Because web hosting services host websites belonging to their customers, online security is an important concern. When a customer agrees to use a web hosting service, they are relinquishing control of the security of their site to the company that is hosting the site. The level of security that a web hosting service offers is extremely important to a prospective customer and can be a major consideration when considering which provider a customer may choose.[13]
To host a website on the internet, an individual or company would need their own computer or server.[7] As not all companies had the budget or expertise to do this, web hosting services began to offer to host users' websites on their own servers, without the client needing to own the necessary infrastructure required to operate the website. The owners of the websites, also called webmasters, would be able to create a website that would be hosted on the web hosting service's server and published to the web by the web hosting service.

Similar to the dedicated web hosting service, but the user owns the colo server; the hosting company provides physical space that the server takes up and takes care of the server. This is the most powerful and expensive type of web hosting service. In most cases, the colocation provider may provide little to no support directly for their client's machine, providing only the electrical, Internet access, and storage facilities for the server. In most cases for colo, the client would have his own administrator visit the data center on site to do any hardware upgrades or changes. Formerly, many colocation providers would accept any system configuration for hosting, even ones housed in desktop-style minitower cases, but most hosts now require rack mount enclosures and standard system configurations.
The Internet Corporation for Assigned Names and Numbers (ICANN) is the organization that governs the rules and regulations for domain name registrations. ICANN requires, for various reasons including to determine ownership of a domain should a dispute transpire, that a publicly accessible database be maintained that contains the contact information of all domain registrants. In layman's terms this means your domain name will be searchable by anyone and those search results will include your full name, physical address and other contact information. In order to protect your privacy in this regard, Domain.com offers WHOIS Domain Privacy which then masks your information using our own and implements a procedure for you to control who is able to then gain access to your contact information via a WHOIS search. Whenever you buy a domain name, no matter what domain name registration service you use, you are subject to the same ICANN rules, for this reason it is important to use a reputable service who cares about your privacy. Domain.com always recommends enabling WHOIS Domain Privacy.
The availability of a website is measured by the percentage of a year in which the website is publicly accessible and reachable via the Internet. This is different from measuring the uptime of a system. Uptime refers to the system itself being online. Uptime does not take into account being able to reach it as in the event of a network outage.[citation needed] A hosting provider's Service Level Agreement (SLA) may include a certain amount of scheduled downtime per year in order to perform maintenance on the systems. This scheduled downtime is often excluded from the SLA timeframe, and needs to be subtracted from the Total Time when availability is calculated. Depending on the wording of an SLA, if the availability of a system drops below that in the signed SLA, a hosting provider often will provide a partial refund for time lost. How downtime is determined changes from provider to provider, therefore reading the SLA is imperative.[11] Not all providers release uptime statistics.[12] Most hosting providers will guarantee at least 99.9% uptime which will allow for 43m of downtime per month, or 8h 45m of downtime per year.

Middle English ost, host "person who receives guests, guest," borrowed from Anglo-French oste, hoste, going back to Latin hospit-, hospes "guest, visitor, person receiving guests," going back to dialectal Indo-European *ghosti-pot- (whence probably also Old Church Slavic gospodĭ "lord, master"), from *ghost-i- "outsider, guest" + *pot- "one in control, master" — more at guest entry 1, potent entry 1
The user gets his or her own Web server but is not allowed full control over it (user is denied root access for Linux/administrator access for Windows); however, they are allowed to manage their data via FTP or other remote management tools. The user is disallowed full control so that the provider can guarantee quality of service by not allowing the user to modify the server or potentially create configuration problems. The user typically does not own the server. The server is leased to the client.

