Technical Tips and Knowledge Base

Hardware
  DVD Drives
    DVD Drive Installation
  Hard Drives
    Bad Sectors
    Diagnostic Tools
  Hardware Devices
    Hardware Device Configuration
    Hardware Interfaces
  PCs
    Laptops
  Typical Problems
    Computer Overheating
Software
  Email
    Transmission Problems
  Malware
    Freeware Antivirus Programs
    Virus: Admin Password Changer
Networking
  Internet
    Terminology
  Routers
    Configuration
Data Revovery
  Overview
Web Design
  Website Hosting
    Domain Forwarding
    Domain Names
    Hosting Multiple Websites

Hardware

Category DVD Drives
SubcategoryDVD Drive Installation
Problem/
Description
How to install a new internal DVD drive on a desktop PC running Windows Vista or Windows XP.
Symptoms/
Error Msgs
None
Resolution Typically, the only tool required for this job is a Phillips head screwdriver. Start by removing the cover on your computer case. Different manufacturers use different approaches for attaching the covers, so it may be necessary to look up this information online for your particular brand. Also, you must unplug the power cord from the computer before removing the cover. It would not be a bad idea to unplug all the other connectors as well (make note of their locations so you can reconnect them properly after completion). Most contemporary computers are shipped with either a CD or DVD drive, so you will most likely be replacing the old drive with a new one. If this is the case, then simply remove the old drive (may require a couple of screw removals) and insert the new drive into this bay. Otherwise, locate an empty drive bay and insert the new drive into it, reattaching screws where necessary. If there are no drive bays available, the best alternative is to use an external DVD drive. Whether you are replacing or adding a new drive, you should insure that your power supply can handle the additional load. Look at your computer's documentation to determine the rating (in Watts) of your power supply. Also look at the power dissipated (again in Watts) by each device (motherboard, hard drive, DVD drive, etc.) attached to the computer. The sum in Watts of all the devices should be less than or equal to the rating on the power supply. Once the drive is in, attach available power and bus connectors to the back of the drive. These connectors are keyed (idiot proofed), so it is not possible to insert them incorrectly. If there are no power and/or bus connectors available, it is possible that your computer can not handle additional devices. However, it may again be possible to get around this limitation with an external drive. Close up the case, reconnect all cables, and restart the computer. Windows Vista and XP should automatically recongnize the new drive, load the correct driver for it (all CD and DVD drives use the same driver, cdrom.sys), and configure it into the system. The new drive should be ready to go at this point.
Category Hard Drives
Subcategory Bad Sectors
Problem/
Description
A bad disk sector is one which cannot be written and/or read. Hard disk manufacturing is a delicate procedure so even the best quality disks will have bad sectors resulting from the process. Whenever a hard drive is formatted, bad sectors are marked as unusable and replaced with spare sectors without issue. However, when a hard drive begins to fail, mechanical faults create additional bad sectors in real time. The operating system has no way of dealing with these new bad sectors. The system becomes unstable and eventually unusable once bad sectors begin to affect critical files.
Symptoms/
Error Msgs
1.Intermittent blue screen system crashes.
2.Intermittent system freezes.
3.Operating system does not load.
4.Flaky operation.
Resolution The CHKDSK Windows utility can be used to replace bad disk sectors. For XP and Vista systems, boot the machine from the installation DVD and go into the system repair section. Run CHKDSK with the /r (recovery) option. Keep in mind that the number of bad sectors on a healthy disk does not grow. Return of symptoms after a CHKDSK repair should be considered a bad sign. It is a good idea to back up data on a regular basis, but a failing disk should be immediately backed up and replaced.
Category Hard Drives
Subcategory Diagnostic Tools
Problem/
Description
If you suspect that your hard drive may be malfunctioning, a hard drive diagnostic tool will verify its operation. Before the release of XP, Windows systems included a diagnostic tool called ScanDisk used for checking and repairing file systems. Beginning with Windows XP, this functionality has now been moved into Windows Explorer. In order to access it, open Windows Explorer and select "My Computer|right-click the drive|Properties|Tools|Check Now...|Select Options|Start". Alternatively, you can boot the computer using the XP (or Vista) installation DVD and run Chkdsk from the Recovery Console. In any event, it is better to test a hard drive with the utilities provided by the manufacturer itself. Below are links to download hard drive diagnostic tools for some of the more popular hard drive manufacturers.
