Basic Hosting Questions

What is a web host? more + less -

A web host is kind of like a landlord - but rather than bricks and mortar, your web host provides you with your space on the internet. You'll need a quick and reliable computer to keep your files connected to the internet. And rather than buying your own server, constantly maintain it and keep it updated with the latest software, a web host can take care of all this for you, leaving you with what's important, sharing your information with the world. Along with providing you with space, a web host gives your site e-mail at your domain name and can take care of the technical requests you have.

How does a web site work? more + less -

Let's say somebody is online and they look up your domain name. This will connect them to what is called a web server. A web server is a very powerful computer that can store many files, including your web site. When they are connected, your files will be presented in the form of your site. So in order for you to get online, you must choose a web server to be hosted by, or a web host, and create the files that will be your web site.

What is data transfer? more + less -

Your data transfer is the total size of data [ packets ] which is transferred across the Internet to or from your account. All reputable hosting companies must impose data transfer restrictions in order to control their bandwidth usage and ensure a high standard of service. You can monitor your data transfer in real time via your control panel.

Domain Questions

What is a domain name? more + less -

A domain name is a very important aspect of a web site. If the internet is a map of the world, your domain name is your Internet address. Usually represented by the name of the business or organization starting the site, many sites opt for something clever and memorable to get people interested in their site. This is especially important considering people may have common interest in the same domain name. To help matters, there are different types of domain names. The most common would be ".com" (as in yourdomain.com), but you also have the choice of ".org," or ".net". Unfortunately most short or generic terms are already registered, although there are still plenty of good domains available from the Hong Kong domain registry for .com.hk names.

How long does it take to register a domain name? more + less -

It usually takes about 24 hrs to register a domain name - however it can take between 3 and 14 days to register a .hk domain name. This is because the procedure for registering a .hk domain name is much more complicated than for registering a .com domain.

What is the cost to register a domain name? more + less -

That depends what type of domain name it is, for example a .hk domain name is more expensive than a .com domain and over what period you want to register the domain also effects the price. To see our pricing please click here.

What is a Registrar? more + less -

A Registrar is an organization or company that is accredited by ICANN (Internet Corporation for Assigned Names and Numbers) to provide domain name for the registration services. There are different registrars serving each country code throughout the world and each registrar has different rules regarding registration procedures and fees. To register a .hk domain name you must be either a company registered in Hong Kong or a charity or educational institution registered in Hong Kong, however, anyone can register a .com domain name.

What are nameservers? more + less -

Every Domain has to have a Name Server associated to it - consider it to be its address and the internet uses this to find your domain when someone types in your domain name into a browser. If you host your domain with Jump then our name servers are as follows:

Primary Server Hostname: ns1.jumphk3.net 
Primary Server Net Address: 
Secondary Server Hostname: ns2.jumphk3.net 
Secondary Server Net Address:

Is there any interruption in service when I transfer my Domain to your severs? more + less -

After changing name servers or registering a new domain name, it will take at LEAST 24 hours before you will be able to see your domain by going to http://www.yourdomain.com . This process normally takes between 24-72 hours, but will take at least seven days for a .hk domain. This delay, referred to as a DNS propagation delay, occurs with all hosts and is outside of our control. During this period, you may also experience intermittent connection to your domain. That is, it may become available but disappear again a few hours later. This is also an effect of the DNS propagation and will typically resolve itself within 5 days after assigning the new name servers.

Until your domain fully resolves (3-5 days from the time you changed it) you will NOT be able to do the following:

View your domain at http://www.yourdomain.com Check your mail (POP3, SMTP and Webmail will NOT work) Publish using FrontPage extensions.

Specific Hosting Questions related to your Jump account

Are there any set up fees with your hosting? more + less -

There are no set up fees, you are only charged the monthly amount of your hosting plan.

Do you put any types of advertising on my pages? more + less -

No, we do not put any types of advertising on your pages.

