a break longer than 60 minutes (the session expiration time). In general, the longer the time, the greater your site keeps a visitor's attention. The actual duration will always be longer, as web servers cannot track how long the visitor stayed on the final page before typing in a new URL or closing the browser. Short visits mean your site is not capturing the attention of your visitors.
Pages-URL
The main report shows the top ten pages seen; a link calls up the full list for the reporting period. This is useful as a gauge of which pages are more and less popular.
Entry pages
The top site access pages are an indicator of which pages search engines and external sites target. Consider ensuring that these pages speak to an audience that arrives directly to these pages.
Exit pages
These are the top pages where a visitor has abandoned the site. In the best case, the top pages are the conclusion of a natural process flow and simply indicate opportunities to entice the visitor to explore the site further. If the page is at the beginning or in the middle of a logical process flow, you have direct evidence that something impedes the conversion of a visitor into a customer. Review the page to determine what is driving visitors away--a form with 30 fields or the lack of a visible "continue" button when using Firefox, perhaps?

Tip: Consider extending AWStats by using custom reports such as ExtraSection to monitor specific site pages and/or directories. The following example, added to your AWStats configuration file, will track the most-visited first- and second-level site directories. For sites that have placed business content in distinct directories, this type of report provides overall performance at a glance.

ExtraSectionName2="Top 50 first and second level directories"
ExtraSectionCodeFilter2="200 304"
ExtraSectionCondition2="URL,^\/.*"
ExtraSectionFirstColumnTitle2="Directory"
ExtraSectionFirstColumnValues2="URL,(^(\/[\w]+\/[\w]+\/)|^(\/[\w]+\/))"
ExtraSectionStatTypes2=PHB
ExtraSectionAddAverageRow2=0
ExtraSectionAddSumRow2=0
MaxNbOfExtra2=50

Source From http://www.onlamp.com/
MinHitExtra2=1

For each line, change the 2= to 1= if you do not already have an ExtraSection enabled. In addition to the second example here, there are six examples in the AWStats online documentation topic "ExtraSection," and additional samples in the AWStats web analytics resource center.

Site Development and Management Reports

Several technical reports assist site development and quality control.

Operating systems and versions
This provides insight into the operating systems (and in the detail report, which versions of them) that visitors use to access the site. Use in combination with the browser report to identify where to concentrate site testing efforts.
Browsers
The top browsers used to visit the site. Use this to prioritize testing efforts.
HTTP status codes

Most AWStats reports work from successful requests--status 200 or 304. This report contains the others. Monitor it for potential problems. The most common are:

401 Unauthorized
For sites with a server-based login to a reserved site area, this indicates failed logins.
404 Document Not Found
This indicates a request for an object not found on the web server. This may be a file forgotten during a porting in production, an incorrect link, an outdated link from an external site (consider contacting the site to update the link), or an attack attempt.
500 Internal Server Error
This usually indicates an incorrectly configured web server or the failure of the web server to call an external program or application server.

Tip: Consider creating a custom report on the log field user agent to report on browser and operating system combinations.

AWStats Non-Human Activity Reports

We tend to think of interactive activity when we think of requests to our websites, but behind the scenes there is also a lot of automated, non-human traffic. This breaks down into four basic types:

  • Search engine crawlers
  • Human visitors using automated off-line downloading tools
  • Automated exploit attacks
  • Service quality monitoring scripts

The term robot, implying automation, refers to any of the four types. Crawler or spider refers to the undirected activity typical of search engine indexing tools: they follow links from one site to another and links within a site trawling for new content and other sites. Exploit attacks usually try to issue commands in an attempt to gain system access.

The good news is that AWStats can recognize most non-human traffic automatically and separate it from the general interactive activity reports.



Search Engine Crawlers

Crawler traffic is highly beneficial--it is the ongoing updating of your content in search engine indexes. The ability to monitor this traffic is essential as part of an overall search engine optimization strategy. Many organizations invest in paid inclusion or keywords without first having exploited the greater benefits of organic merit-based search engine optimization (SEO). Monitor this traffic to ensure Google and other bots are updating their indexes on a regular basis. The relevant AWStats report is Robots/Spiders visitors.

