Just the FAQs

Decipher the technical language dealing with the Internet, websites and domains.

Design & Development

  • Do I need working backups of my website?

    It is extremely important to have your website backed up regularly. The website backup means that you can have a similar copy of your content and data with you. You can keep it safe. Whatever happens to your website, the data will be available to you, and you can use it later. The top 10 reasons for needing a backup are:

    1. Guarding against human-error
    2. Reverse Problems During Updates
    3. Preventing Data loss
    4. Capability issues after new installations
    5. Fix malware infections
    6. Maintain Hacker Protection
    7. Enabling easy Site Migration
    8. Testing a new version of your website
    9. Having your revenue stream not interrupted
    10. Making sure you have strong Security Practices.
  • What is a Content Management System?

    A content management system (cms) is a tool that helps you build a website without needing to write all the code from scratch (or even know how to code at all).

    Our CMS of choice is WordPress, although we have clients who prefer using a different CMS.

    Our reasons for using WordPress have been outlined here.

  • Why do I need a security certificate for my website?

    An security certificate is also called a SSL Certificate. When a site has an SSL Certificate the web address (URL) is prefixed with HTTPS instead of HTTP. In 2018 Google made a decision to add SSL to the ranking algorithm it uses as a mandatory item. This has meant that websites have needed a SSL Certificate to help with Search Engine Optimisation.

    Apart form helping with your Search Engine Rankings having a Security Certificate also helps with:

    • Protecting your data on your website
    • Your website Identity is authenticated
    • Helps with accepting online payments
    • Improves customer trust.

  • Domain Management

  • Do I have my domain name forever?

    Domain Names are basically Licensed to you. You do not own them. The length of a domain name registration in .au zone is two (2) years. Other zones have different lengths of domain name registration. For example a .com domain can be registered for a minimum of one (1) year.

    90 days before your domain is due for license renewal, you are advised by email.

    As Atcom Host would look after this for you, you can be assured we will renew your domain on time.

  • How much disk space do I have when I host my website with AtcomHost?

    Disk space is the allocation of hosting storage allocated to your website to use. Atcom Host allocates the amount of disk space you need depending on

    • the  plan you choose
    • how large your website is.

    Not having enough disk space means that you are not able to update your website, and website performance could be impacted. With the Business and Executive Internet presence plans Atcom Host actively monitors your disk space and changes it as need arises.

  • What do I need to register a domain name in Australia?

    For an .au zone domain name (.com.au or .net.au) you will need to:

    • be a commercial entity
    • have either an Australian Company Number (ACN) or Australian Business Number (ABN).

  • What does Mail Record edits involve?

    There are several records that are used to setup and secure your email services.

    mail exchange record (MX record) is a resource record or settings within the Domain Name System (DNS) that redirects email to a specified mail server that accepts email on behalf of a domain or users. Within an MX record you can set routing priorities using preference values for which mail server will be used if there are multiple servers.

    www.techopedia.com/definition/1685/mail-exchange-record

     Sender Policy Framework (SPF) records allow domain owners to publish a list of IP addresses or subnets that are authorized to send email on their behalf.

    mxtoolbox.com/spf.aspx

    Domain-based Message Authentication, reporting and Conformance record controls what happens if a message fails authentication. It tells a server to either Quarantine or reject the message or allow the message to be delivered. It also sends a report to an email address/es with data about all messages seen from the domain.

    Editing these records and keeping them up to date allows Atcom Host to prevent your domain from being used for spam and spam being sent to your domain. These records also add to your online reputation. These records also work with your unique domain key as well.

  • What is DNS and Why is it important?

    DNS stands for Domain Name System. It is responsible for the allocation and direction of traffic for domain names based on the web address in the browser.

  • What is Domain Pointing?

    For visitor’s to see your website through your domain, they need to be connected. Pointing is adding your website IP address to your domain records on  your domain host allows this to happen. When making changes like moving your website to a new host server be aware that it takes time for the internet to be aware of the move. This is called propagation.

  • What is domain privacy and why do I need it?

    When you register a domain name the information inputted is freely available through the WHOIS service. Domain Privacy Protection is used to protect your domain and yourself from Identity Theft, Illegal commercial emailing, unwanted phone calls, spam / junk emails as well as protecting your information from your competitors. Domain Privacy Protection means that your publicly available information will not be published and measures are put in place.

  • What is Spam?

    Spam can be defined as:

    any kind of unwanted, unsolicited digital communication that gets sent out in bulk?

    malwarebytes.com/spam

    Spam can come over any digital or electronic messaging service.
    Be this by mobile (phone calls or text messages) social media or email.
    Spam is usually only annoying and not done with an intent to be malicious. Phishing on the other hand is meant to deceive you into giving personal details such as passwords and credit card details.

    How to Recognise Spam

    There are a several common types of spam emails. Most email services (such as live.com, gmail.com, etc.) block spam or identify it in some way, although some emails may get through. the following list is not exhaustive in the types of spam you may receive so it is a good idea to know what to look for.

