New features of WEBppliance 3.5

WEBppliance 3.5 introduces many new features that extend its capability.

These features include:

Sites can now be enabled to host subdomains on root domains and inherit the capabilities of the root domain. Subdomains enable businesses to establish multiple online service channels for various product lines and extend their web presence preserving brand association and unity.

Features of subdomain:

You can enable multiple databases for a site empowering Site Administrators with greater control and flexibility in planning information storage and distribution.

Sites that use demanding applications or services now have greater leeway in designing efficient data distribution.

MySQL features:

WEBppliance 3.5 revamps the existing capabilities of backup and restore to provide a more robust and flexible solution. You are empowered with better control and choice over the types of backup that can be invoked, the mode of data transfer, and the backup schedule.

Some of the major enhancements are:

Webalizer provides detailed graphical and tabulated log analysis reports of Web and FTP server usage. You can view daily, monthly and hourly summaries of the number of hits, pages, data transferred in Kbytes and other server usage information in easily comprehensible format.  

You can establish appropriate security levels for each site from the WEBppliance Control Panel. The security level set for a site determines the operating environment of the site.

Sites can be qualified with the following security options:

High security – Implements a highly secure Web environment; Remote login services (Telnet /Secure Shell) and CGI scripts are locked in the restricted environment of the site’s file system. High security sites can not run mod_perl or mod_php scripts.

Medium security – Implements security mechanism for remote login services (Telnet /Secure Shell), but CGI scripts run in a vulnerable environment. The site is enabled to run mod_perl and mod_php scripts.

Low security – All the services (Telnet, SSH, CGI scripts) operate in a susceptible environment. Users can also run mod_perl or mod_php scripts.

 

Related Topics