Off-line Download

Off-line downloading tools, such as Wget and htttrack, will download content within a domain or subdirectory of a domain, as specified by the human user who launches the tool. While your server logs these requests, you do not really know if a user ever will look at all of the pages, nor how many times the user will consult the pages off-line. From a business point of view, off-line downloading could represent monitoring by your competition. The relevant AWStats report is Browsers.

Attacks

Some site traffic consists of automated attempts to exploit weaknesses in web servers in an attempt to hijack the server. AWStats currently tracks five types of attacks on Microsoft IIS. If you don't use IIS, you can disable the report. The relevant AWStats report is Worm/Virus attacks.

Monitoring Scripts

Many sites employ automated virtual transactions to monitor specific processes in their website. The usual practice is to filter this traffic from your web statistics. To this end, AWStats provides two configuration directives. You can use SkipHosts if all of the traffic (and just that traffic) comes from a specific IP address, or SkipUserAgents if the "robot" performing the transaction identifies itself with a particular name.

A Note on Measuring Non-Human Traffic and Page Tagging

One criticism leveled at web server log file data analysis is that the presence of non-human traffic distorts the statistics. The primary alternative method, page tagging, works by including page tags that should call the counting server only when a normal browser, not a robot, visits the page. In theory, this excludes non-human traffic. Page tag vendors tout this as beneficial. Unfortunately, this approach misses information essential to the management of most sites. In particular, visibility of search engine crawler activity is an essential ingredient of an overall search engine strategy. AWStats offers the best of both worlds-- it captures automated traffic and reports on it, but maintains this data separate from interactive human user reports. Web log analysis can also report on objects that you cannot readily tag, such as images and binary document files.

Parting Words

These articles have only touched the surface of what is possible with web analytics and AWStats. The following resources may help you integrate web log analysis with AWStats into your website management.

Final Tips

  • To facilitate report interpretation by business and technical users, generate separate technical and business reports by maintaining two separate AWStats configuration files: one enabling technical reports, the other business reports.
  • If you decide to use the on-demand CGI interface:

    • Use at least version 6.4. There were security issues in previous versions.
    • Consider limiting access to the CGI interface by limiting traffic to internal IPs or by password protecting it.
  • Sign up for notification of AWStats updates. New releases may include useful features and resolve bug or security issues.

Additional Resources

Support Options

Measurement Guidelines

The following provide more exhaustive information on web analytics terminology and its usage.



Known Robots

Web Caching

Improper cache management, all too common, can affect both correct content delivery and web statistics.

Alternative Open Source Web Log Analysis Tools

There are two significant open source alternatives to AWStats.

  • Analog is an excellent technical tool offering a wealth of reporting options for a technical audience. It does not support the concept of a visitor, which makes it of little interest for business analysis.
  • Webalizer is popular among many ISPs, as it is fast and simple. It has a smaller set of features than AWStats. Development appears to have stopped in 2002, leading to many problems. For example, it counts Firefox browsers as Netscape.

None of the leading open source web analytics tools includes clickstream (path) analysis, a feature usually found in "enterprise-class" commercial solutions. StatViz, available for multiple platforms, may help fill this void. I have written rudimentary StatViz installation and configuration instructions for Linux to facilitate StatViz evaluation.


Friday, August 21, 2009

Streamyx Service interruption in Serdang

STREAMYX SERVICE INTERRUPTION IN SERDANG

Dear Valued Customers,

We wish to inform our Streamyx customers that Telekom Malaysia Berhad (TM) will be performing a network upgrading exercise from 11.30 pm, Thursday, 20th August 2009 until 11.30 pm, Friday, 21st August 2009.

As a result, Streamyx customers in Serdang may experience a disruption of service during the stipulated period. We would like to assure you that the service would resume to normal after this period.