Symptoms/
Error Msgs
None
Resolution
Manufacturer Title Download Site
Hitachi Drive Fitness Test http://www.hitachigst.com
Samsung Hutil http://www.samsung.com
Seagate (Maxtor) SeaTools http://www.seagate.com
Western Digital Data Lifeguard Diagnostic http://support.wdc.com
Category Hardware Devices
Subcategory Hardware Device Configuration
Problem/
Description
Installed device (eg DVD/CD drive) that was formerly recognized by OS is no longer recognized.
Symptoms/
Error Msgs
Windows cannot start this hardware device because its configuration information (in the registry) is incomplete or damaged. (Code 19)
Resolution 1.Delete the device from Device Manager and reboot, Windows will find the device and reload drivers for it.
Category Hardware Devices
Subcategory Hardware Interfaces
Problem/
Description
What are the differences between the most common hard drive/CD/DVD interfaces currently available?
Symptoms/
Error Msgs
None
Resolution
IDE The Integrated Drive Electronics (IDE) interface was developed as a joint effort between Western Digital, Control Data Corporation, and Compaq Computer in 1986. Because it was originally designed to connect hardware devices to the 16-bit ISA bus used by IBM on their PC/AT line of personal computers, it is also known as the AT Attachment or ATA interface. Since the development of the serial ATA (SATA) interface, ATA has been subsequently renamed Parallel ATA or PATA. So then, IDE, ATA, and PATA all refer to the same standard. The primary benefit of the IDE interface is its low cost. As a result, it has been widely adopted for use in the personal computer market and to date is by far the most pervasive standard used in PC systems. Its limitations are twofold. First, because of its limited bus arbitration capabilities, it can only support 2 devices per channel (one as a master and the other as a slave). Since most PC systems include just 2 channels, that means that most IDE-based PCs can support at most 4 drives. Second, IDE's data throughput is low compared to other interface standards (ie, it is slow).
SCSI The Small Computer System Interface or SCSI (pronounced scuzzy) was standardized in 1986 based on the SASI interface introduced by the Shugart Associates company in 1981. SCSI features a couple of advantages over IDE. First, it is faster. As a result, SCSI has been, until recently, the standard used by servers and high-performance machines. Second, SCSI can accomodate up to 15 devices on a single bus (as opposed to IDE's 2-device maximum). However, SCSI controllers and devices tend to be more expensive that alternative approaches so they have not enjoyed an extensive market penetration. Performance improvements included in IDE's latest version (Serial ATA or SATA) have further eroded SCSI's market share.
SATA Serial ATA (SATA) is the latest generation of the IDE interface. It offers cheaper development costs and faster operating speeds over its predecessor. As of this writing, SATA has essentially replaced legacy IDE/ATA in new comsumer PC shipments.
Category PCs
Subcategory Laptops
Problem/
Description
Laptop computer ratings and reviews for some popular brands as of 04/10/09. These are ranked based on quality as determined by customer reviews on Amazon.com. As is usually the case, you get what you pay for, so ranking them by quality incidentally also ranks them by price.
Symptoms/
Error Msgs
None
Resolution
Manufacturer Quality Price Comments
Asus ***** $$$$$ A popular, top-end laptop manufacturer. They offer models that range from 9" up to 16".
Sony **** $$$$ Can't go wrong with Sony.
Acer **** $$$ Amazon customers seem to like them almost as much as Sonys. They are typically not as costly as Sonys, so these may represent the best bang for the buck as of this writing.
Toshiba *** $$ Solid, good-quality laptops.
HP *** $$ Another good, mid-tier manufacturer. At a par with Toshiba.
Compaq ** $$ An OK brand. Their quality seems to be a step below Toshiba and HP, but they are not much cheaper. At this point, you might as well pony up to Toshiba or HP.
