Tag: Common Questions

These are the questions asked most often by our clients. They deal with everyday thoughts, ideas, issues, and concerns.

Reading Time: 8 minutes

What is SMTP?

The Simple Mail Transfer Protocol (SMTP) is a communication protocol used to transmit email between corresponding email servers. Using an email client like Mac Mail, Outlook, Thunderbird, or web clients like Gmail or Windows Live, SMTP can send messages to an email server. Although SMTP was initially designed as an email transport and delivery system, it later encompassed the email submission protocols that are now in use by both the Post Office Protocol (POP) and the Internet Message Access Protocol (IMAP). The above-noted email clients use these protocols to retrieve email from an email server. When this system fails, it provides the means to identify and resolve SMTP errors.

Continue reading →
Reading Time: 9 minutes

Introduction

stop spam emails

The most effective method to protect a server from sending spam is to prevent it in the first place. In this article, we provide several techniques to use to keep the server from sending out unwanted spam or junk mail. Typically, unwanted, and unsolicited spam email is usually bulk sent out to an indiscriminate list of recipients. Spam is often used for commercial purposes but can be sent out in massive volume by a botnet or a network of infected computers.

Continue reading →
Reading Time: 6 minutes

What is Tmpmail?

Tmpmail is a utility written in bash that allows a user to create and use a temporary email address for receiving emails from the command-line. Underneath the covers, the bash script uses 1secmail’s API to receive the emails. By default, email addresses are created at random unless a specific email address follows the --generate flag.

Continue reading →
Reading Time: 5 minutes

What is SMTP?

Email with arrow

When you send an email, your email client and multiple servers on the internet use the Simple Mail Transport Protocol or SMTP to move that message around the internet and ultimately into the recipient’s mailbox.

Continue reading →
Reading Time: 6 minutes

Zero Trust security is the concept, methodology, and threat model that assumes no user, system, or service operating within a secured internal environment should be automatically trusted. It put forward that every interaction must be verified when trying to connect to a system before being granted access. This concept uses micro-segmentation, and granular edge controls based on user rights, application access levels, service usage, and relation to the location to determine whether to trust a user, machine, or application seeking to access a specific part of an organization.

Continue reading →
Reading Time: 8 minutes

In this tutorial, we will look at several methods that are used to compromise a website. In today's world, websites use multiple procedures that represent the core functions of a modern business. Whether you have an eCommerce site or a business card site, a website is essential for driving business growth. We can safely state that a website is a unique image of your respective business. 

Continue reading →
Reading Time: 3 minutes

This article will teach you how to create, modify and delete hosting package presets within WHM. While you can configure each option individually when setting up an account on your VPS server or Dedicated server, you may find yourself using the same handful of overall settings for a lot of your sites. By creating hosting packages you able to define preset packages with varying resources, making account creation that much quicker.

Continue reading →
Reading Time: 3 minutes

What is DNS?

The Domain Name Service (or DNS) is the key to the presence of your server on the internet. You are probably aware your domain has an “IP” address, which stands for Internet Protocol; that number is your domain’s literal web address on the internet. A typical IP address is a series of four numbers called octets that are identified like so: 10.10.10.10.  You can think of your IP address as being similar to a postal address. The IP address is the exact location where your domain lives. I usually explain it like this;

Continue reading →
Reading Time: 6 minutes

This tutorial describes the process of setting up SSH Keys for use when logging in to a remote server via SSH.

Continue reading →
← Older postsNewer posts →
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434