Every website on the internet has a unique IP address assigned to it, made up of a series of numbers. These numbers tell the domain name system (DNS) to locate the corresponding website. As we are humans and not computers, IP addresses are difficult to remember and so words are used instead. These words are known as the domain or URL. The DNS looks at the domain name and translates it into an IP address.
The host may also provide an interface or control panel for managing the Web server and installing scripts, as well as other modules and service applications like e-mail. A web server that does not use a control panel for managing the hosting account, is often referred to as a "headless" server. Some hosts specialize in certain software or services (e.g. e-commerce, blogs, etc.).
A customer needs to evaluate the requirements of the application to choose what kind of hosting to use. Such considerations include database server software, scripting software, and operating system. Most hosting providers provide Linux-based web hosting which offers a wide range of different software. A typical configuration for a Linux server is the LAMP platform: Linux, Apache, MySQL, and PHP/Perl/Python. The web hosting client may want to have other services, such as email for their business domain, databases or multimedia services. A customer may also choose Windows as the hosting platform. The customer still can choose from Perl, PHP, Python, and Ruby, but the customer may also use ASP.NET or ASP Classic. Web hosting packages often include a web content management system, so the end-user does not have to worry about the more technical aspects.
Similar to the dedicated web hosting service, but the user owns the colo server; the hosting company provides physical space that the server takes up and takes care of the server. This is the most powerful and expensive type of web hosting service. In most cases, the colocation provider may provide little to no support directly for their client's machine, providing only the electrical, Internet access, and storage facilities for the server. In most cases for colo, the client would have his own administrator visit the data center on site to do any hardware upgrades or changes. Formerly, many colocation providers would accept any system configuration for hosting, even ones housed in desktop-style minitower cases, but most hosts now require rack mount enclosures and standard system configurations.
Also known as a Virtual Private Server (VPS), divides server resources into virtual servers, where resources can be allocated in a way that does not directly reflect the underlying hardware. VPS will often be allocated resources based on a one server to many VPSs relationship, however virtualisation may be done for a number of reasons, including the ability to move a VPS container between servers. The users may have root access to their own virtual space. Customers are sometimes responsible for patching and maintaining the server (unmanaged server) or the VPS provider may provide server admin tasks for the customer (managed server).
Until 1991, the Internet was restricted to use only "...for research and education in the sciences and engineering..."[1][2] and was used for email, telnet, FTP and USENET traffic—but only a tiny number of web pages. The World Wide Web protocols had only just been written[3][4] and not until the end of 1993 would there be a graphical web browser for Mac or Windows computers.[5] Even after there was some opening up of internet access, the situation was confused until 1995.[6]
The Internet Corporation for Assigned Names and Numbers (ICANN) is the organization that governs the rules and regulations for domain name registrations. ICANN requires, for various reasons including to determine ownership of a domain should a dispute transpire, that a publicly accessible database be maintained that contains the contact information of all domain registrants. In layman's terms this means your domain name will be searchable by anyone and those search results will include your full name, physical address and other contact information. In order to protect your privacy in this regard, Domain.com offers WHOIS Domain Privacy which then masks your information using our own and implements a procedure for you to control who is able to then gain access to your contact information via a WHOIS search. Whenever you buy a domain name, no matter what domain name registration service you use, you are subject to the same ICANN rules, for this reason it is important to use a reputable service who cares about your privacy. Domain.com always recommends enabling WHOIS Domain Privacy.
Similar to the dedicated web hosting service, but the user owns the colo server; the hosting company provides physical space that the server takes up and takes care of the server. This is the most powerful and expensive type of web hosting service. In most cases, the colocation provider may provide little to no support directly for their client's machine, providing only the electrical, Internet access, and storage facilities for the server. In most cases for colo, the client would have his own administrator visit the data center on site to do any hardware upgrades or changes. Formerly, many colocation providers would accept any system configuration for hosting, even ones housed in desktop-style minitower cases, but most hosts now require rack mount enclosures and standard system configurations.
A complex site calls for a more comprehensive package that provides database support and application development platforms (e.g. ASP.NET, ColdFusion, Java EE, Perl/Plack, PHP or Ruby on Rails). These facilities allow customers to write or install scripts for applications like forums and content management. Also, Secure Sockets Layer (SSL) is typically used for websites that wish to keep the data transmitted more secure.
×