Gateway * $ Gateway to headaches.
Dell * $ Horror stories about all flavors of Dell computers - and especially Dell support - abound. Do not buy a Dell - period.
Category Typical Problems
Subcategory Computer Overheating
Problem/
Description
Desktop or laptop computer is overheating.
Symptoms/
Error Msgs
The computer powers up and operates normally initially. However, after a short period, the computer either freezes or shuts down. Any attempt to re-power the computer at this point causes it to shut down immediately. The computer will then not power up at all until enough time has elapsed for it to cool down.
Resolution Insure that all fans in the computer, particularly the power supply and CPU fans, are connected properly and operational. On a desktop computer, power it on with the case removed to visually verify operation. Faulty fans will need to be replaced. Next, inspect the CPU chip's heat sink. CPUs process a significant amount of current given their small size. This generates heat that must be conducted away from the CPU in order for it to continue operation. The CPU heat sink and fan combination play the same role in your computer that the radiator and fan play in your car. That is, to move heat away from your CPU/engine to prevent overheating. In your computer, the heat sink must be tightly coupled to the CPU in order for it to transfer heat away from it effectively. Make sure that the heat sink is properly attached. Additionally, dust can collect on the heat sink's blades making heat transfer less efficient and possibly leading to overheating. You can mitigate this problem by occasionally blowing out the computer's fans, heat sink, and motherboard in general with a can of compressed gas available at any computer or electronic store.

Software

Category Email
Subcategory Transmission Problems
Problem/
Description
Email client is unable to transmit (send out) emails.
Symptoms/
Error Msgs
Email client (Outlook, Opera, Eudora, etc.) is unable to send out emails. Composed emails remain in the outbox and the client repeatedly attempts to transmit, but the messages are never transmitted. The client itself is fully operational and incoming email messages may be downloaded normally, but outgoing messages are stuck in the outbox.
Resolution Ostensibly pursuant to reducing SPAM, many Internet Service Providers (ISP) stringently monitor and limit outgoing email messages. Traditionally, the POP3 (incoming) email protocol communicates with the email server on port 110 and the SMTP (outgoing) protocol communicates over port 25. The ISP will control outgoing email by allowing users to transmit port 25 messages only if they use the ISP's own email server. If the user attempts to transmit messages using a 3rd party email server over port 25, the connection is blocked. This can be problematic in particular to travelers who attempt to send emails by using their home ISP's email server but connecting to the Internet over another ISP. In some cases, the ISP will even block port 25 access to their own server for local customers. There are a number of resolutions to this problem:
1.Use a web-based email system. These can be slow and adds the additional overhead of managing multiple accounts.
2.If you are on the road and the local ISP is blocking access to your home email server, you can always open an account with the local provider which will normally include an email account with port 25 access. This, of course, will be relatively costly.
3.Port 25 blocks can be bypassed by using alternate outgoing email port 587. As of this writing, most ISPs do not block outgoing messages over port 587 (that may change in the future). Contact your 3rd party email provider to inquire whether they provide service over port 587. If so, then a simple modification to your account settings in your email client will solve the problem. If not, then it may be possible to use a different email provider to set up a 3rd party POP3/SMTP account using port 587. One such company is EPIDirect which, as of this writing, offers this service for $9.95 per year.
4.YPOPs is an intermediary program which interfaces your POP3/SMTP client to your Yahoo web-based email account. We've never tried this approach, but YPOPs gets pretty good reviews. Plus, it's free. Maybe worth a try before going the pay-per approaches.
Once a new outgoing account is created, any messages stuck in the out box may need to be resent using the new email account.
Category Malware
Subcategory Freeware Antivirus Programs
Problem/
Description
Freeware antivirus ratings for some popular brands as of 04/13/09. These are ranked based on reviews done by AV-Comparatives.