How much space can I use for hosting features (such as MySQL databases, CGI-scripts, PHP etc.)? more + less -

Any space used for Web Hosting Features such as MySQL databases, CGI scripts, PHP etc. is deducted from the total disk space you are allotted.

How can I see how much disk space and data transfer I have used and have remaining? more + less -

Once you purchase an account you may view sites logs through your control panel. You may view how much disk space and bandwidth you have used and have remaining.

What happens if I use more than my quota of disk space or data transfer? more + less -

If you need a hosting feature that is not listed on our Web Hosting Features page, please contact us and we will endeavour to install it for you. There may be a licensing or installation fee depending which feature you require.

I have received an email saying that my account is “over quota”, what should I do? more + less -

There are 2 ways you can reduce the disk space quota for your account:


1) Delete emails from server
Outlook 2010: Click the File tab, then Account Settings>Account Settings. Select your account and click Change, then More Settings. Select the Advanced tab 


2) Delete emails via the webmail. Please click here to refer to section 4 of the webmail guide.


Or you can simply contact us at support to upgrade your plan.

My apple mail cannot send email, how do I fix this? more + less -

You may first check, to make sure the Apple Mail account settings are as following:


Outgoing (SMTP) mail server settings

Outgoing Mail Server: mail.jump.com.hk

Outgoing server port: 587

The outgoing mail server supports Secure Sockets Layer (SSL): No

Outgoing server authentication type: Password

User name: your full email address

Password: Your email password

How can I create/delete/modify my email account? more + less -

I have lost my email account password, what can I do? more + less -

Ask the hosting account owner to reset the password for you (the user) via the direct admin control panel.

I have lost my control panel password, how do I retrieve this? more + less -

Contact us at support and we will resend the password to you. Please note this password will only be sent to the registered owner of the hosting account requesting the password.

How do I use my webmail? more + less -

Click here to view the webmail user guide

What if I need a hosting feature not included with your hosting accounts? more + less -

Any space used for Web Hosting Features such as MySQL databases, CGI scripts, PHP etc. is deducted from the total disk space you are allotted.

How do I transfer my domain to Jump's servers? more + less -

If you already have a domain name registered to transfer your domain to our servers you must update your domain's name servers. If you are unsure how to change your name servers please contact your domains registrar (the place where you registered your domain). If you are registering a new domain through us we will set it up for you. Our name servers are as follows:

Primary Server Hostname: ns1.jumphk3.net
Primary Server Net Address:
Secondary Server Hostname: ns2.jumphk3.net
Secondary Server Net Address:

How do I add new email accounts/features or hosting features to my account? How long does it take to set them up? more + less -

You can add email accounts/features and hosting features via your control panel. Features are added in real time and become active instantly.

After I place my order how long does it take to set up my account? more + less -

Once your order is received your account will normally become active within 24 hours. If you do not receive any response from Jump, please contact us at support.

Can I access my site with or without the 'www'? more + less -

Yes, you can access your site both with and without the 'www'. For example you can access your site at http://yourdomain.com or http://www.yourdomain.com

How many domains can I host under my account? more + less -

By default, you can only host one domain under each account. However, you can request more domains by contacting support.

I am currently hosted by another company and already have a domain name; can I have my site hosted by you instead? And how do I change my domain to point to your servers? more + less -

Yes, you certainly can! After you sign up with us, all you have to do is update your domain's name servers to point to our name servers. This can be done either by yourself or via the company from which you purchased your domain name. The transition typically takes from 24 to 72 hours. If you get stuck with this step, just contact us at support and we will be happy to help you.

What payment options do you offer? more + less -

You can pay by direct debit, cheque or secure online credit card transaction. You will be billed quarterly and in advance (except for email only accounts which are billed half-yearly in advance).

Can international users purchase your hosting? more + less -

Yes, we offer our hosting services to customers worldwide. We support all types of domain names.

Is there any charge to upgrade or downgrade my plan if I decide to change after I sign up? more + less -

There are no extra charges for changing your account plan - just the change in monthly billing for the upgrade starting from your next billing period.

