Editing Wpconfig.Php

Total Page:16

File Type:pdf, Size:1020Kb

Editing Wpconfig.Php 2/11/2015 Editing wp­config.php « WordPress Codex Search WordPress.org Ready to get started? Download WordPress Codex Codex tools: Log in Interested in functions, hooks, classes, or methods? Check out the new WordPress Code Reference! Editing wp­config.php Languages: English • Deutsch • Français • Hrvatski • Italiano • 日本語 • Português do Brasil • Русский • ไทย • 中文(简体) • (Add your language) One of the most important files in your WordPress installation is the wp‐config.php Contents file. This file is located in the root of your WordPress file directory and contains your website's base configuration details, such as database connection information. 1 Configure Database Settings 1.1 Default wp­config­sample.php When you first download WordPress, the wp‐config.php file isn’t included. The 1.1.1 Set Database Name WordPress setup process will create a wp‐config.php file for you based on the 1.1.2 Set Database User information you provide. 1.1.3 Set Database Password 1.1.4 Set Database Host Advanced users can manually create a wp‐config.php file by locating the sample file 1.1.4.1 Possible DB_HOST named "wp­config­sample.php" (located in the root install­directory), editing it as values required, and then saving it as wp‐config.php. 1.1.4.2 MySQL Alternate Port 1.1.4.3 MySQL Sockets or Pipes 1.2 Database character set 1.3 Database collation 1.4 Security Keys 2 Advanced Options 2.1 table_prefix 2.2 WordPress address (URL) 2.3 Blog address (URL) 2.4 Moving wp­content folder 2.5 Moving plugin folder 2.6 Moving themes folder http://codex.wordpress.org/Editing_wp­config.php#Increasing_memory_allocated_to_PHP 1/23 2/11/2015 Editing wp­config.php « WordPress Codex 2.7 Moving uploads folder 2.8 Modify AutoSave Interval 2.9 Post Revisions 2.9.1 Disable Post Revisions 2.9.2 Specify the Number of Post Revisions 2.10 Set Cookie Domain 2.11 Enable Multisite / Network Ability 2.12 Redirect Nonexistent Blogs 2.13 Debug 2.14 Disable Javascript Concatenation 2.15 Configure Error Logging 2.16 Increasing memory allocated to PHP 2.17 Cache 2.18 Custom User and Usermeta Tables 2.19 Language and Language Directory 2.19.1 WordPress v4 and above 2.19.2 WordPress v3.9.2 and below 2.20 Save queries for analysis 2.21 Override of default file permissions 2.22 WordPress Upgrade Constants 2.22.1 Enabling SSH Upgrade Access 2.23 Alternative Cron 2.24 Disable Cron and Cron Timeout 2.25 Additional Defined Constants 2.26 Empty Trash 2.27 Automatic Database Optimizing 2.28 Do not upgrade global tables 2.29 View All Defined Constants 2.30 Disable the Plugin and Theme Editor 2.31 Disable Plugin and Theme Update and Installation 2.32 Require SSL for Admin and Logins http://codex.wordpress.org/Editing_wp­config.php#Increasing_memory_allocated_to_PHP 2/23 2/11/2015 Editing wp­config.php « WordPress Codex 2.33 Block External URL Requests 2.34 Disable WordPress Auto Updates 2.35 Disable WordPress Core Updates 3 Double Check Before Saving 4 External Resources 5 See Also NOTE: The contents of the wp‐config‐sample.php file are in a very specific order. The order matters. If you already have a wp‐ config.php file, rearranging the contents of the file may create errors on your blog. To change the wp‐config.php file for your installation, you will need this information: Database Name Database Name used by WordPress Database Username Username used to access Database Database Password Password used by Username to access Database Database Host The hostname of your Database Server. A port number, Unix socket file path or pipe may be needed as well. If your hosting provider installed WordPress for you, get the information from them. If you manage your own web server or hosting account, you will have this information as a result of creating the database and user. Configure Database Settings Important: never use a word processor like Microsoft Word for editing WordPress files! Locate the file wp‐config‐sample.php in the base directory of your WordPress directory and open in a text editor. NOTE: Since Version 2.6, wp‐config.php can be moved to the directory directly above the WordPress application directory. Default wp‐config‐sample.php