• Figure 7-5 Password Protect a Directory
  • Figure 7-4 Why would I need to know this?




    Download 6.37 Mb.
    bet7/42
    Sana29.09.2020
    Hajmi6.37 Mb.
    #11801
    1   2   3   4   5   6   7   8   9   10   ...   42

    Figure 7-4
    Why would I need to know this? Web logs validate traffic to a website, and provide information about visitors, including but not limited to the date and time they visited the web site, the files and directories they visited, the operating system and browser type of the visitor, the web site they can from, and many other features. For AIT Resellers, this is a valuable feature to sell your customers because it means their logs can be analyzed by the most commonly used programs available, like Webalizer, Analog, Urchin, and Web Trends. AIT only supports Webalizer on its hosting platform; however, logs can be downloaded and analyzed by any application.
    Once enabled, there will be a result at the bottom of the screen stating success or failure (Figure 7-5). Please note that Access logs are also sometimes called Transfer logs.



    Figure 7-5
    Password Protect a Directory

    There are 3 key steps to password protecting a directory; they’re listed in order in the SMT 4.1. Step 1 is to make sure that the Apache or Web server settings are correct. To verify the settings for your account, click the link under Step 1 (See Figure 7-6).






    Download 6.37 Mb.
    1   2   3   4   5   6   7   8   9   10   ...   42




    Download 6.37 Mb.

    Bosh sahifa
    Aloqalar

        Bosh sahifa



    Figure 7-4 Why would I need to know this?

    Download 6.37 Mb.