### WEBSITE DOCUMENTATION: Windows Pro (otherwise known as PRO-NT)

Logging On Via FTP - Transferring Files

File Transfer Protocol allows for easy 24 hour logons to your website storage account. Any FTP program will work; however, if you don't have one WS_FTP is recommended!  FTP programs and your website account will work with any dialup provider you may have.

To logon:

• enter your hostname where required
• hostname equals yourdomain.extention (for example mysite.com, yourname.org)
• Do not use the lead www extension.
• PLEASE NOTE:  Our Windows NT FTP server is Serv-U.  Some FTP clients such as WS-FTP

• require that you enter the correct host in the HOST TYPE field. Make sure to select "Serv-U", otherwise you may have problems viewing directory names or transferring files.
To logon via America Online:
• America Online provides a built in FTP program.
• Goto keyword: FTP.
• Click on "goto FTP" then click on "other site".
• Note that hostname is sometimes called "site address" on AOL.

File Transfers and your Directory Structure

Logon directory: Upon FTP logon you will immediately be brought to an HTTP directory called D:\http\yourdomainname_com

You will have full privileges to this directory and all other directories you can FTP into. This means you can add, edit and delete both files and directories within this file structure.

Ftp directory: Your ftp directory is located in D:\ftp\yourdomain_com.  To access this directory via FTP, you will need to execute a "change directory" command to D:\ftp\yourdomain_com via your client FTP software.  You cannot simply go through parent directories because all directories above D:\http\yourdomain_com are locked.

Problems deleting directories through SERV-U: ServU FTP does not have remove permissions set for deleting directories.  To delete a directory in this case:

PCAnywhere to the server.
Open ServU
Highlight the main directory (i.e. d:\http\domain_name) and click the remove checkbox under directory. This will enable users to delete their directories when they wish and should be the default setting for NT accounts.

AnonFtp directory: NT accounts do inheritly not support anonymousFTP.  There are many solutions to server files via other ways such as settings up a password protected directory in your web files and creating links to them.

Website directory: Your web directory is located in D:\http\yourdomainname_com. Several files are already located within your web directory structure.

CGI directory: You have a private CGI bin directory.  This is where standard CGI programs should be placed.  It should also be referred to as /private-cgi-bin/ in your URLs.  There are several programs distributed with your account.  Refer to the CGI section of this documentation page for more information.
File Transfers: It is important to note the difference between BINARY and ASCII transfers. A file sent using the wrong transfer protocol will be unusable on the receiving end. As a general rule of thumb, files that are readable in a normal text editor are usually sent as ascii. On the other hand files that look scrambled when you look at them in a text editor (like images, etc) should be sent through binary.

binary
This indicates that the files being transferred are binary. This must be used to transfer image files such as GIFs and JPEGs. It should not be used for regular HTML files, however.
ascii
This indicates that the files being transferred are text. This should be used to transfer regular HTML files and other files that are readable as normal text. The reason for the text-vs-binary distinction is that text files are stored in a slightly different format on many systems, including PCs, Macs, and Unix. When the ascii mode is enabled, the files will be translated as needed during the transfer.
delete filename
• This is used to delete a file.
Logging On Via PCAnywhere connection
• Open pca, Click on Remote Control button then click on Add Remote Control Item. Remote Control Wizard will open, First field that you will need to fill in is the name your want to call you connection, You can use any name.
• Next it will ask you what connection device you want to use. On the drop down menu you select TCP/IP and click next.

• Next it will ask you for the hostname you can use (for example your domain or your domain with the www extension.  Or you can even use you IP address.
Click next. Then click Finished

CGI, using

You have a private CGI bin directory.  This is where standard CGI programs should be placed.  It should also be referred to as
/private-cgi-bin/ in your URLs.  There are several programs distributed with your account.

CGI Programs:
------------
There are several CGI programs distributed with your account.  They are a guestbook application, a counters application and a forms-to-email application (mailto.exe)

Counters:  In order to use counters, there is a program in your private CGI directory called counters.exe.  Instructions on its use can be found at http://www.virtualscape.com/support/counter.htm  Three files associated with this program are counter.dat (the number of hits for each page), counter.cfg (configuration file) and counter.err (this will only exist in the case of errors).

Guestbook:  The program to use the guestbook is book.exe.  In your root directory you will see three files associated with this program.  They are book.html (the guestbook results), bookform.html (the form to request data) and book_instructions.html (instructions on the guestbook's use).  Both the book.html and bookform.html can be modified to look the way you want per the instructions in book_instructions.html. Two more files are located in  the private CGI directory.  These are book.cfg (configuration file) and boot.dat (data file).

Mailto.exe:  Mailto.exe is pre-installed into your account.  It is a form-to-email application much like UNIX's formmail.pl.  Complete documentation on mailto.exe is available in Microsoft Word Form.  Download the documentation file by clicking here.  Please note the docs will include installation instructions; however, these can be ignored as mailto.exe is already installed into your account.  An example of mailto.exe use:

This example will:
Send a mail message to person@company.com.
Use the mail server at the address “mail.company.com”.
Require the user to enter a number.
Require the user to enter their email address.
Require the user to enter their name.
Not display what the user types into the enter called “hidden”.
Add a field to the email message called “TestForm” with a count of the number of times the form has been used.

