Tag: Ports

Reading Time: 6 minutes

Managing your network traffic is essential in securing any device that handles your workloads. One of the primary tools in doing so is a firewall. The Windows operating system (OS) comes prepackaged with the Windows Defender Firewall to assist with this task.

Continue reading →
Reading Time: 10 minutes

In part one of How to Troubleshoot SMTP Errors, we reviewed email status codes, internal reasons for email issues, and troubleshooting steps to address those issues. In part two of this series, we will examine some of the external reasons for email issues. 

Continue reading →
Reading Time: 8 minutes

What is SMTP?

The Simple Mail Transfer Protocol (SMTP) is a communication protocol used to transmit email between corresponding email servers. Using an email client like Mac Mail, Outlook, Thunderbird, or web clients like Gmail or Windows Live, SMTP can send messages to an email server. Although SMTP was initially designed as an email transport and delivery system, it later encompassed the email submission protocols that are now in use by both the Post Office Protocol (POP) and the Internet Message Access Protocol (IMAP). The above-noted email clients use these protocols to retrieve email from an email server. When this system fails, it provides the means to identify and resolve SMTP errors.

Continue reading →
Reading Time: 7 minutes

Introduction

firewall2-image

Just as regular visitors reach our server every day, so do others with more nefarious intentions. It is simply not reasonable to run an online service without some layer of protection. To protect against some of these attacks, Ubuntu ships with ufw (Uncomplicated Firewall). This is a tool designed to make Ubuntu firewall management as easy and user-friendly as possible. Specifically, ufw provides a cleaner interface for the core firewall tools netfilter and iptables, which, while robust, can be challenging to master.

Continue reading →
Reading Time: 13 minutes

What is ClickHouse?

clickhouse.logo

ClickHouse is an open-source column-oriented DBMS (or database management system) primarily used for OLAP (or the Online Analytical Processing of queries). It is capable of blazing fast generation of real-time analytical data and reporting utilizing SQL queries. It is fault tolerant, scalable, highly reliable and contains a feature rich tool set.

Continue reading →
Reading Time: 6 minutes

What is Thunderbird?

Thunderbird

Thunderbird is one of the most widely used open-source email clients in the world. Mozilla originally developed the software in 2004, but the project waned in 2014/15, and Mozilla stated that they would only deliver security and maintenance updates in the future. Until recently, the community maintained the software when a Mozilla Foundation subsidiary, MZLA Technologies Corporation, took over. Today, the improvements in security and stability are very much appreciated, and since version 78, Thunderbird has built-in OpenPGP encryption technology enabled by default. Earlier versions used the available PGP technology, but it needed to be installed as a supplemental plugin. 

Continue reading →
Reading Time: 6 minutes

What is Tmpmail?

Tmpmail is a utility written in bash that allows a user to create and use a temporary email address for receiving emails from the command-line. Underneath the covers, the bash script uses 1secmail’s API to receive the emails. By default, email addresses are created at random unless a specific email address follows the --generate flag.

Continue reading →
Reading Time: 5 minutes

What is SMTP?

Email with arrow

When you send an email, your email client and multiple servers on the internet use the Simple Mail Transport Protocol or SMTP to move that message around the internet and ultimately into the recipient’s mailbox.

Continue reading →
Reading Time: 5 minutes

Remote Desktop Protocol (RDP) is the easiest and most common method for managing a Windows server. Included in all versions of Windows server and has a built-in client on all Windows desktops. There are also free applications available for Macintosh and Linux based desktops. Unfortunately, because it is so widely used, RDP is also the target of a large number of brute force attacks on the server. Malicious users will use compromised computers to attempt to connect to your server using RDP. Even if the attack is unsuccessful in guessing your administrator password, just the flood of attempted connections can cause instability and other performance issues on your server. Fortunately, there are some approaches you can use to minimize your exposure to these types of attacks.

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434