Symptoms/
Error Msgs
None
Resolution
Rank Title Company Site Download Site Supported OS
1 Avast Antivirus Home Edition www.avast.com download.cnet.com Vista,XP,2000,NT,98,95
2 Avira Antivirus Personal www.avira.com download.cnet.com Vista,XP,2000
3 AVG Antivirus www.avg.com download.cnet.com Vista,XP,2000
Category Malware
Subcategory Virus: Admin Password Changer
Problem/
Description
The Windows administrator password is changed and you are unable to log in to Windows.
Symptoms/
Error Msgs
When you attempt to log in to a Windows machine with the Administrator account, the system prevents log in and warns that the password supplied is incorrect.
Resolution This is a trojan that accesses the registry's SAM (security access manager) file which is where Windows stores user account information - including passwords. The file is literally named 'SAM' and is typically found in the system's windows/system32/config directory.
1.The first step is to remove the virus from your system. Of course, this usually simple procedure is compounded by the fact that you are unable to log in to the system. If the affected OS is on a dual boot machine, then simply start up the other operating system and clean the affected hard drive from there. Otherwise, you may need to slave the drive into another computer system (eg, using an external hard drive to USB adapter) in order to perform the cleaning (if you don't have a reputable antivirus program on hand, we recommend Avast). If all else fails, you may be able to reboot the system into Safe Mode and then run the antivirus program after the password has been reset.
2.Once the virus has been removed, it's time to reset the password. The following link is a Windows password and registry editor. It loads from a boot disk and therefore bypasses OS security to change the Administrator password directly in the SAM file. The program is DOS based, but easy to use with descriptive instructions provided along the way. Simply follow the directions to change or blank the Administrator password on the target hard drive. If the program does not work at first, it may be because the SAM file is inaccessible due to a hard reset. Simply start the system into Safe Mode and do a clean reboot twice in a row to insure that a proper shutdown is registered and then rerun the program.
3.If push comes to shove and if you have a recent backup of your system (which, of course, you should) you may be able to simply overwrite the trojan-modified SAM file with the backup to restore the original password. We have not tried this approach, however, and can not comment on its effectiveness or any potential side effects.

Networking

Category Internet
Subcategory Terminology
Problem/
Description
What is DHCP?
Symptoms/
Error Msgs
None
Resolution Dynamic Host Configuration Protocol (DHCP) is a protocol whereby network interface devices can obtain configuration information automatically from another device on the network. DHCP is used on Internet Protocol (IP) networks and adheres to a client/server model. DHCP was designed to facilitate for a network administrator the task of adding and removing devices from the network. The operation of DHCP is relatively straightforward. Initially, a DHCP server (such as a router) must be set up and configured on the local network. The local DHCP server can be configured manually or it may in turn be set up to obtain its configuration information from an existing DHCP server on an external network (eg, an ISP's DHCP server). Once the local DHCP server is configured, new DHCP client devices can be added to the local network. As long as these network devices have their DHCP client software enabled, they will contact the DHCP server at startup and retrieve their network settings including the client's local IP address, default gateway (usually the router itself), subnet mask, Domain Name Servers (DNS), and so on.
Category Internet
Subcategory Terminology
Problem/
Description
What is a MAC Address?
Symptoms/
Error Msgs
None
Resolution A MAC (Media Access Control) address is a 12-hexadecimal digit number that uniquely identifies devices on a network. For example, every computer connected to the Internet uses a Network Interface Card (NIC) to connect the computer to the Internet. The NIC in turn has a unique MAC address which then identifies it (and therefore the computer, although it is possible for one computer to use multiple network cards) on the Internet. Typically, a MAC address is expressed as 6 pairs of hexadecimal digits separated by dashes or colons. For example, 01:23:45:67:8A:BC. The total number of possible MAC addresses is equal to 16 raised to the 12th power, or approximately 282 trillion addresses.
Category Routers
Subcategory Configuration
Problem/
Description
What is a MAC Address Clone?