NOTE: This is an example of a default wp‐config‐sample.php. The values here are examples to show you what to do. Do not change these details here by editing this page, change them on your web server. If you make changes here by using the edit button, they will not work and you will be showing your password details to the world. // ** MySQL settings ‐ You can get this info from your web host ** // /** The name of the database for WordPress */ define( 'DB_NAME', 'database_name_here' ); http://codex.wordpress.org/Editing_wp­config.php#Increasing_memory_allocated_to_PHP 3/23 2/11/2015 Editing wp­config.php « WordPress Codex /** MySQL database username */ define( 'DB_USER', 'username_here' ); /** MySQL database password */ define( 'DB_PASSWORD', 'password_here' ); /** MySQL hostname */ define( 'DB_HOST', 'localhost' ); NOTE: Text inside /* */ are comments, for information purposes only. Set Database Name Replace 'database_name_here', with the name of your database, e.g. MyDatabaseName. define( 'DB_NAME', 'MyDatabaseName' ); // Example MySQL database name Set Database User Replace 'username_here', with the name of your username e.g. MyUserName. define( 'DB_USER', 'MyUserName' ); // Example MySQL username Set Database Password Replace 'password_here', with the your password, e.g. MyPassWord. define( 'DB_PASSWORD', 'MyPassWord' ); // Example MySQL password Set Database Host Replace 'localhost', with the name of your database host, e.g. MyDatabaseHost. A port number or Unix socket file path may be needed as well. define( 'DB_HOST', 'MyDatabaseHost' ); // Example MySQL Database host NOTE: There is a good chance you will NOT have to change it. If you are unsure, try installing with the default value of 'localhost' and see if it works. If the install fails, contact your web hosting provider. Possible DB_HOST values Different hosting companies use different network settings for their mysql databases. If your hosting company is listed below in the left column, the value on the right is similar to the correct value for DB_HOST. Contact your tech support and/or search your hosting companies online Documentation to be sure. Hosting Company DB_HOST Value Guess http://codex.wordpress.org/Editing_wp­config.php#Increasing_memory_allocated_to_PHP 4/23 2/11/2015 Editing wp­config.php « WordPress Codex 1and1 db12345678 AN Hosting localhost Aruba.it localhost or real IP provided with activation mail. A Small Orange localhost AT&T xxxxxxxx.carrierzone.com full server name found in PHP MyAdmin. BlueHost localhost DreamHost mysql.example.com GoDaddy ­ Shared and In the Databases menu go to MySQL. To the right of the database name click on Actions and 4GH Hosting Details. The hostname is at the bottom of the window. GoDaddy ­ cPanel localhost Hosting GoDaddy ­ Plesk Use the IP address shown in the Databases Section in Plesk. Do not include :3306 Hosting HostGator localhost HostICan localhost ICDSoft localhost:/tmp/mysql5.sock Infomaniak Network mysql.yourdomain InMotion Hosting localhost iPage username.ipagemysql.com IPower username.ipowermysql.com LaughingSquid localhost MediaTemple Grid internal‐db.s00000.gridserver.com ­ (Replace "00000" with the actual site number) MediaTemple DV localhost MegnaHost localhost NearlyFreeSpeech.Net username.db NetworkSolutions mysqlv5 one.com example.com.mysql pair Networks dbnnnx.pair.com QTH.com localhost localhost for unmanaged servers, variable for Cloud Sites like mysqlXY‐ Rackspace Cloud AB.wcN.dfQ.stabletransit.com where X,Y,A,B,N,Q are variables SysFix.eu Power datapower.sysfix.eu Hosting Yahoo mysql Hosts with cPanel localhost Hosts with Plesk localhost Hosts with localhost DirectAdmin Tophost.it sql.your‐domain‐name.it MySQL Alternate Port http://codex.wordpress.org/Editing_wp­config.php#Increasing_memory_allocated_to_PHP 5/23 2/11/2015 Editing wp­config.php « WordPress Codex If your host uses an alternate port number for your database you'll need to change the DB_HOST value in the wp‐config.php file to reflect the alternate port provided by your host. For localhost define( 'DB_HOST', 'localhost:3307' ); Other define( 'DB_HOST', 'mysql.example.com:3307' ); Replace 3307 with whatever port number your host gives you. MySQL Sockets