Knowledgebase : Billing > Security

T20 Step

We suggest that all clients have their account security question and Two-Factor Authentication setup on their billing account.

Two-Factor Authentication adds an extra layer of protection to logins. Once enabled & configured, each time you sign in you will be asked to enter both your username & password as well as a second factor such as a security code.

To get this all setup please login to the following url ( using your billing login info. The required info was created when you first signed up with RFE Hosting.
IF you do not have this info, please open up a billing ticket by sending an email to, or jump on our live chat. We would then be happy to get this info sent over to you and help you get logged in.

Once you are logged in, go ahead and click over to your account security settings page at From there you can setup your security question and enable Two-Factor Authentication.

You will need to download the "Google Authenticator" App on your mobile device to continue with the Two-Factor Authentication setup.

Feel free to let us know if you have any trouble getting that setup.

To login to your Client Area/Billing Account visit the link below.

(Client Area login details can be found in the email with the subject line "Welcome to RFE Hosting")

 2. Enter your email address and client area password into the corresponding fields.

Billing Login 

3. Click Login.


If you're having trouble logging into the Client Area, please contact us for support on getting logged in.

The Support PIN is a unique 6-digit number only accessible to the owner of the account. This number is used by RFE Hosting Tech Support and Billing teams to verify your ownership or permission to access your control panel and billing details.

We require you to have this number when calling to ensure that only authorized parties receive information or assistance with accessing your hosting account or billing information.


If for any reason you are unable to locate your support PIN, our support team can verify with the credit card used to pay for the account.

  1. Login to your billing account
  2. Locate on the top left your "Support Pin"

support pin



DDoS is short for Distributed Denial of Service.

DDoS is a type of DOS attack where multiple compromised systems, which are often infected with a Trojan, are used to target a single system causing a Denial of Service (DoS) attack. Victims of a DDoS attack consist of both the end targeted system and all systems maliciously used and controlled by the hacker in the distributed attack.
How DDoS Attacks Work

In a DDoS attack, the incoming traffic flooding the victim originates from many different sources – potentially hundreds of thousands or more. This effectively makes it impossible to stop the attack simply by blocking a single IP address; plus, it is very difficult to distinguish legitimate user traffic from attack traffic when spread across so many points of origin.
The Difference Between DoS and DDos Attacks

A Denial of Service (DoS) attack is different from a DDoS attack. The DoS attack typically uses one computer and one Internet connection to flood a targeted system or resource. The DDoS attack uses multiple computers and Internet connections to flood the targeted resource. DDoS attacks are often global attacks, distributed via botnets.
Types of DDoS Attacks

There are many types of DDoS attacks. Common attacks include the following:

  • Traffic attacks: Traffic flooding attacks send a huge volume of TCP, UDP and ICPM packets to the target. Legitimate requests get lost and these attacks may be accompanied by malware exploitation.
  • Bandwidth attacks: This DDos attack overloads the target with massive amounts of junk data. This results in a loss of network bandwidth and equipment resources and can lead to a complete denial of service.
  • Application attacks: Application-layer data messages can deplete resources in the application layer, leaving the target's system services unavailable.

For more info on what protection we offer, please see our DDOS page here -

SSL is an abbreviation used for Secure Sockets Layers, which are encryption protocols used on the internet to secure information exchange and provide certificate information.

These certificates provide an assurance to the user about the identity of the website they are communicating with. SSL may also be called TLS or Transport Layer Security protocol.

In most modern web browsers users can click on the SSL icon displayed in the address bar to view certification, identification and other information about a website.

SSL and TLS protocols are not just limited to websites. They are also used in email, SFTP, and various other internet technologies.

WordPress sites can also benefit from SSL by adding an SSL certificate to their web hosting plan. There are also WordPress plugins available which allow users to setup their SSL certificate information through out their WordPress sites.

Most websites use SSL on their payment gateways and eCommerce sites.

As a user, it is always important that you never enter your payment / credit card information on pages that are not secure.

Modern browsers like Firefox and Chrome will show errors and sometimes block rendering of improperly secured pages on a site.