Is technical support free? more + less -

Technical support is available free to all clients. If you are having a problem with your account we will troubleshoot it for you and if necessary correct the problem. This does not include help with development, fixing script errors or aiding in your website creation in any way; if you require this type of assistance please contact us and we will be happy to provide a quotation.

Do you provide phone support? more + less -

Due to the nature of the support issues we deal with, email provides the most effective medium to resolve virtually all enquiries we receive.

What sort of statistics can I find out about my website? For example, how many visitors is my site getting? more + less -

Depending which plan you have signed up for, you may be offered either Webalizer or Urchin online statistics to present very sophisticated and detailed data about your visitors.

What types of sites do you host? more + less -

We host any website that does not violate our Acceptable Use Policy.

Jump Email System Schematic

Jump Email System Schematic more + less -

Security Guide

Password Security Guide 6 IMPORTANT steps to enhance your password security more + less -

1. Always use a strong password
min 12 characters, upper & lower case + numbers + special characters:

As a general rule the following character sets should all be included in every password:

  • uppercase letters such as A, B, C;
  • lowercase letters such as a, b,c;
  • numerals such as 1, 2, 3;
  • special characters such as $, ?, &; and
  • alt characters such as µ, £, Æ. (Cliff)

Ideally use words combination such as JwuembPservice195.(Please don't use this one)

2. Your passwords should be changed on a regular basis (min every 6 months).

3. Users must exercise extreme caution when writing down or storing passwords.

4. Never “reply” to a third party with an email that contains passwords or account information. Please contact support if you have any questions regarding this.

5. Keep all passwords in a safe place and delete any emails containing password information (after safely saving the information).

6. Never expose your email address on a social network website.

Website Security Guide more + less -

If you intend to keep personal or customer information online, especially within e-commerce sites, then some consideration must be given to the security of your data. If a company is wanting to be seen creditable and trustworthy, then the last thing you need is to be contacting your customers with news of lost or stolen personal information. Other negative factors are; false transactions due to fraudulant activity, website downtime to repair the security issues and the possibility of being sued by customers who might have incurred a loss.

Note there is no such thing as 100% security. It does not exist, especially in the field of computing where there are a few ways hackers will find and exploit a website, but in general there are four main areas of consideration.

Business Computers and Applications more + less -

Almost all business computers use Microsoft software to operate the computer hardware. Microsoft dominate the desktop software packages apart from accounting software like Sage Line etc. Unfortunately, Microsoft systems and software packages are extremely vunerable to security flaws in the programming. Obviously its something Microsoft try to keep quiet. Microsofts pricing and agressive marketing has seen off quite a few worthy alternatives. Only Apple Macintosh, Sun Microsystems, IBM (Linux and Unix open source freeware systems) have survived, which the latter are very robust security wise. In comparison, the most robust systems require a dozen or so security fixes annually, whereas Microsoft Systems require a dozen essential daily security fixes (They call them Updates).

Firewalls, Virus Checking, Spyware and Email more + less -

Suffice to say that if you intend to use Microsoft based computers then you will need to employ these security measures to protect your systems and data. We would insist that any computers used in the running of an e-commerce site need to have the following installed and properly configured.

Firewall - There are various software based firewall programms available. We wouldn´t recommend a novice try to configure his Router hardware firewall. One excellent free version is Zone Alarm and Norton offer a very good Firewall and Virus Checking. Firewalls protect the Ports on which computers use to communicate and offers Intrusion protection. For example, Port 80 is reserved for your browser software such as Internet Explorer to send and receive data from the Internet. There are around 65,000 possible ports available to communicate through. It`s necessary to configure the firewall to accept program access on certain ports you specify. However, the pre-configured settings work very well.

Virus Checking - Virus Checking software is used to scan your computer memory and hard drives for resident computer Viruses, Worms, Trojan Horses and Diallers etc. Mostly, Viruses are used to gain access to your data, replication of infection to other computers or use your computer without your knowledge for illegal activities. Sometimes your computer may be used to attack other computers in conjuction, often called (DOS) Denial of Service attacks. The motive of destruction of the system is far less being seen. The software library is updated regularly with all the known viruses. Most virus software will also, to some extent, protect against software security flaws too.