or Pipes If your host uses Unix sockets or pipes, adjust the DB_HOST value in the wp‐config.php file accordingly. define( 'DB_HOST', 'localhost:/var/run/mysqld/mysqld.sock' ); Replace /var/run/mysqld/mysqld.sock with the socket or pipe information provided by your host. Database character set As of WordPress Version 2.2, DB_CHARSET was made available to allow designation of the database character set (e.g. tis620 for TIS620 Thai) to be used when defining the MySQL database tables. The default value of utf8 (Unicode UTF­8) is almost always the best option. UTF­8 supports any language, so you typically want to leave DB_CHARSET at utf8 and use the DB_COLLATE value for your language instead. This example shows utf8 which is considered the WordPress default value: define( 'DB_CHARSET', 'utf8' ); WARNING: Those performing new installations There usually should be no reason to change the default value of DB_CHARSET. If your blog needs a different character set, please read Character Sets and Collations MySQL Supports for valid DB_CHARSET values. WARNING: Those performing upgrades (especially blogs that existed before 2.2) If DB_CHARSET and DB_COLLATE do not exist in your wp‐config.php file, DO NOT add either definition to your wp‐config.php file unless you read and understand Converting Database Character Sets. Adding DB_CHARSET and DB_COLLATE to the wp‐config.php file, for an existing blog, can cause major problems. Database collation http://codex.wordpress.org/Editing_wp­config.php#Increasing_memory_allocated_to_PHP 6/23 2/11/2015 Editing wp­config.php « WordPress Codex As of WordPress Version 2.2, DB_COLLATE was made available to allow designation of the database collation (i.e.
Recommended publications
  • Civil Good: a Platform for Sustainable and Inclusive Online Discussion
    Civil Good: A Platform For Sustainable and Inclusive Online Discussion An Interactive Qualifying Project submitted to the faculty of Worcester Polytechnic Institute In partial fulfillment of the requirements for the degree of Bachelor of Science by: Steven Malis (Computer Science), Tushar Narayan (Computer Science), Ian Naval (Computer Science), Thomas O'Connor (Biochemistry), Michael Perrone (Physics and Mathematics), John Pham (Computer Science), David Pounds (Computer Science and Robotics Engineering), December 19, 2013 Submitted to: Professor Craig Shue, WPI Advisor Alan Mandel, Creator of the Civil Good concept Contents 1 Executive Summary1 1.1 Overview of Recommendations......................2 2 Authorship5 3 Introduction 10 3.1 Existing Work - Similar Websites.................... 11 4 Psychology 17 4.1 Online Disinhibition........................... 17 4.2 Format of Discussions.......................... 22 4.3 Reducing Bias with Self-Affirmation................... 28 4.4 Other Psychological Influences...................... 34 5 Legal Issues 38 5.1 Personally Identifiable Information................... 38 5.2 Intellectual Property........................... 42 5.3 Defamation................................ 45 5.4 Information Requests........................... 46 5.5 Use by Minors............................... 49 5.6 General Litigation Avoidance and Defense............... 51 6 Societal Impact 52 6.1 Political Polarization........................... 52 6.2 Minority Opinion Representation.................... 55 6.3 History and Political
    [Show full text]
  • Making Internet Security Accessible to Everyone
    CASE STUDY Making Internet Security Accessible to Everyone The Challenge Vital personal and business information flows over the Web more frequently than ever, and we don’t always know when it’s happening. HTTPS has been around for a long time but according to Firefox telemetry, only ~51% of website page loads used HTTPS at the end of 2016. That number should be 100% if the Web is to provide the level of privacy and security that people expect, and Let’s Encrypt is leading the way. ABOUT LET’S ENCRYPT Let’s Encrypt is a free, automated and open certificate In essence, everyone should use TLS (the successor to SSL) authority, run for the public’s benefit and is supported everywhere to protect their communications over the Web. Every organizationally by The Linux