TM apologizes for any inconvenience caused whilst the same time, we would like to assure you that we are upgrading our network to enable us to serve you better.

Customers can call TM at 100 and select “Internet Services” or e-mail us at help@tm.com.my for any Streamyx related problems.

More information: http://streamyx.com/whats_new/whats_new.php?id=article_20090820

Thank You.


Entertop.net - Support Index

Friday, August 14, 2009

CONFICKER WORM

The Conficker worm is a computer worm that can infect your computer and spread itself to other computers across a network automatically, without human interaction.

If you are an IT professional, please visit Conficker Worm: Help Protect Windows from Conficker.

On This Page

Is my computer infected with the Conficker worm? Is my computer infected with the Conficker worm?

What does the Conficker worm do? What does the Conficker worm do?

How does the Conficker worm work? How does the Conficker worm work?

How do I remove the Conficker worm? How do I remove the Conficker worm?

Where can I find more technical information about the Conficker worm and how can I stay up to date on the Conficker worm? Where can I find more technical information about the Conficker worm and how can I stay up to date on the Conficker worm?

Is my computer infected with the Conficker worm?

Probably not. Microsoft released a security update in October 2008 (MS08-067) to protect against Conficker.

If your computer is up-to-date with the latest security updates and your antivirus software is also up-to-date, you probably don't have the Conficker worm.

If you are still worried about Conficker, follow these steps:

  1. Go to http://update.microsoft.com/microsoftupdate to verify your settings and check for updates.
  2. If you can't access http://update.microsoft.com/microsoftupdate, go to http://safety.live.com and scan your system.
  3. If you can't go to http://safety.live.com, contact support at 1-866-PCSafety or 1-866-727-2338. This phone number is for virus and other security-related support. It is available 24 hours a day for the U.S. and Canada. For support in other countries, visit the Worldwide computer security information page.
Back to Top

What does the Conficker worm do?

To date, security researchers have discovered the following variants of the worm in the wild.

Win32/Conficker.B might spread through file sharing and via removable drives, such as USB drives (also known as thumb drives). The worm adds a file to the removable drive so that when the drive is used, the AutoPlay dialog box will show one additional option.

The Conficker worm can also disable important services on your computer.

In the screenshot of the Autoplay dialog box below, the option Open folder to view files — Publisher not specified was added by the worm. The highlighted option — Open folder to view files — using Windows Explorer is the option that Windows provides and the option you should use.

If you select the first option, the worm executes and can begin to spread itself to other computers.

 The option Open folder to view files — Publisher not specified was added by the worm.

The option Open folder to view files — Publisher not specified was added by the worm.

Back to Top

How does the Conficker worm work?

Here’s an illustration of how the Conficker worm works.

 Here's a visual explanation of how the Conficker worm works. Back to Top

How do I remove the Conficker worm?

If your computer is infected with the Conficker worm, you may be unable to download certain security products, such as the Microsoft Malicious Software Removal Tool or you may be unable to access certain Web sites, such as Microsoft Update. If you can't access those tools, try using the Windows Live safety scanner.

Back to Top

Where can I find more technical information about the Conficker worm and how can I stay up to date on the Conficker worm?

For more information, see How to prevent computer worms and How to remove computer worms.



Entertop.net - Support Index

Thursday, July 30, 2009

.my DOMAIN REGISTRY goes paperless

.my DOMAIN REGISTRY goes paperless
Wednesday, July 29th 09
Dear Valued Customers,

Effective 30 July 2009, .my DOMAIN REGISTRY is pleased to announce that for new domain name registrations for .my, .com.my, .net.my and .org.my, organizations formed pursuant to Business Registration Act 1956, Companies Act 1965 and Legal Profession Act 1976 need not submit the hard copies of supporting documents to Resellers unless specifically requested.