Symptoms/
Error Msgs
None
Resolution Some ISPs only allow their subscribers to access the Internet using one single MAC address (and therefore one single computer). The motivation behind this can be either to reduce traffic through their networks or to force their customers to pay for addtitional portals for each computer that accesses the Internet through their system (or both). In any case, this limits connectivity possibilities for those who wish to access the Internet from home or business local networks. In order to bypass this limitation, many router manufacturers have added MAC address cloning capabilities to their routers. When MAC Address Cloning is enabled on a router, the router will change the MAC address for network packets sent from any device on the local network to match the address expected by the ISP. This way, multiple local network computers can access the Internet by sharing the same 'cloned' MAC address and therefore bypass the ISP limitations.

Data Recovery

Category Overview
Subcategory None
Problem/
Description
What is Data Recovery?
Symptoms/
Error Msgs
None
Resolution Computers are replaceable. In many cases, data is not. First and foremost, the best thing that can be done to prevent data loss is to back it up on a regular basis. An ounce of prevention is worth a ton of time, money, and aggravation after the fact. There are many viable alternatives when it comes to data backup. Choose one appropriate for you, invest in the hardware/software infrastructure, generate a backup schedule, and stick to it. Once the loss occurs, we migrate from the realm of prevention to that of recovery. In general, there are four ways in which data is lost. Each way entails its own recovery methodology:
Data Recovery Type I
Loss Type Unsaved Data
Causes This can happen when a data-generating application (such as a word processor) is exited prematurely without saving new data when either the user closes the application, due to a power outage, system or application crash, etc.
Recovery Techniques There are several possibilities for recovering unsaved data. Primarily, many word processors and other such data-generating applications will periodically and automatically save new data to a temporary file while in progress. This is intentionally done to help users recover unsaved data. In case of an inadvertent loss of unsaved data, the data can usually be recovered from the temporary file (it may be necessary to undelete the temporary file before retrieving data if the temp file itself has been erased). In cases where a temporary file is either absent or inaccessible, there are typically tools available to dump the contents of an application's memory to a file. The unsaved data can then possibly be retrived from the memory dump file. One such tool for Windows systems is Microsoft's ADPlus application. There may be other tools available that can dump the entire contents of memory to a file. In some cases, this memory dump file will contain the lost unsaved data. For example, in the event of a system crash, Windows operating systems will dump the entire contents of memory to a file located in the main OS directory (typically C:\Windows) called memory.dmp. Since memory management is the purview of the operating system, any such memory dump tool will most likely be one supplied by the OS manufacturer (ie, Microsoft for Windows systems).
Data Recovery Type II
Loss Type Deleted Files
Causes This happens when a user deletes a file from the file system. There are a number of ways to accomplish this. Usually, the file is selected in Windows Explorer and the Delete key is pressed or the file is right-clicked and the Delete option is selected from the drop down menu. Another, more problematic, approach is to delete the file using the Del or Erase commands from a DOS prompt.
Recovery Techniques First, a little background. Storage space on a hard disk (or hard drive - HD) is divided into sectors. The number of sectors on a HD depends on the capacity of the HD and the size in bytes in each sector. Files are stored on a HD using one or more of these sectors. The bigger the file, the more disk sectors are required to store it. Directories themselves are files in the HD whose data is information about files and subdirectories included within it. For each file/subdirectory within a parent directory, there is an entry which lists information about the file/subdirectory including its name, size, attributes, etc. In addition, the entry contains the location of the first sector used to store the file's or subdirectory's data. The actual file data itself is not "inside" the directory file. The directory entry simply includes a link (or pointer) to the file (or subdirectory). That is the reason why a file Move within a single HD is very fast relative to a Copy. The Copy requires copying the entire file and writing it elsewhere on the HD. The Move only requires that the file's info & link be moved from one directory (which again, is a file) to another directory. With this in mind, there are two levels of severity when it comes to deleted files. In the simplest case, a file or directory is deleted using Windows Explorer. If the OS is conservatively configured, the file is not actually deleted at all. Instead, its info & pointer are moved from the original parent directory to the Recycle Bin directory. In order to undelete such a file (or directory), simply navigate to the Recycle Bin using Windows Explorer, right-click the file (or directory), and select the Restore option from the drop down menu. In the more severe case, the file/directory is either deleted using the DOS Delete or Erase commands (which do not move the pointer info to the Recycle Bin) or the file/directory is actually deleted from the Recycle Bin itself. In such a case, the file's or directory's info & pointer are no longer stored anywhere in the file system. However, this does not mean that the file itself has been deleted. Quite the opposite, the file (or directory) is still occupying its HD sectors same as always. The sectors are marked as available by the file system, but they are not actually overwritten with new data until new information is written to the HD. As long as no other operations (Move, Copy, Delete, etc.) are performed on that particular HD after the file/directory deletion, the data is still intact and can be recovered using data recovery utility programs.
