|*NOTE* WordPress is only supported on Silver or higher hosting packages!
First you should visit wordpress.org and download the latest wordpress installation files. Once the files are downloaded and extracted open your FTP client and connect to the server. Copy all of the wordpress files into the public_html folder.
While the files are copying you can log into the cpanel and get your database setup. Go to yourdomainname.com/cpanel using the same username and password you used for ftp access. Find the databases section and select “MySQL Databases”. (This will only show up if you have Silver or higher hosting)
The database name is prefixed with your username and an underscore. Type in a database name and click “Create Database”. Write down the database name, including the automaticly added prefix, as you will need this later.
Once the database is created click “Go Back” and scroll down to the MySQL Users section. The database username will be prefixed with your cpanel username and an underscore. Type in the database username and create a password or use the Password Generator. Write down this username, including the prefix, and the password.
Once the database username is created click “Go Back” and scroll down to the “Add User To Database” section. Make sure the correct database and username are selected and then click “Add”.
Check the “All Privileges” checkbox at the top and then click “Make Changes”.
You can now close the cpanel window. Make sure all wordpress files have transfered to the server. Once the files are done copying go to your website. yourdomain.com. You should see the following message. Click “Create a Configuration File” then click “Let’s Go!” on the next prompt.
Enter the Database Name, Database Username, and Password we created earlier. Database Host and Table Prefix should be left as is. Click “Submit” and then click “Run the install”
Now you just need to put your Site Title in, and create your WordPress username and password. Please do NOT user admin for your username, as it will be MUCH more likely to get hacked. Also try to make a secure password. We recommend at least 8 characters, an upcase letter, a number, and a symbol. Once you are done click “Install WordPress” and you are done.
You may have opened a new browser window without realizing it. Sometimes when you click on a link on a Web page, the page instructs your browser to display the new page in a completely new browser window. Generally the new browser window is smaller than the previous window so that you know what is happening, but sometimes this new browser window covers the previous window. Try minimizing or closing the browser window you’re viewing to see whether the other window appears. Also, if you see one more browser icon than you know should be there at the bottom of your browser, you’re probably on a new browser.
When your browser loads a Web page, it copies the page’s graphics and text from the Web server and saves them in a special folder on your hard drive. This process is called “caching,” and the folder is called your “cache.” The next time you visit a page that has been cached, your browser checks your cache to see if the files on that page are stored on your hard drive. If so, the browser loads the files from your cache.
Caching has two main benefits. First, since copies of recently visited pages are stored on your hard drive, you can read them after you have disconnected from the Internet. This is useful if you have to limit your time online. Also, pages stored locally load much faster than pages stored on Web servers, so caching improves your browser’s performance and speed when you go back to cached sites.
After you use your browser for a while, your cache (the folder) will begin to fill up with cached pages. When that folder is full, your browser will automatically begin deleting the oldest files. Your browser can manage the cache folder by itself, but a very full folder can cause problems, especially slowing down your computer’s loading speed. To avoid problems, it’s a good idea to manually empty your cache folder occasionally.
You can also limit the size of your cache folder to ensure that it never grows too large. A good cache size is 0-5MB, depending on your system and browsing habits. If you regularly visit Web sites that rarely change, you might want to increase your cache limit. But if you regularly visit a large number of sites or visit sites that are often updated, you should reduce your cache limit. Remember, even with a small cache limit, your cache may still need occasional clearing.
To clear your cache or set your cache size limit, follow the instructions for your browser. For Internet Explorer for Windows (your cache folder is called “Temporary Internet files”):
• To clear your cache, go to the “Tools” menu at the top and choose “Internet Options.” It should default to the “General” tab. If not, select it. Click the “Delete Files” button. When it is finished, press “OK” to save your changes.
• To change the size of your cache, go to the “Tools” menu at the top and choose “Internet Options.” It should default to the “General” tab. If not, select it. Click the “Settings” button. Move the slider at the bottom left or right until you get to the size that you want. Press “OK” to save your changes, then press “OK” again to exit.
If you get an email returned (bounced back) that you didn’t send, don’t worry about it, but do run a couple of checks on your computer security.
(If you get an email complaining you sent someone a virus, you can follow these same steps.)
Usually there is an infected computer somewhere that contains both your email address and the destination email address. (For example, the infected computer might belong to a mutual friend, or to a company you both deal with.)
The malware (virus or trojan) on the infected computer scanned that computer for email addresses. It picked one email address to be the fake sender, and sent copies of itself to the other email addresses.
The malware didn’t use the real email address of the computer’s owner because any undeliverable email that bounced back would tip the infected computer’s owner that he had a problem.
The other common possibility is that a spammer sent spam and, accidentally or intentionally, used your email address in the “sent from” field. Normally this is a one-time occurrence, although you might see bounces for a couple of days.
Either way, it is unlikely your computer sent the email.
Make sure the anti-virus software on your computer is up-to-date and run a full scan of your computer.
Yes. Position your mouse cursor on the Web page, click and hold down your left mouse button, and drag the mouse to highlight the text you want to copy (to select all the text on a page quickly, go to the “Edit” menu and choose “Select All”). Then go to the “Edit” menu and select “Copy.” Switch to your word processor, go to the “Edit” menu, and choose “Paste.”