Tag: Common Questions

These are the questions asked most often by our clients. They deal with everyday thoughts, ideas, issues, and concerns.

Reading Time: 5 minutes

What is SMTP?

Email with arrow

When you send an email, your email client and multiple servers on the internet use the Simple Mail Transport Protocol or SMTP to move that message around the internet and ultimately into the recipient’s mailbox.

Continue reading →
Reading Time: 6 minutes

What is Zero Trust Security?

Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.

Continue reading →
Reading Time: 8 minutes

In this tutorial, we will look at several methods that are used to compromise a website. In today's world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business. 

Continue reading →
Reading Time: 4 minutes

What is a DNS Zone?

A DNS Zone is part of a group of components that make up DNS. These objects are managed by an administrator or organization in a granular manner. DNS zones can contain varied information about a domain and subdomains. Multiple zones can also exist on the same server.  DNS information is stored within a text file called a DNS zone file.

Continue reading →
Reading Time: 9 minutes

What is DNS?

DNS stands for Domain Name System (DNS) services. When we access a website, we are using this service to locate the server where the domain's website is located. When browsing the web, we usually type in a domain name like www.google.com into our browser. This is better than trying to remember an IP address linked to a Google server.

Continue reading →
Reading Time: 3 minutes

This article will teach you how to create, modify and delete hosting package presets within WHM. While you can configure each option individually when setting up an account on your VPS server or Dedicated server, you may find yourself using the same handful of overall settings for a lot of your sites. By creating hosting packages you able to define preset packages with varying resources, making account creation that much quicker.

Continue reading →
Reading Time: 6 minutes
ip addresses floating in cyberspace

In this article, we will discuss how and why a VPS server or Dedicated server might block an IP address and how to resolve it.

When your company hosts a website or web app online, whether it’s an individual dedicated server or a whole server cluster, you naturally expect to have uninterrupted access at all times. However, it’s possible that in rare circumstances, your server could accidentally block your IP and prevent you from connecting and using the service.

Continue reading →
Reading Time: 17 minutes

In this article, we will denote the security best practices for 2020 and beyond. Because security is such a challenging subject for many, it often goes unheeded, and as such, many are caught unaware when an issue arises. By following these best practices, you can significantly lower your risk of being compromised by a malicious actor.

Continue reading →
Reading Time: 3 minutes

What is DNS?

The Domain Name Service (or DNS) is the key to the presence of your server on the internet. You are probably aware your domain has an “IP” address, which stands for Internet Protocol; that number is your domain’s literal web address on the internet. A typical IP address is a series of four numbers called octets that are identified like so: 10.10.10.10.  You can think of your IP address as being similar to a postal address. The IP address is the exact location where your domain lives. I usually explain it like this;

Continue reading →
Reading Time: 6 minutes

This tutorial describes the process of setting up SSH Keys for use when logging in to a remote server via SSH.

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434