Data Recovery Type III
Loss Type Operating System (OS) Failure
Causes The operating system's functionality is organized as a series of files stored on the computer's file system. To say that an OS is hosed is to say that one or more of these files have been deleted or corrupted. How does this happen? There are many ways to hose an operating system's files. One common approach is to power down the computer before the OS determines that it is safe to do so. If the OS is in the middle of updating crucial files, the files may become corrupted. Another easy way to do so is to unintentionally (or not) delete system files. OS files can also become corrupted due to HD failures.
Recovery Techniques The problem here is that the OS is necessary in order to access the file system. If the OS won't boot up, then it is not possible to load file system navigation applications (such as Windows Explorer) to traverse the file system or manipulate data. Aside from the problem of repairing a corrupted OS, the problem of recovering data from a HD stored in a computer without an operational OS is actually relatively straightforward. The task becomes to either get a viable OS on said computer or to move the target HD to a computer with a working OS. If the original computer has additional HDs with bootable operating systems on them, then the computer can simply be booted using one of these alternatives. The computer could also potentially be booted from the installation DVD. In any case, the goal is to get an OS up and running on the original computer. Once an alternative OS has been loaded, the file system and data from the target HD can be accessed normally. Similarly, the HD can be installed in a second computer (with an operable OS) and then the data can be accessed normally from there. Keep in mind that once the OS failure has been bypassed, it may be necessary to apply techniques detailed in the Data Recovery Type sections I and II above.
Data Recovery Type IV
Loss Type Hard Drive (HD) Failure
Causes HDs are devices that rely on a high degree of precision. Modern manufacturing techniques make them exceedingly robust and reliable. However, they do occasionally go bad from time to time. Luckily, most HD failures fall into the category of media corruption. This is the case where the storage surface of the actual HD platters starts to become inviable making certain sectors unreadable and/or unwriteable. This type of failure comes with a silver lining in that it usually provides ample warning before becoming intractable. A more serious problem is a HD with mechanical problems, typically associated with the very sensitive read/write heads.
Recovery Techniques A HD suffering from deteriorating media becomes increasingly erratic as sectors become unusable. Depending on which files are affected by the sector losses, applications and possibly the OS itself will begin to experience intermittent and unexplained crashes. If your computer begins to manifest these symptoms, check the integrity of the HD using either Microsoft's CHKDSK utility or the appropriate utility for your HD (based on manufacturer) as specified in the Hard Drive Diagnostic Tools section in our Tech Tips. A HD with faulty media must have all of its data immediately copied elsewhere and the HD itself promptly replaced. Techniques discussed in Data Recovery Type I, II, and III sections above may need to be employed. The manifest symptom of a HD experiencing mechanical failure is a clicking sound coming from the HD. Again, HD mechanical faults typically deal with the read/write heads. If the HD is unable to position the heads correctly, no data can be read from or written to the disk. Needless to say, the OS will not load if it can't be read from disk. In fact, the computer will probably not even recognize the existence of the HD and the boot sequence will certainly not get far. Data recovery from a mechanically faulty HD is a painstaking (read expensive) prospect. It almost always requires the services of outfits dedicated exclusively to dealing with mechanical HD failures. We're talking space-suited technicians working in ozone-filled clean rooms here, folks. This will very often be significantly beyond the means of home users and even some fair- sized business will want to weigh the costs of replacing the data versus attempting to recover it. For the budget-conscious user, however, there may be a last ditch approach which apparently has yielded some success for adventurous types. We can not endorse this technique as we have never tried it ourselves and we highly recommend to anyone seriously considering this course of action to thoroughly investigate the topic online in order to form your own educated opinion before proceeding. However, if the HD is trashed anyway, you may have nothing to lose. In any event, the idea is to freeze the HD with the hope that certain circuits will contract, form better contacts, whatever. First, remove the HD from the computer and place it inside a plastic freezer bag removing as much air as possible from the bag in order to reduce condensation. Then, place the HD in the freezer and leave for 24 hours. Once you are ready to begin the data extraction portion of the maneuver, it is important to work quickly because time is of the essence. Take the HD out of the freezer and recover data using techniques discussed in Data Recovery Type I, II, and III sections above. If you are lucky, the HD will operate normally for between a few minutes up to half an hour. Again, work quickly and keep heat to a minimum during the operation.