    Non malicious Spam email

    • Dating & Adult Content
    • Health & Medical Services
    • Technology, Internet & Computer Services
    • Financial Services & Awards

    malicious Spam email

    • Phishing emails wanting YOUR sensitive information
    • Email Spoofing – mimicking email from a legitimate sender. These usually request payment, request password reset or for you to verify your account, or request update to billing information.
    • Scams including Tech support, current events and Advance fees
    • Malspam – this delivers malware to your computer or mobile devices. This includes Trojans, bots, crypto miners, spyware, keyloggers and ransomware.

    How do I protect myself

    The best way is to learn how to spot a spam/phishing email, call or text. There are some key signs that the message is not legitimate:

    1. The sender’s email address. If legitimate the senders email address should match the domain name of the company they represent.
    2. Missing personal information. A company should have your personal details if you are a customer, at least your first name. This is one thing to look for as it does not in itself specify a dodgy email. If it tells you that you’ve been locked out of your account or owe money then be careful as this is what a phishing emails wants you to do.
    3. Beware of any links or attachments in the email. Verify first before clicking on the link or opening the attachment. You can contact the company to ask if a suspicious message is the read deal or not.
    4. Unbelievably good offers. If it sounds to good to be true then the email is not what it seems to be.

    Now you have some idea of how to recognise a spam/phishing email you need to protect yourself by installing good mail filtering software such as Microsoft’s Advance Threat Protection, or Trend Micro Email Security, on the client side and the use of DMARC, DKIM AND SPF records in DNS to minimise spoofing of your domain.

  • What is web hosting?

    Web Hosting is where you website lives. It is usually with a hosting service provider.

    Atcom Host provides web hosting for clients who need it, depending on the plan they purchase:

  • Why is lots of bandwidth important?

    Bandwidth is the measurement of data being transmitted through the web server. High traffic on a website means that it needs more bandwidth. Bandwidth also dictates how many visitors your website can handle during any given time period.

  • Getting Started

  • What is a Content Management System?

    A content management system (cms) is a tool that helps you build a website without needing to write all the code from scratch (or even know how to code at all).

    Our CMS of choice is WordPress, although we have clients who prefer using a different CMS.

    Our reasons for using WordPress have been outlined here.

  • What is Spam?

    Spam can be defined as:

    any kind of unwanted, unsolicited digital communication that gets sent out in bulk?

    malwarebytes.com/spam

    Spam can come over any digital or electronic messaging service.
    Be this by mobile (phone calls or text messages) social media or email.
    Spam is usually only annoying and not done with an intent to be malicious. Phishing on the other hand is meant to deceive you into giving personal details such as passwords and credit card details.

    How to Recognise Spam

    There are a several common types of spam emails. Most email services (such as live.com, gmail.com, etc.) block spam or identify it in some way, although some emails may get through. the following list is not exhaustive in the types of spam you may receive so it is a good idea to know what to look for.

    Non malicious Spam email

    • Dating & Adult Content
    • Health & Medical Services
    • Technology, Internet & Computer Services
    • Financial Services & Awards

    malicious Spam email

    • Phishing emails wanting YOUR sensitive information
    • Email Spoofing – mimicking email from a legitimate sender. These usually request payment, request password reset or for you to verify your account, or request update to billing information.
    • Scams including Tech support, current events and Advance fees
    • Malspam – this delivers malware to your computer or mobile devices. This includes Trojans, bots, crypto miners, spyware, keyloggers and ransomware.

    How do I protect myself

    The best way is to learn how to spot a spam/phishing email, call or text. There are some key signs that the message is not legitimate:

    1. The sender’s email address. If legitimate the senders email address should match the domain name of the company they represent.
    2. Missing personal information. A company should have your personal details if you are a customer, at least your first name. This is one thing to look for as it does not in itself specify a dodgy email. If it tells you that you’ve been locked out of your account or owe money then be careful as this is what a phishing emails wants you to do.
    3. Beware of any links or attachments in the email. Verify first before clicking on the link or opening the attachment. You can contact the company to ask if a suspicious message is the read deal or not.
    4. Unbelievably good offers. If it sounds to good to be true then the email is not what it seems to be.

    Now you have some idea of how to recognise a spam/phishing email you need to protect yourself by installing good mail filtering software such as Microsoft’s Advance Threat Protection, or Trend Micro Email Security, on the client side and the use of DMARC, DKIM AND SPF records in DNS to minimise spoofing of your domain.

  • What is web hosting?

    Web Hosting is where you website lives. It is usually with a hosting service provider.

    Atcom Host provides web hosting for clients who need it, depending on the plan they purchase:

  • Security

  • Do I need working backups of my website?

    It is extremely important to have your website backed up regularly. The website backup means that you can have a similar copy of your content and data with you. You can keep it safe. Whatever happens to your website, the data will be available to you, and you can use it later. The top 10 reasons for needing a backup are:

    1. Guarding against human-error
    2. Reverse Problems During Updates
    3. Preventing Data loss
    4. Capability issues after new installations
    5. Fix malware infections
    6. Maintain Hacker Protection
    7. Enabling easy Site Migration
    8. Testing a new version of your website
    9. Having your revenue stream not interrupted
    10. Making sure you have strong Security Practices.
  • What does Mail Record edits involve?