You are required to warrant that all information submitted in your application to register a domain name is complete, correct and accurate. Kindly take note of following:
  • .my DOMAIN REGISTRY reserves the right to suspend, delete and/or transfer the domain names of Registrants who have been found to have supplied incomplete, incorrect or inaccurate information in their applications to register a domain name.
  • .my DOMAIN REGISTRY reserves the right to carry out random checks on the veracity of the information submitted by Registrants from time to time.
.my DOMAIN REGISTRY has also introduced the Regulated Names Policy & Procedure, which can be accessed at http://www.domainregistry.my/regulated.php.

Kindly be informed that .my DOMAIN REGISTRY Agreement for Registration of Domain Name has been revised. The revisions to the Agreement have mainly been effected in order to cater for the introduction and implementation of .my DOMAIN REGISTRY regulated names policy and procedure.

Please refer at http://www.domainregistry.my/agreement.php for the revised "Agreement For Registration Of Domain Name" applicable to the continued registration of your domain name.

All domain names registered with .my DOMAIN REGISTRY will be subject to the revised agreement with immediate effect. Please take note that the continued registration and/or use of the domain name by existing customers shall be taken as the customer's acceptance of the revised agreement. Should you have any objection to the same, you may choose to terminate your agreement with .my DOMAIN REGISTRY by submitting the relevant current application form online, for the transfer or deletion of the domain name in accordance with the procedures prescribed by .my DOMAIN REGISTRY, no later than 14 days from the date of this email.

Please do not hesitate to e-mail domreg@domainregistry.my or call us at 03-8991 7272 if you have any query at all.

We thank you for your continued support of our services.


Entertop.net - Support Index

Friday, July 17, 2009

How to Create a Signature in Outlook Express

To set up your email signature in Windows Mail or Outlook Express:

Entertop.net - Support Index

Login Plesk Panel 9.x via Mozilla Firefox

1. First key in the web hosting server control panel address (given by entertop.net) in the Firefox address bar.

Example: https://yourDomainName.com:8443 or https://xxx.xxx.xxx.xxx:8443

2. If you see the bellow screen, This Connection is Untrusted.
Then click I Understand the Risks.



3. Click the Add Exception Button.


4.Click Get Certificate Button
5. Click Confirm Security Exception



4. The Key in the Login info.
Example
Login: yourDomainName.com (your website address)
Password: xxxxx (Password given by entertop.net, case sensitive)

Press Login


Entertop.net - Support Index

Plesk Panel 9.2 - Support Index

Login Plesk Panel Steps
  1. Logon Plesk Panel via Mozilla Firefox (3.5)
  2. Logon Plesk Server via Mozilla Firefox (3.0.x)
  3. Login Plesk Panel via Google Chrome
  4. Logon Plesk Panel via Internet Explorer (IE 7)


Entertop.net - Support Index

Wednesday, July 8, 2009

CyberSecurity Malaysia

CyberSecurity.my provide all type web security tips & information.
website: http://www.cybersecurity.my

CyberSecurity Malaysia was formed to be as a one-stop coordination centre for all national cyber security initiatives with the aim to


Reduce vulnerability of ICT systems and networks.

Nurture a culture of cyber security amongst users and critical sectors.

Strengthen Malaysian self-reliance in terms of technology and human resources

With the advent of CyberSecurity Malaysia, the people in Malaysia can have a peace of mind that the cyberspace threats can be overcome, hence achieving a safer and secured cyberspace. Among the services offered by CyberSecurity Malaysia are:


Cyber999 / Computer Emergency Response.

Cyber Forensics.

Security Assurance.

Security Management and Best Practices.

Training and Outreach.






Entertop.net - Support Index

Wednesday, June 24, 2009

Add E-mail account in Mircosoft Outlook 2007

1. Click tools -> Account Setting.



Click New Button


2. Click Mircosoft Exchange, POP3, IMAP .... Then Click Next.




3. Click the Manually configure server settings or additional server types, then click next


4. Click Internet E-mail, then click next

5. Key in the contact info
Example Keyin:

User information

1. Your Name : Mr. Lim
2. Email Address: Lim@yourdomain.com


Server information

3. POP3 incoming server: mail.yourdomain.com
4. SMTP outgoing server: mailyourdomain.com

Logon information

5.User Name: Lim@yourdomain.com
6. Password: XXXXX
7. Untick the Require logon using secure password authentication (SPA)
8. Then Click More Setting.