<FORM ACTION="/cgi-bin/mailto.exe" METHOD="post">
<input type="hidden" NAME="sendto"
VALUE="person@company.com">
<Input type="hidden" Name="server"
value="mail.company.com">
<input type="hidden" NAME="num_num"
<input type="hidden" name="email_email"
<input type="hidden" name="SERVER_NAME_display">
<input type="hidden" name="uname_required"
<input type="hidden" name="filename"
value="test.csv">
<input type="hidden" name="hidden_hidden">
<input type="hidden" name="TestForm_counter">
<PRE>
Number:     <input name="num" size=10>
Email:      <input name="email" size=30>
Name:       <input name="uname" size=20>
Hidden:     <input name="hidden" size=20>
</PRE>
Press <INPUT TYPE="submit" VALUE="Submit"> to send your message.
</FORM>

Once this form is completed by a user, person@company.com might receive the following email message:

To: <person@company.com>
Subject: Form: http://test/apply.htm
Date: Sun, 10 Mar 1996 19:20:00 +0000

The following form contents were entered on 10th Mar 96
TestForm = 2
num = 234

Perl and Scripts, Using
Standard script conventions are used when writing scripts on the PRO-SERIES servers (files must end in .cgi or .pl). Although it is important to transfer scripts (esp PERL) using ascii transfer protocol and not binary protocol to prevent unwanted characters.

We support Activestate's Perl 5.05 (for more information on Active Perl visit http://www.activestate.com/ActivePerl )

Although the Perl language is very similar between NT and UNIX, there are still some subtle differences. The biggest change is that the perl interpreter does not need to be called in the way it is handled in UNIX.  In order to have Perl recognize a script, all you have to do is have the file extension end in either .pl or .cgi. This will automatically invoke the Perl interpreter.

Path to perl:  This is unnecessary under NT. In fact, calls to the perl binary at the beginning of a script will cause the script to fail. If you have a UNIX script you are attempting to port to NT, please make sure that the Perl binary is not called at the beginning of the script.

Testing that Perl is working on your server: Cut and paste the following perl code into a file and call it dumpvars.pl. Place it in your HTTP directory and call it through a browser. If perl is working correctly, you should see a list of environmental variables displayed.

#!/usr/local/bin/perl
print "Content-type: text/plain\n\n";
for $k (sort keys %ENV) { print "$k : $ENV{$k}\n";
}

Calling Another Perl Program:   In order to call your other perl program, you need to initiate the Perl interpreter by using the following system command syntax. Remember that this must be within your HTTP directory structure otherwise security will not allow the script to be run (for example, you can not run it from your FTP directory).

system('\path\to\script.pl')

Installed PPM Modules:
Win32::ODBC
Win32::ASP
Win32::PerlZip

We can install additional modules.  As always, our support staff must first approve the module for use.

If you receive a PARSE EXCEPTION ERROR this usually means that an installed PPM is out-of-date with the current build of Perl that is installed. We can not guarantee that third party PPMs will operate with every version of Perl that is installed. We will constantly upgrade our versions of Perl, and if a particular PPM falls behind and can not be interpreted, it is out of date and you need to obtain a replacement script.

COM Objects
We supports more commercial COM objects than any other web host. The COM objects we support include (but are not limited to) the following:
• Browserhawk
• SA Fileup
• SA Studio
• ServerObjects QMail
• ServerObjects ASPPOP3
• ServerObjects ASPChart
• ServerObjects ASPImage
• ServerObjects ASPHTTP
• ServerObjects ASPNNTP
• Persits AspEncrypt
• Persits AspEmail
• Persits AspGrid
Installing my own COM Objects:  You must submit all available code to our engineers for approval. If our engineers approve the COM object code, they will install it for you but your site will be placed into its own memory space. This is to prevent problems with the COM object from affecting other sites on the same server. Please note that this will slow down your site, although, it is not noticeable except on very high traffic sites.