Spyware Removal - There are a number of very good free Spyware tracing and removal software such as Spybot. Spyware is essentially a small computer program that infects a computer in order to collect data or redirecting to inappropriate website content. It also can take over important settings in the operating system on Microsoft OS run computers because MS had the very strange notion of tying in Internet Explorer, with the core of the operating system. Unbelievable, considering the security flaws in IE. Spyware removal is automated and cleans the computers registry, drives and memory. Spyware can also cause a noticeable performance decrease in operation of the computer.

Email - Email is the most popular way of spreading a virus, however, most virus checking software will check incoming email. More sophisticated methods use email to trick the receiver into giving out personal information. Popular techniques are Phishing, where an email is a fake identical of a well known company or Pharming, where an email takes you to a fake identical website. Both are very realistic though a look at the URL will show the fake domain name. NEVER give out any personal information from an email request. Period.

Here is a good example of how viruses are spread via email. The screenshot below shows an incoming spam email for a Facebook Friends request. Clicking on the Confirm Friend Link or any other link takes you to a sub page on www.gk99.tw website which tries to exploit a potential security flaw in Windows OS and infect your system with the DR/Zapchast.E Trojan virus. The types of operations are limited by user privileges on target computer, which normally includes data theft, modification or deletion of files, keystroke logging, and use of machine as part of a botnet to perform mass spamming or to distribute Denial-of-service attacks.

website security graph 1

A check of the email headers show: Received-SPF: none (mta1016.bt.mail.ird.yahoo.com: domain of postmaster[at]adp-architects.com does not designate permitted sender hosts), which basically means Facebook did not send the email, adp-architects.com did. The email server functions of that website has been compromised in some way.

One simple check for non tech person is to mouse over any link and look in the bottomof the browser... this will show the URL of the site the link is directed. One would expect the www.facebook.com url to be shown.

Web Server Configuration more + less -

Directory Traversal & Browsing - This is a method that a hacker would employ to access sensitive data held on a web server where your e-commerce site is installed. Each domain is generally given its own root directory which restricts access to other parts of the server for obvious security reasons. Filtering HTTP data requests to the server is the best prevention of directory traversal attacks. A web developer should make sure that the latest server software and security fixes have been installed. Removal of default server scripts should also be done.

File Permissions - Each file and directory within the root directory of your e-commerce domain should have the necessary file permissions access set correctly to avoid access to files that should be hidden from browser viewing.

PHP Globals & Error Reporting - There has been quite a few issues with the register_globals function within php programming. The real issue is insecure programming rather than the function itself. Most server PHP engines are now set to "off" and some php code might have to be edited to work correctly. Use server Logs for error reporting rather than returning the information to the user. This can reveal important server settings.

Server Side Scripts more + less -

Server Side Scripts are the programming language scripts which are processed on the Operating System of the Web Server. The web pages contain the code, i.e. ASP, ASP.NET, PHP, and CGI languages, so that web pages can have dynamic content retrieval, respond to user queries and save information to a database. The code is used because it makes a web page much more configurable and automated. However, the programming of these languages if not done securely, can lead to a compromise in security.

SQL Injection - SQL is a database application which is used to store information on an ecommerce site. Information such as names, addresses, credit card, product details, purchase information, in fact anything to do with the running of the online store. The database can be vunerable to SQL Injection which breaches the database security. The database can be accessed and information stolen or destroyed in this manner. Around 9% of hacking attempts is accredited to SQL Injection. Applications should have a robust filtering method to prevent important database information being revealed.

Cross Site Scripting (CSS) - Is a technique used to gather personal information or run malicious code whilst using your browser. 27% of reconised hacking attempts are due to CSS. Vunerabilities withing the site scripting languages can allow CSS to be run.

Seventy five percent of hacking is caused at the web application level. Generally, the stolen information is used for illegal actvities and your database would be left intact.