Tag: Email

Reading Time: 9 minutes

Introduction

stop spam emails

The most effective method to protect a server from sending spam is to prevent it in the first place. In this article, we provide several techniques to use to keep the server from sending out unwanted spam or junk mail. Typically, unwanted, and unsolicited spam email is usually bulk sent out to an indiscriminate list of recipients. Spam is often used for commercial purposes but can be sent out in massive volume by a botnet or a network of infected computers.

Continue reading →
Reading Time: 6 minutes

What is Thunderbird?

Thunderbird

Thunderbird is one of the most widely used open-source email clients in the world. Mozilla originally developed the software in 2004, but the project waned in 2014/15, and Mozilla stated that they would only deliver security and maintenance updates in the future. Until recently, the community maintained the software when a Mozilla Foundation subsidiary, MZLA Technologies Corporation, took over. Today, the improvements in security and stability are very much appreciated, and since version 78, Thunderbird has built-in OpenPGP encryption technology enabled by default. Earlier versions used the available PGP technology, but it needed to be installed as a supplemental plugin. 

Continue reading →
Reading Time: 6 minutes

What is Tmpmail?

Tmpmail is a utility written in bash that allows a user to create and use a temporary email address for receiving emails from the command-line. Underneath the covers, the bash script uses 1secmail’s API to receive the emails. By default, email addresses are created at random unless a specific email address follows the --generate flag.

Continue reading →
Reading Time: 5 minutes

What is SMTP?

Email with arrow

When you send an email, your email client and multiple servers on the internet use the Simple Mail Transport Protocol or SMTP to move that message around the internet and ultimately into the recipient’s mailbox.

Continue reading →
Reading Time: 8 minutes

In this tutorial, we will look at several methods that are used to compromise a website. In today's world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business. 

Continue reading →
Reading Time: 8 minutes

In the second part of our review, we will be looking at the Web Server, FTP Server, SSH Server and lastly the Mail Server sections of the InterWorx main menu and comparing them to the available options in WHM. Let’s start with the System Services menu.

Continue reading →
Reading Time: 4 minutes

The Mail Queue Manager feature in WHM allows you to view, delete, and attempt to deliver queued emails that have not yet left the server. It can be a handy tool for diagnosing a variety of issues with mail deliverability, such as spotting signs of a compromised account sending spam from the server.

Continue reading →
Reading Time: 4 minutes

What is the Gmail Blacklist?

As one of the most trusted email providers, Google keeps top-notch security by maintaining their own blacklist and security information. With the numerous users the company provides email accounts to, there is an overwhelming amount of data that Google can scrutinize for spam or malicious emails. By gathering this valuable information, rules are created to filter problem content. These rules are highly sophisticated, and as this data is compiled, specific IP addresses are flagged and sorted into what is called a blacklist.

Continue reading →

How To Stop a Spamming Server

Posted on by Cameron Paxton | Updated:
Reading Time: 5 minutes

Protecting Your Server From Spamming

Spamming is a serious issue for your business and can take a toll on your time and resources to fix. The best way to solve this problem, of course, is to never have it in the first place. The number one way to help prevent spamming is to ensure all CMS’s (like WordPress, Joomla, and Drupal) including themes, plugins are up-to-date on your VPS server or Dedicated server. This may sound too simple, but there are innumerable times when an outdated plugin allows hackers to destroy an otherwise secure domain.

Continue reading →
Reading Time: 5 minutes

If you use multiple aliases or parked domains in a cPanel account, you may want to change the primary domain used for the cPanel account containing them. Wanting to change the primary domain in cPanel is desirable for multiple reasons, such as:

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434