Do you support 3rd party COM OBJECTS? Yes.  However do to the fact that COM OBJECTS can harm server, they must be approved by our technical support department. If there are any stability or security concerns about a third party component, it will not be approved. This is to insure the overall stability and security of our shared servers. There is a $50 one-time charge for installing third party components. Password Protecting Directories You may require that some or all of their web directories be password protected. These requests must be handled by our Support staff. If you require password security for your directories, let us know the directories/usernames/passwords in question Using my Email Account Pro accounts get inlimited email boxes free. You may access your email account in the following manners: (1) THROUGH AN POP EMAIL PROGRAM : This is the preferred method of getting and sending email with your account. Your primary account mailbox as well as any secondary mailboxes may be accessed from any internet hookup using a mail program such as Eudora Mail , Pegasus, Outlook , NetscapeMail , ExplorerMail . POP programs automatically retrieve email from your account and allow you to send and store email with ease. • RECEIVING EMAIL: To connect set your email program's POP access settings to username%yourdomain.com@mail.yourdomain.com • So if your domain was www.charlie.com and your mailbox name or username was happy, you would point your mail program to POP address happy% charlie.com@mail.charlie.com. Some email programs split this setting up and have you put your retrieval username ( happy%charlie.com) and your server address mail.charlie.com in seperate fields. • SENDING EMAIL: To send email you must give your POP program a SMTP gateway address. This SMTP setting controls outgoing mail. Ideally, since you want to send email out via the shortest route possible, you should use the SMTP setting that is available from your dialup provider. Ask your dialup provider what yours is. If you cannot get one from your dialup provider ask our staff; we will be able to provide you with one. • PROBLEMS SENDING MAIL: 1. Before sending out mail, you always should check the server for new mail. This tells the server you are a valid user and authenticates your transmissions. Don't try to send out email without checking for new incoming email first. Once you check for new email you will have about a 10-15 minute window to send mail without having to check for new email again. 2. Some internet servicer providers (the company you use to dial into the internet or connect to the internet) block SMTP addresses from third party providers. This is completely normal and is actually becoming more and more common as ISPs protect their networks. In this case you need to contact them (your ISP) to get the correct SMTP address to use with their system. You simply replace our SMTP setting with theirs. Using their SMTP setting should correct your problem instantly. Keep in mind that if your ISP requires you to use their SMTP, any additional problems sending mail will originate from your ISP, so contact them first for sending support before contacting us. If you determine that your ISPs mail sending system is unreliable then we do offer low-cost dialup accounts that you may want to try instead. Setting up email for Eudora Email Software version 3: • On the top of Eudora, select SPECIAL and then scroll down to settings. • Your POP retreival setting should look like: username@mail.your_domain.com or if your account was setup past 10/2001 it should look like username%your_domain.com@mail.yourdomain.com. • Your SMTP server setting controls your outgoing email (see above for details) was included in your initial startup email. • Your return address should be your proper email address, for example username@yourdomain.com. • Under the CHECKING MAIL SECTION, make sure the "Leave Mail on Server" option is not chosen. The "Send on check" option should also not be chosen. • Alright, Eudora should now be configured to reach your mailbox here at WEBster. • Note: If your email mailbox came with your dialup account please refer to that account's documentation, not ours. Setting up email for Eudora Email Software version 4 or later: • On the top of Eudora, select TOOLS and then scroll down to OPTIONS. • Your incoming email server setting should look like: mail.your_domain.com. • For instance ours is mail.webcs.com. • Your username is simply your mailbox username or if your account was setup past 10/2001 it should look like username%your_domain.com • Your SMTP server setting controls your outgoing email (see above for details) was included in your initial startup email. • Your return address should be your proper email address, for example username@yourdomain.com. • Under the CHECKING MAIL SECTION, make sure the "Leave Mail on Server" option is not chosen. The "Send on check" option should also not be chosen. • Alright, Eudora should now be configured to reach your mailbox here at WEBster. • Note: If your email mailbox came with your dialup account please refer to that account's documentation, not ours. Setting up email for Outlook, Netscape and Microsoft: • Your incoming email server setting should look like: mail.your_domain.com. • For instance ours is mail.webcs.com. The type of mail server is POP3 or if that does not work just POP. • Your username is simply your mailbox username or if your account was setup past 10/2001 it should look like username%your_domain.com • Your SMTP server setting controls your outgoing email (see above for details) was included in your initial startup email. • Your return address should be your proper email address, for example username@yourdomain.com. • Note: If your email mailbox came with your dialup account please refer to that account's documentation, not ours. Setting up LiveStats and viewing logs: • Livestats: a commercial program that allows for graphical viewing of web statistics on NT servers. The commercial version of livestats is usually$10 per month, however, through special arrangement with our vendors it is only \$5 for our customers.
• When activated it can be accessed via the control panel.

• Raw logs: NT accounts do support raw logs.  They may be viewed and downloaded.
• To access them use FTP to goto directory: e:\logs\zebiz_com
Replace zebiz_com with your domain name.  For example, if your domain is rabbit.net you would replace it with rabbit_net
If this fails your log files may be on another partition.  Try altering the drive letter to something other than e.
• Setting up SSL secure pages on NT:
• You do not need to put your files anywhere special.  All you need to do is change your browser URL from your domainname.com/filename.html to your secured server name such as securesecure1.com/fielname.html
• Once you change the URL the page is auto-encrypted in SSL.
• Note, use SSL sparingly.  It should not be used for any normal webpages.
• To determine your secured server name you must know your server number.  Contact us if you have forgotten it.  Some of our servers are as follows:

• NT1---
ServerName nt1.securedweb.net
NT2---
ServerName nt2.securedweb.net
NT3---
ServerName nt3.securedweb.net
NT4---
ServerName nt4.securedweb.net
NT5---
ServerName nt5.securedweb.net
NT11---
ServerName nt11.securedweb.net
NT12---
ServerName nt12.securedweb.net
etc......

Obtaining your own secure certificate: Obtaining your own Verisign, Thawte, or Equifax certificate is only an issue if you need to keep our secure server name out of your links (to hide our identity).  However, this is usually a non-issue since our secure servers are nonbranded as seen.

In fact 99.9% of our customers use our shared secured certificate without issue.