Foundation. The objective browser in every device supports it. Every server in every data of Let’s Encrypt is to help acheive 100% encryption on center supports it. the Web. Let’s Encrypt provides free domain-validated (DV) certificates through a simplified, automated process. However, until Let’s Encrypt there was a potentially significant These unique attributes make Let’s Encrypt ideal for large organizations, who need to alleviate financial burden and cost to administering server certificates. Let’s Encrypt is a free automate deployment at scale. Let’s Encrypt is also ideal certificate authority, built on a foundation of cooperation and for individual users, particularly those in underserved openness, that lets everyone be up and running with basic markets, who may lack funds and technical skill to server certificates for their domains through a simple one-click otherwise deploy HTTPS.
    [Show full text]
  • Dreamhost Refer a Friend
    Dreamhost Refer A Friend Christopher is overflowingly hortative after redivivus Terrence clapboards his destructs tropically. Instructive Christos swigging inequitably. When Stanwood valorising his singing wants not repressively enough, is Sim prevenient? Every time very simple and provide training, can end user reviews to affiliate will get paid to a dreamhost Speeds and upgrades can change your referred by us know about any way if you get more money by that they feel like twitter, where various online. Please share how much does dreamhost does this change a friend connected to refer and referring. This can we may be able to dreamhost was either way is slow, dreamhost refer a friend programs reward arm to a calendar etc to. Best though all the fun, running in very bias and wiki away and on powweb experience of other words, perl or employer pay? Build fun way you refer a friend to make money referring today to refuse all product specs, forced matrix and private. Cares act provisions that this stage is a try enterprise plans with a big way you for the time you know we need to obtain employees are! Want to dreamhost has sent within your friend to join using a small businesses, hostgator myself which was friendly team. How these things like the. Out your behavior is one among others you ever is useful to finish up for when weighed against all in this page? But dreamhost been a friend and refer different portfolios. They refer friends to dreamhost server that speaks spanish. No further options available in new affiliates, as possible to use a lifestyle gaming brand consistency is laid out for.
    [Show full text]
  • Comodo Antispam Gateway Software Version 1.5
    Comodo Antispam Gateway Software Version 1.5 Administrator Guide Guide Version 1.5.082412 Comodo Security Solutions 525 Washington Blvd. Jersey City, NJ 07310 Comodo Antispam Gateway - Administrator Guide Table of Contents 1 Introduction to Comodo Antispam Gateway........................................................................................................................... 4 1.1 Release Notes............................................................................................................................................................. 5 1.2 Purchasing License .................................................................................................................................................... 6 1.3 Adding more Users, Domains or Time to your Account .................................................................................................6 1.4 License Information................................................................................................................................................... 10 2 Getting Started................................................................................................................................................................... 13 2.1 Incoming Filtering Configuration ................................................................................................................................ 13 2.1.1 Configuring Your Mail Server..................................................................................................................................
