Features with Images

File Manager

Use the File Manager interface to manage your files. This feature allows you to upload, create, remove, and edit files without the need for FTP or other third-party applications.

Disk Usage

Use Disk Usage interface to scan your disk and view a graphical overview of your account's available space. This feature can help you to manage your disk space usage.

FTP Connections

Use FTP Connections interface to view current connections to your site via FTP. Terminate FTP connections to prevent unauthorized or unwanted file access.


Use Images interface to manage your images. You can view and resize images, or use this feature to convert image file types.


Web Disk

Use the Web Disk feature to access to your website's files as if they were a local drive on your computer.


FTP Accounts

Use the FTP Accounts interface to manage File Transfer Protocol (FTP) accounts.


Directory Privacy

Set a password to protect certain directories of your account. When you enable this feature, a user that tries to open a protected folder will be prompted to enter a username and password before they can access your content. 



phpMyAdmin is a third-party tool that you can use to manipulate MySQL databases. For more information about how to use phpMyAdmin, visit the phpMyAdmin website.


Remote MySQL

Add a specific domain name to allow visitors to connect to your MySQL databases. Applications like bulletin boards, online shopping carts, and content management systems require databases to operate. For more information, read the documentation.


MySQL Databases

Manage large amounts of information over the web easily. MySQL databases are necessary to run many web-based applications, such as bulletin boards, content management systems, and online shopping carts. For more information, read the documentation.


MySQL® Database Wizard

MySQL Databases allow you to store lots of information in an easy to access manner. The databases themselves are not easily read by humans. MySQL databases are required by many web applications including some bulletin boards, content management systems, and others. To use a database, you’ll need to create it. Only MySQL Users (different than mail or other users) that have privileges to access a database can read from or write to that database.


Site Publisher

You can use this interface to quickly create a website from a set of available templates. This allows visitors to see some basic information while you continue to develop your website.


Domain Aliases

Domain aliases make your website available from another domain name. For example, you can make www.example.net and www.example.org show content from www.example.com. For more information, read the documentation.



A subdomain is a subsection of your website that can exist as a new website without a new domain name. Use subdomains to create memorable URLs for different content areas of your site. For example, you can create a subdomain for your blog that is accessible through blog.example.com and www.example.com/blog



A redirect allows you to make one domain redirect to another domain, either for a website or a specific web page. For example, create a redirect so that www.example.com automatically redirects users to www.example.net. For more information, read the documentation.


Email Accounts

Manage the email accounts associated with your domain. Use the Set Up Mail Client interface to add an email account to your mobile device or desktop email client. For more information, read the documentation.



Configure an email account to send automated emails. This can be useful if you are on vacation or unavailable, or if you have a generic message that you wish to send from a support email address. For more information, read the documentation.



Send a copy of any incoming email from one address to another. For example, forward joe@example.com to joseph@example.com so that you only have one inbox to check. For more information, read the documentation.


Default Address

Catch any email that is sent to an invalid email address for your domain. For more information, read the documentation.


Mailing Lists

Use a single address to send email to multiple email addresses. For more information, read the documentation.


Track Delivery

Review an email’s delivery route. This can be useful if you need to locate problems with email delivery. For more information, read the documentation.


Global Email Filters

You can add multiple rules to match subjects, addresses, or other parts of the message. You can then add multiple actions to take on a message such as to deliver the message to a different address and then discard it.For more information, read the documentation.



Email authentication helps prevent spam. The options attempt to equip email messages with verifiable information so that the nature of incoming and outgoing messages can be detected automatically.  Enabling these features should reduce the number of failed delivery notifications you receive when spammers forge messages from your domain(s). These features also work to prevent spammers from forging messages that claim to be from your domain(s).


Email Disk Usage

This utility allows you to recover disk space by deleting old messages from your mailbox.



Use the Visitors interface to view the most recent entries in the Apache log for a given domain.



This function allows you to see the bandwidth usage for your site. It shows the current month’s bandwidth usage, as well as your total bandwidth usage. This will include all HTTP (web) and POP (mail) bandwidth usage, and may include FTP bandwidth usage if your system administrator has enabled FTP bandwidth logging.


Raw Access

Use Raw Access interface to view visitors to your website without graphs, charts, or other graphics. Download a zipped version of your server's access log to quickly access your site's visitors.


IP Blocker

Use the IP Blocker interface to prevent access to your site from a range of IP addresses. If you enter a fully qualified domain name, this feature will attempt to resolve it to an IP address.


Leech Protection

Use the Leech Protection interface to set a maximum number of logins that can occur within a two-hour time limit. This feature can help you manage users who wish to publicly post their passwords to a restricted area of your site.


Hotlink Protection

 Hotlink protection prevents other websites from directly linking to files on your website. Other sites will still be able to link to any file type that you don’t specify . An example of hotlinking would be using a tag to display an image from your site from somewhere else on the net. The end result is that the other site is stealing your bandwidth. List all sites below from which you wish to allow direct links. This system attempts to add all sites it knows you own to the list; however, you may need to add others. 


Cron Jobs

Use the Cron Jobs interface to automate certain commands or scripts on your site to run at a specific time. For example, you could set a cron job to delete temporary files every week to free up disk space.