Tag: Common Questions
These are the questions asked most often by our clients. They deal with everyday thoughts, ideas, issues, and concerns.
How to Stop Outgoing Email Spam
Introduction

The most effective method to protect a server from sending spam is to prevent it in the first place. In this article, we provide several techniques to use to keep the server from sending out unwanted spam or junk mail. Typically, unwanted, and unsolicited spam email is usually bulk sent out to an indiscriminate list of recipients. Spam is often used for commercial purposes but can be sent out in massive volume by a botnet or a network of infected computers.
How to Locate Open Ports in Linux
How to Set up and Configure tmpmail
What is Tmpmail?
Tmpmail is a utility written in bash that allows a user to create and use a temporary email address for receiving emails from the command-line. Underneath the covers, the bash script uses 1secmail’s API to receive the emails. By default, email addresses are created at random unless a specific email address follows the --generate flag.
A Beginners Guide to Email Protocols: SMTP, POP3, and IMAP
What is SMTP?

When you send an email, your email client and multiple servers on the internet use the Simple Mail Transport Protocol or SMTP to move that message around the internet and ultimately into the recipient’s mailbox.
How to Implement Zero Trust Security in 5 Steps
Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.
How Was My Website Compromised?
In this tutorial, we will look at several methods that are used to compromise a website. In today's world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business.
How to Manage Your Hosting Packages in WHM
This article will teach you how to create, modify and delete hosting package presets within WHM. While you can configure each option individually when setting up an account on your VPS server or Dedicated server, you may find yourself using the same handful of overall settings for a lot of your sites. By creating hosting packages you able to define preset packages with varying resources, making account creation that much quicker.
DNS: An Overview
What is DNS?
The Domain Name Service (or DNS) is the key to the presence of your server on the internet. You are probably aware your domain has an “IP” address, which stands for Internet Protocol; that number is your domain’s literal web address on the internet. A typical IP address is a series of four numbers called octets that are identified like so: 10.10.10.10. You can think of your IP address as being similar to a postal address. The IP address is the exact location where your domain lives. I usually explain it like this;
How to Set Up SSH Keys
This tutorial describes the process of setting up SSH Keys for use when logging in to a remote server via SSH.
How To Enable Server Backups in WHM/cPanel
One of the most important things you can do to protect your server against data loss is regular backups. Properly configured backups are a critical aspect of the maintenance of any website and can mean the difference between a quick recovery and rebuilding a site from scratch.
Our Sales and Support teams are available 24 hours by phone or e-mail to assist.