    There are several records that are used to setup and secure your email services.

    mail exchange record (MX record) is a resource record or settings within the Domain Name System (DNS) that redirects email to a specified mail server that accepts email on behalf of a domain or users. Within an MX record you can set routing priorities using preference values for which mail server will be used if there are multiple servers.

    www.techopedia.com/definition/1685/mail-exchange-record

     Sender Policy Framework (SPF) records allow domain owners to publish a list of IP addresses or subnets that are authorized to send email on their behalf.

    mxtoolbox.com/spf.aspx

    Domain-based Message Authentication, reporting and Conformance record controls what happens if a message fails authentication. It tells a server to either Quarantine or reject the message or allow the message to be delivered. It also sends a report to an email address/es with data about all messages seen from the domain.

    Editing these records and keeping them up to date allows Atcom Host to prevent your domain from being used for spam and spam being sent to your domain. These records also add to your online reputation. These records also work with your unique domain key as well.

  • What does secure lock down mean?

    Secure lock down means that your WordPress site is hardened against know vulnerabilities. These vulnerabilities often happen when the core of WordPress is not updated, poor system administration, plugins and themes that have been modified/hacked to allow collection of data or cause harm to your site in some way. Because of this people often assume WordPress is not secure.

    Fundamentally, security is not about perfectly secure systems. Such a thing might well be impractical, or impossible to find and/or maintain. What security is though is risk reduction, not risk elimination. It’s about employing all the appropriate controls available to you, within reason, that allow you to improve your overall posture reducing the odds of making yourself a target, subsequently getting hacked. – WordPress Security Codex

    The above quote embodies what we here at atcomHost do so that your site can be as secure as it can be against

    • Backdoors
    • Pharma Hacks
    • Brute-force Login Attempts
    • Malicious Redirects
    • Cross-site Scripting (XSS)
    • Denial of Service

  • What is domain privacy and why do I need it?

    When you register a domain name the information inputted is freely available through the WHOIS service. Domain Privacy Protection is used to protect your domain and yourself from Identity Theft, Illegal commercial emailing, unwanted phone calls, spam / junk emails as well as protecting your information from your competitors. Domain Privacy Protection means that your publicly available information will not be published and measures are put in place.

  • What is Spam?

    Spam can be defined as:

    any kind of unwanted, unsolicited digital communication that gets sent out in bulk?

    malwarebytes.com/spam

    Spam can come over any digital or electronic messaging service.
    Be this by mobile (phone calls or text messages) social media or email.
    Spam is usually only annoying and not done with an intent to be malicious. Phishing on the other hand is meant to deceive you into giving personal details such as passwords and credit card details.

    How to Recognise Spam

    There are a several common types of spam emails. Most email services (such as live.com, gmail.com, etc.) block spam or identify it in some way, although some emails may get through. the following list is not exhaustive in the types of spam you may receive so it is a good idea to know what to look for.

    Non malicious Spam email

    • Dating & Adult Content
    • Health & Medical Services
    • Technology, Internet & Computer Services
    • Financial Services & Awards

    malicious Spam email

    • Phishing emails wanting YOUR sensitive information
    • Email Spoofing – mimicking email from a legitimate sender. These usually request payment, request password reset or for you to verify your account, or request update to billing information.
    • Scams including Tech support, current events and Advance fees
    • Malspam – this delivers malware to your computer or mobile devices. This includes Trojans, bots, crypto miners, spyware, keyloggers and ransomware.

    How do I protect myself

    The best way is to learn how to spot a spam/phishing email, call or text. There are some key signs that the message is not legitimate:

    1. The sender’s email address. If legitimate the senders email address should match the domain name of the company they represent.
    2. Missing personal information. A company should have your personal details if you are a customer, at least your first name. This is one thing to look for as it does not in itself specify a dodgy email. If it tells you that you’ve been locked out of your account or owe money then be careful as this is what a phishing emails wants you to do.
    3. Beware of any links or attachments in the email. Verify first before clicking on the link or opening the attachment. You can contact the company to ask if a suspicious message is the read deal or not.
    4. Unbelievably good offers. If it sounds to good to be true then the email is not what it seems to be.

    Now you have some idea of how to recognise a spam/phishing email you need to protect yourself by installing good mail filtering software such as Microsoft’s Advance Threat Protection, or Trend Micro Email Security, on the client side and the use of DMARC, DKIM AND SPF records in DNS to minimise spoofing of your domain.

  • Why do I need a security certificate for my website?

    An security certificate is also called a SSL Certificate. When a site has an SSL Certificate the web address (URL) is prefixed with HTTPS instead of HTTP. In 2018 Google made a decision to add SSL to the ranking algorithm it uses as a mandatory item. This has meant that websites have needed a SSL Certificate to help with Search Engine Optimisation.

    Apart form helping with your Search Engine Rankings having a Security Certificate also helps with:

    • Protecting your data on your website
    • Your website Identity is authenticated
    • Helps with accepting online payments
    • Improves customer trust.