    [Show full text]
  • 1. ARIN Ipv6 Wiki Acceptable Use
    1. ARIN IPv6 Wiki Acceptable Use . 3 2. IPv6 Info Home . 3 2.1 Explore IPv6 . 5 2.1.1 The Basics . 6 2.1.1.1 IPv6 Address Allocation BCP . 6 2.1.2 IPv6 Presentations and Documents . 9 2.1.2.1 ARIN XXIII Presentations . 11 2.1.2.2 IPv6 at Caribbean Sector . 12 2.1.2.3 IPv6 at ARIN XXIII Comment . 12 2.1.2.4 IPv6 at ARIN XXI . 12 2.1.2.4.1 IPv6 at ARIN XXI Main-Event . 13 2.1.2.4.2 IPv6 at ARIN XXI Pre-Game . 14 2.1.2.4.3 IPv6 at ARIN XXI Stats . 14 2.1.2.4.4 IPv6 at ARIN XXI Network-Setup . 18 2.1.2.4.5 IPv6 at ARIN 21 . 21 2.1.3 IPv6 in the News . 21 2.1.3.1 Global IPv6 Survey . 23 2.1.3.2 IPv6 Penetration Survey Results . 23 2.1.4 Book Reviews . 25 2.1.4.1 An IPv6 Deployment Guide . 25 2.1.4.2 Day One: Advanced IPv6 Configuration . 25 2.1.4.3 Day One Exploring IPv6 . 25 2.1.4.4 IPv6 Essentials . 26 2.1.4.5 Migrating to IPv6 . 26 2.1.4.6 Running IPv6 . 26 2.1.4.7 IPv6, Theorie et pratique . 26 2.1.4.8 Internetworking IPv6 With Cisco Routers . 26 2.1.4.9 Guide to TCP/IP, 4th Edition . 26 2.1.4.10 Understanding IPv6, Third Edition . 27 2.1.5 Educating Yourself about IPv6 .
    [Show full text]
  • 0789747189.Pdf
    Mark Bell 800 East 96th Street, Indianapolis, Indiana 46240 Build a Website for Free Associate Publisher Copyright © 2011 by Pearson Education Greg Wiegand All rights reserved. No part of this book shall be Acquisitions Editor reproduced, stored in a retrieval system, or transmit- Laura Norman ted by any means, electronic, mechanical, photo- copying, recording, or otherwise, without written Development Editor permission from the publisher. No patent liability is Lora Baughey assumed with respect to the use of the information contained herein. Although every precaution has Managing Editor been taken in the preparation of this book, the Kristy Hart publisher and author assume no responsibility for Senior Project Editor errors or omissions. Nor is any liability assumed for Betsy Harris damages resulting from the use of the information contained herein. Copy Editor ISBN-13: 978-0-7897-4718-1 Karen A. Gill ISBN-10: 0-7897-4718-9 Indexer The Library of Congress Cataloging-in-Publication Erika Millen data is on file. Proofreader Williams Woods Publishing Services Technical Editor Christian Kenyeres Publishing Coordinator Cindy Teeters Book Designer Anne Jones Compositor Nonie Ratcliff Trademarks All terms mentioned in this book that are known to be trademarks or service marks have been appropriately capitalized. Que Publishing cannot attest to the accuracy of this infor- mation. Use of a term in this book should not be regarded as affecting the validity of any trademark or service mark. Warning and Disclaimer Every effort has been made to make this book as complete and as accurate as possible, but no warranty or fitness is implied. The information provided is on an “as is” basis.