Web Design

Category Website Hosting
Subcategory Domain Forwarding
Problem/
Description
How to forward a domain name to point to another domain.
Symptoms/
Error Msgs
None
Resolution There are two ways for a website to redirect a browser to another website.
1.Using HTML redirection. For example, to redirect domain www.JTownComputer.com to www.J-TownComputer.com, we could simply create an HTML page called Redirect.htm with the following code in the Body tag:
<BODY onLoad="this.location.href='http://www.J-TownComputer.com'"></BODY>
In IIS, we right-click the JTownComputer website and invoke Properties|Documents and set the newly created Redirect.htm as the topmost default content page.
2.Using domain forwarding. In this case, the redirection is handled by the nameserver. For example, if www.JTownComputer.com was forwarded to www.J-TownComputer.com, then the nameserver would return www.J-TownComputer.com to any browser requesting www.JTownComputer.com.
In both of these cases, the URL of the domain redirected to (www.J-TownComputer.com in the examples above) - not the original domain name requested - is displayed on the browser's address bar. Refer to the following article for instructions on forwarding a domain in GoDaddy.
Category Website Hosting
Subcategory Domain Names
Problem/
Description
How to search for availability of multiple domain names at one time.
Symptoms/
Error Msgs
None
Resolution This GoDaddy webpage will allow you to look up availability for up to 500 domain names at one time.
Category Website Hosting
Subcategory Hosting Multiple Websites
Problem/
Description
How to host multiple websites on one IIS server. This issue deals with host headers.
Symptoms/
Error Msgs
None
Resolution This article provides a detailed description of setting up Internet Information Service (IIS) to host multiple websites on a single server. The IIS setup is relatively straightforward. More problematic is configuring your name servers to include the host header information in the HTTP packets. This depends on your configuration and domain registration service. If you are using GoDaddy, the process is easy. Simply leave the Host field in the domain's A record set to '@' (which is the default) and GoDaddy automatically includes the domain name as the HTTP host header. We have not been able to successfully use a host header name other than the domain name to invoke a website using GoDaddy (eg, setting the A record's Host field to MyHostHeader to invoke www.MyWebsite.com). If you've figured out how to do this, then please go ahead and send us an email to let us know ;-).
Category Website Hosting
Subcategory Hosting Multiple Websites
Problem/
Description
How to resolve a domain name that does not include the www prefix. This issue deals with host headers.
Symptoms/
Error Msgs
None
Resolution Typically, when a user types a domain name into a browser's address bar without the leading www prefix, the name server will resolve the target IP address normally, but send the domain name *without* the www prefix as the host header. For example, say www.J-TownComputer.com is hosted on IP address 12.34.56.78 and that the user enters J-TownComputer.com into the browser's address bar. The HTTP request will be correctly sent to IP address 12.34.56.78 with a host header field of 'J-TownComputer.com'. On web servers running IIS, this request will not be routed to a website expecting www.J-TownComputer.com as the host header and will instead end up invoking the default website for the server. In order to route the request correctly, a new web site entry must be added to IIS which expects 'J-TownComputer.com' as its host header and which returns the J-TownComputer site the same way as the original www.J-TownComputer.com IIS web site entry. Note: There may be a way to configure a name server to add the www prefix to a host header entry regardless of whether or not the user includes the prefix when invoking the website. We have not explored this possibility, however.