Click to Return to Webby homepage You have a friend @Webby!  

CTRL + zooms fonts
Toolbox
Pay For Renewals
The Cart
Software for your own posty site Get Your Posty Site
Privacy Policy
Marketing FAQ
Hosting FAQ
Tools
Terms and conditions
Random Picked Clients
Lessontutor
Angel Winks
Stonecarver.com
Condo Fees
Poor Clare Nuns
Angel Eyes
http://www.?????
Look for an available domain name
We Use and Recommend


We use and have used toner and ink and ink cartridges from Atlantic Inkjet. com for over a dozen years and are very satisfied with their inks and their friendly support for all printers. If you need some printer ink, we can highly recommend them.

Click here for a FREE
30 day trial

This is the Mail Washer that I use and have used for almost 3 years. I have tested many others, but Mail Washer is still The Best spam control.
Fun Stuff
Humor Letter
Top Posty Sites
The Right Posty
for that special client or friend
Useful Tools
Converter
Babelfish
Tools
Virus Hoaxes
<!---

Secure Hosting FAQ

Why should I use a secure certificate?

A secure SSL certificate gives customers confidence in your identity and reliability. Offering SSL security adds credibility to your online business and demonstrates a willingness to protect customer information and privacy.

The high encryption involved with SSL ensures that credit card info and any other confidential information remains absolutely confidential. SSL is also used to keep project developement and research protected.

What is a Secure Certificate ?

A secure certificate guarantees the visitor that the site owner is a legitimate business and not just a visitor to a cyber cafe. With a secure certificate installed on a domain, standard browsers can use secure encrypted mode.

How do I get a Secure set-up ?

Step 1. You need your own legitimate domain web space (a subdirectory on geocities won't do)

Step 2. You need a real address. (A box number in Las Vegas and a hotmail address is not good enough)

Step 3. You need some proof of being legitmate and not just some crook who occasionally visits a cyber cafe.

To proove the legitimacy of your business you need these documents:

For a Home Based Business:

  1. You need a copy of a verifyable business license that has your street address on it. If your company is not a sole proprietorship you also need a copy of your incorporation papers.
  2. A letter from the president or owner of your business authorizing that the business gets a Secure Certificate, and that we can make reasonable checks to verify that the business is legitimate. This ensures that nobody else gets a certificate with your good name to use for their unauthorized purposes.
  3. A phone number where you can be reached.

Fax these papers to us at (403) 995-6554.

For Partnerships and Incorporated businesses you need:

  1. copy of a verifyable business license that has the street address of your business on it.
  2. A copy of your incorporation and or partnership papers.
  3. A letter from the president or owner of your business authorizing that the business gets a Secure Certificate, and that we can make reasonable checks to verify that the business is legitimate. This ensures that nobody else gets a certificate with your good name to use for their unauthorized purposes.
  4. A phone number where you can be reached.

Fax these papers to us at (403) 995-6554.

Step 4. You have to order your secure certificate on the Secure Insider's Store

It takes a few days to complete all the checks. The procedure is very thorough to ensure that only real and legitimate businesses get the secure certificate.

If you have any questions, feel free to write or call us at (403) 995-6545.

Can I get in on a server wide secure deal ?

Hitch-hiking along on somebody elses certificate works against you because all new browsers will detect that and warn the visitors. On Webby we only use real Thawte certificates that certify that that particular business is legitimate. We do not recognize or allow mall style certificates.

What is SSL ?

The SSL (Secure Sockets Layer) Handshake Protocol [Hic95] was developed by Netscape Communications Corporation to provide security and privacy over the Internet. The protocol supports server and client authentication. The SSL protocol is application independent, allowing protocols like HTTP (HyperText Transfer Protocol), FTP (File Transfer Protocol), and Telnet to be layered on
top of it transparently. The SSL protocol is able to negotiate encryption keys as well as authenticate the server before data is exchanged by the higher-level application. The SSL protocol maintains the security and integrity of the transmission channel by using encryption, authentication and message authentication codes.

The SSL Handshake Protocol consists of two phases: server authentication and an optional client authentication. In the first phase, the server, in response to a client's request, sends its ertificate and its cipher preferences. The client then generates a master key, which it encrypts with the server's public key, and transmits the encrypted master key to the server. The server recovers the master key and authenticates itself to the client by returning a message authenticated with the master key. Subsequent data is encrypted and authenticated with keys derived from this master key. In the optional second phase, the server sends a challenge to the client. The client authenticates itself to the server by returning the client's digital signature on the challenge, as well as its public-key certificate.