    [Show full text]
  • GUIDE to WEB HOSTING INTRODUCTION the Internet Is a Delicious Sprawl of Fascinating Websites, Catering to Our Every Wish and Whim
    GUIDE TO WEB HOSTING INTRODUCTION The Internet is a delicious sprawl of fascinating websites, catering to our every wish and whim. From the old to the young, we’ve all come to depend on our computers, mobile phones, and other devices. We rely on the Internet for food shopping, banking, finance, and even socializing – safe in the knowledge that our favorite websites will always be available to us, day or night. Such is the security and stability of modern web hosting, that it is often taken for granted. We seldom dwell on the mechanisms behind a website’s operations anymore, largely due to the carefree experience many of us enjoy. Where once servers were susceptible to a range of attacks, ISP issues, and hardware malfunctions, technology has advanced to the point that not only do primary hardware and software systems have a minute chance of failure, but there are plenty of backup systems ready to kick into the gear should the need arise. As with many feats of technology, the silent heroes behind the Internet’s speedy function are forgotten, hidden away in large server banks in tidy stacks. But learning about web hosting is necessary both for aspiring web masters and the average user looking to launch a personal website. There are currently over one billion websites inhabiting the Internet. Flashback to 1996, and this number was a diminutive 100,000 websites. Over two decades, the Internet radically expanded from a nuisance tool for industry professionals to a standard part of ordinary life, serving a range of needs that far surpassed the expectations of its early adopters.
    [Show full text]
  • Making Internet Security Accessible to Everyone
    CASE STUDY Making Internet Security Accessible to Everyone The Challenge Vital personal and business information flows over the Internet more frequently than ever, and we don’t always know when it’s happening. HTTPS has been around for a long time but according to Firefox telemetry only ~40% of websites and ~65% of transactions used HTTPS at the end of 2015. Those numbers should both be 100% if the web is to provide the level of privacy and security that people expect, and Let’s ABOUT LET’S ENCRYPT Encrypt is leading the way. Let’s Encrypt is a free, automated and open certificate authority, run for the public’s benefit and operated by It’s clear at this point that encrypting is something all of us should The Linux Foundation. The objective of Let’s Encrypt and be doing. In essence everyone should use TLS (the successor to the ACME protocol is to make it possible to set up an SSL) everywhere to protect themselves. Every browser in every HTTPS server and have it automatically obtain a browser- device supports it. Every server in every data center supports trusted certificate, without any human intervention. This is accomplished by running a certificate management agent it. However, until Let’s Encrypt there was a challenge and a on the web server. There are two steps to this process. significant cost to administering server certificates. First, the agent proves to the Certificate Authority (CA) that the web server controls a domain. Then, the agent can Let’s Encrypt is a free certificate authority, built on a request, renew, and revoke certificates for that domain.
    [Show full text]
  • Cpanel Restore Sending Request
    Cpanel Restore Sending Request Vaughan propel psychologically while internationalist Sayre interpenetrating unwholesomely or modernises waist-deep. Calcific and gymnastic Verge jargonizes her falchion thiggings or count-downs nary. Inventorial Obie schemes vaporously, he outstays his chanter very sanctifyingly. Regarding your email boxes when necessary restore cPanel backup file kindly. Turns off their values should be implemented yet, game content from an unique password? Changing the time zone in webmail. Changing infrastructure of sending one php executes, cpanel restore sending request scripts and click the accounts that failed transfer first. My registrar is listed as the Administrative Contact for my office name and feminine is preventing my transfer scent from being processed. Php requests and restore it monitors for? DNS settings, SMS for new invoice, found in WHM? Because certainly this, talk you need to sir about bandwidth usage. CPanel Quick Guide Tutorialspoint. We completely updated our website a few months back and believe the page was deleted then. Easily throw an email account by one cPanel server to another. GoDaddy Community cPanel Hosting GoDaddy AE. You must give first generated a CSR certificate signing request in cPanel and orde. Wordpress file manager hack. Create such files for each user that should have a custom file. Hi guys, and must be configured to use destinations that support incremental backups. Hosting Backup Options In cPanel Pickaweb. You may restore a removed file to particular folder origin. Download your backup file and extract it. Will send an additional mount options accurately describes a restoration. Configure and manage hosted email accounts for one office more users.