6.Click Outgoing Server, Tick My outgoing server (SMTP) requires authentication, use same settings as my incoming mail server, then Click Advance Tab


7. Outgoing server (SMTP): 587
8. Then click ok, Complete



Entertop.net - Support Index

Mircosoft Outlook 2007 - Support Index

  1. Add E-mail account in Mircosoft Outlook 2007
  2. Change E-mail account in Mircosoft Outlook 2007

Entertop.net - Support Index

Saturday, May 30, 2009

Would you like to know how long it takes to load a webpage?

Would you like to know how long it takes to load a webpage? StopWatch program will measure the time for you. Enter the URL to be measured and watch the top of the window.

Website: http://www.numion.com/Stopwatch/





Entertop.net - Support Index

Friday, May 22, 2009

PortableApps.com Suite and PortableApps.com Platform

PortableApps.com Suite and PortableApps.com Platform

All versions of the PortableApps.com Suite include the integrated PortableApps.com Menu (pictured at right) and the PortableApps.com Backup utility along with a set of custom icons, an autoplay configuration, folders and a quick start shortcut. In addition, the packages include:

Posted using ShareThis

Mozilla Thunderbird, Portable Edition

Mozilla Thunderbird, Portable Edition

Mozilla Thunderbird®, Portable Edition is the popular Mozilla Thunderbird email client bundled with a PortableApps.com launcher as a portable app, so you can take your email, address book and account settings with you. You can also add in GPG and Enigmail to encrypt and sign your email.

Posted using ShareThis

Sunday, May 17, 2009

20 useless Firefox add-ons (slideshow)

There are more than 7,000 Firefox extensions in Mozilla's official catalog, and a good portion of them can drastically improve how you browse the Web. Then there are the stinkers. These add-ons that actually make the browser slower, or harder to use. We've compiled a list of 20 that you should steer clear from, if only for their lack of basic utility.

It's worth noting I went through more than 7,000 extensions to come up with this list and it was incredibly tough to even come up with 20. It can also be argued that some of the ones on this list are, in fact, useful to a select few.

Nearly all of the ones on this list are up to date, but there are a few that won't work with the latest version of Firefox. We've noted that in the description. Also, for the respect of your mouse clicks I've pasted in the full list, with links to each one on Mozilla's add-ons site after the page break.



Entertop.net - Support Index

Monday, May 4, 2009

Browser Tools - check to make sure that your browser is properly configured to work with our system (Enteroom CMS)

Please use this Browser Tool and check to make sure that your browser is properly configured to work with our system (Enteroom CMS). If everything is properly configured please try to empty your browser's cookie and cache files. If you are not already, make sure you are using the most recent version of your browser. For Internet Explorer, try setting the security and privacy settings to medium or medium-low. If you continue to experience problems, please respond with the information below:

Operating System/version [updates] :
Browser/version:
Any firewall/antivirus/pop-up blockers installed? :

Here are instructions on how to clear the cookies for various browsers:

Internet Explorer 7.x

1. Click the Tools menu. If you don't see the menu, press Alt button on your keyboard to show the menus.
2. Click the Delete cookies button.
3. Click the Yes button in the confirmation window.
4. Click the Close button.

Firefox 3.x for Windows

1. In Firefox, click the Tools menu.
2. Click Options.
3. Click Privacy.
4. In the Cookies section, click Show Cookies.
5. In the Cookies dialog box, click Remove All Cookies.
6. Click OK to close the Cookies dialog box.
7. Click OK to close Options.

Firefox 3.x for Mac OS X

1. Click the Firefox menu.
2. Click Preferences.
3. Click Privacy.
4. In the Cookies section, click Show Cookies.
5. In the Cookies dialog box, click Remove All Cookies.
6. Click OK to close the Cookies dialog box.
7. Click OK to close Preferences.

