Tag: Common Questions

These are the questions asked most often by our clients. They deal with everyday thoughts, ideas, issues, and concerns.

Reading Time: 6 minutes

What is Tmpmail?

Tmpmail is a utility written in bash that allows a user to create and use a temporary email address for receiving emails from the command-line. Underneath the covers, the bash script uses 1secmail’s API to receive the emails. By default, email addresses are created at random unless a specific email address follows the --generate flag.

Continue reading →
Reading Time: 4 minutes

While there are many ways to make sure your server is as secure as possible, there are some basic steps that we can take to increase security. Users with a Linux server can change their SSH port to something other than the default port (22). The steps listed below, outline this task providing steps to enable this change.

Continue reading →
Reading Time: 5 minutes

What is SMTP?

Email with arrow

When you send an email, your email client and multiple servers on the internet use the Simple Mail Transport Protocol or SMTP to move that message around the internet and ultimately into the recipient’s mailbox.

Continue reading →
Reading Time: 6 minutes

What is Zero Trust Security?

Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.

Continue reading →
Reading Time: 8 minutes

In this tutorial, we will look at several methods that are used to compromise a website. In today's world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business. 

Continue reading →
Reading Time: 4 minutes

What is a DNS Zone?

A DNS Zone is part of a group of components that make up DNS. These objects are managed by an administrator or organization in a granular manner. DNS zones can contain varied information about a domain and subdomains. Multiple zones can also exist on the same server.  DNS information is stored within a text file called a DNS zone file.

Continue reading →
Reading Time: 9 minutes

What is DNS?

DNS stands for Domain Name System (DNS) services. When we access a website, we are using this service to locate the server where the domain's website is located. When browsing the web, we usually type in a domain name like www.google.com into our browser. This is better than trying to remember an IP address linked to a Google server.

Continue reading →
Reading Time: 3 minutes

This article will teach you how to create, modify and delete hosting package presets within WHM. While you can configure each option individually when setting up an account on your VPS server or Dedicated server, you may find yourself using the same handful of overall settings for a lot of your sites. By creating hosting packages you able to define preset packages with varying resources, making account creation that much quicker.

Continue reading →
Reading Time: 6 minutes
ip addresses floating in cyberspace

In this article, we will discuss how and why a VPS server or Dedicated server might block an IP address and how to resolve it.

When your company hosts a website or web app online, whether it’s an individual dedicated server or a whole server cluster, you naturally expect to have uninterrupted access at all times. However, it’s possible that in rare circumstances, your server could accidentally block your IP and prevent you from connecting and using the service.

Continue reading →
Reading Time: 17 minutes

In this article, we will denote the security best practices for 2020 and beyond. Because security is such a challenging subject for many, it often goes unheeded, and as such, many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434