    [Show full text]
  • University of Florida Dissertation
    WHITE HOODS AND KEYBOARDS: AN EXAMINATION OF THE KLAN AND KU KLUX KLAN WEB SITES By ANDREW G. SELEPAK A DISSERTATION PRESENTED TO THE GRADUATE SCHOOL OF THE UNIVERSITY OF FLORIDA IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY UNIVERSITY OF FLORIDA 2011 1 © 2011 Andrew G. Selepak 2 To my grandfathers, George Kanala and George Selepak, who spent their lives providing for their families and inspired me to achieve. Also to my parents, Ronald and Josephine, who have supported me in all my decisions, and without their love and guidance, I would never have been able realize the honor of receiving a doctorate. 3 ACKNOWLEDGMENTS First and foremost I would like to thank Dr. Debbie Treise who has been my academic advisor, dissertation chair, mentor, friend, motivator, guide, and the person most responsible for me being able to achieve earning a doctorate. Second, I would like to thank Dr. Belio Martinez, Jr., who has worked with me on numerous projects, been a friend and colleague, and shown me a job is not who a person is but what they do. I would also like to thank Dr. Johanna Cleary who provided personal insight for this study and imparted me with invaluable knowledge of the field of Journalism and Communications. In addition, I would also like to thank Dr. Connie Shehan who has encouraged my diverse areas of research and always been enthusiastic about my topics of study. Finally, I would like to thank Jody Hedge, Kim Holloway, and Sarah Lee for providing untold assistance in helping me graduate.
    [Show full text]
  • Akeeba Backup User's Guide
    Akeeba Backup User's Guide Nicholas K. Dionysopoulos Akeeba Backup User's Guide by Nicholas K. Dionysopoulos Copyright © 2006-2021 Akeeba Ltd Abstract This book covers the use of the Akeeba Backup site backup component for Joomla!™ -powered web sites. It does not cover any other software of the Akeeba Backup suite, including Kickstart and the other utilities which have documentation of their own. Both the free Akeeba Backup Core and the subscription-based Akeeba Backup Professional editions are covered. If you are looking for a quick start to using the component please watch our video tutorials [https:// www.akeeba.com/videos]. Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the appendix entitled "The GNU Free Documentation License". Table of Contents I. User's Guide to Akeeba Backup for Joomla!™ ................................................................................ 1 1. Introduction ...................................................................................................................... 6 1. Introducing Akeeba Backup ........................................................................................ 6 2. What can I use Akeeba Backup for? ............................................................................. 6 3. A typical backup/restoration
    [Show full text]
  • WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Third Edition (“WIPO Overview 3.0”)
    WIPO Overview of WIPO Panel Views on Selected UDRP Questions, Third Edition (“WIPO Overview 3.0”) (including additional filing resources) WIPO Arbitration and Mediation Center 34, chemin des Colombettes CH-1211 Geneva 20 Switzerland T + 41 22 338 82 47 www.wipo.int/amc [email protected] © World Intellectual Property Organization – 2017 All Rights Reserved INTRODUCTION.............................................................................................................. 3 FIRST UDRP ELEMENT ............................................................................................... 11 SECOND UDRP ELEMENT.......................................................................................... 33 THIRD UDRP ELEMENT .............................................................................................. 55 PROCEDURAL QUESTIONS ....................................................................................... 81 WIPO LEGAL INDEX OF WIPO UDRP PANEL DECISIONS.................................. 113 DOMAIN NAME DISPUTE RESOLUTION SERVICE FOR COUNTRY CODE TOP LEVEL DOMAINS (“CCTLDS”) ............................................................ 125 UNIFORM DOMAIN NAME DISPUTE RESOLUTION POLICY (“UDRP”)............. 129 RULES FOR UNIFORM DOMAIN NAME DISPUTE RESOLUTION POLICY (“RULES”) .................................................................................................... 135 WIPO SUPPLEMENTAL RULES FOR UNIFORM DOMAIN NAME DISPUTE RESOLUTION POLICY (“WIPO SUPPLEMENTAL RULES”) ................................ 149
    [Show full text]