Safari 3.x for Mac OS X

1. Click the Edit menu.
2. Click Preferences.
3. Click Security.
4. Click Show Cookies.
5. Click Remove All.
6. Click Done.
7. Close the 'Preferences' dialog box.

Safari 3.x for Windows

1. Click the Safari menu.
2. Select Preferences.
3. Click Security.
4. Click Show Cookies.
5. Click Remove All.
6. Click Done to close the cookies list.
7. Close the 'Preferences' dialog box.

Here are instructions on how to clear the cache for various browsers:


Internet Explorer 7.x

1. Click the Tools menu. If you don't see the menu, press Alt button on your keyboard to show the menus.
2. Select Delete Browsing History.
3. Click the Delete files button.
4. Click the Yes button in the confirmation window.
5. Click the Close button.

Firefox 3.x for Windows

1. Click the Tools menu.
2. Select Clear Private Data.
3. Select the 'Cache' checkbox.
4. Click the 'Clear Private Data Now' button.

Firefox 3.x for Mac OS X

1. Click the Firefox menu.
2. Select Preferences.
3. Select Advanced.
4. Click the Network tab.
5. In the 'Offline Storage' section, click Clear Now.
6. Click the OK button.

Safari 3.x for Mac OS X

1. Click the Safari menu.
2. Select Empty Cache.
3. Click Empty.

Safari 3.x for Windows

1. Click the Edit menu.
2. Select Empty Cache.
3. Click Empty.



Entertop.net - Support Index

Saturday, May 2, 2009

p1 Wimax not that stable, Pone Wimax after use review

After One Month using on P1 wimax, we find that the P1 wimax not the stable.

The bellow is some of our review about the P1 Wimax

1. We using p1 wimax broadband. We cannot login some of the website. Some time event the www.p1.com.my also can not login. But other using ISP can log in.

2. P1 Wimax have cache on their server. Some time we visit the website is not the latest website. Some of the website that we visit is five days ago. But other ISP don't have this issue.

3. Upload speed to the ftp server is slower than dial up modem.

Now we know why the P1 wimax come out the 24 month package get free modem. Because P1 wimax afraid you run away, so bond your 2 years


Entertop.net - Support Index

Thursday, April 30, 2009

What domain name disputes can be settled in Malaysia?

Only disputes over .my country code top level domain names can be settled through domain name dispute resolution proceedings in Malaysia. This is because only .my country code top level domain names can be registered in Malaysia with the Malaysian Network Information Centre (MYNIC). All .my domain name dispute resolutions are governed by the MYDRP, the Domain Name Dispute Resolution Policy prepared by MYNIC. Other domain disputes have to be settled through other organisations (Check the ICANN site for leads).

source from: http://www.rcakl.org.my

[ Domain Name Registration ]

Entertop.net - Support Index

What is a domain name dispute?

What is a domain name dispute?
A domain name dispute essentially means a dispute concerning the registration and/or use of a domain name. A domain name is simply a textual address by which anyone can find a host machine which hosts, for example, your website, on the Internet. Disputes over domain names have increased because domain names have become important as identifiers to businesses, joining other identifiers protected by intellectual property rights such as trademarks.

Why do such disputes arise?
Because of the first-come, first-served nature of domain name registration systems. Domain name registration service providers do not screen the filing of potentially problematic names. This is due to several reasons, including the practical difficulties involved in determining who holds the rights to a name.

What are the main causes of domain name disputes?
Most domain name disputes are due to cybersquatting. This is when third parties start registering as domain names, trademarks, names of famous people or businesses with which they usually have no connection as domain names. Usually, cybersquatters will register several variations of these names and then sell them back to the company or person involved, or auction them for prices sometimes way above the registration cost. Other cybersquatters use these domain names to attract business to their own sites.

source from: http://www.rcakl.org.my/domain-name-dispute-resolution/

[ Domain Name Registration ]

Entertop.net - Support Index

Wednesday, April 15, 2009