25th Anniversary Savings | 25% Off Dedicated Servers*Shop Now
25th Anniversary Savings | 25% Off VPS Hosting* †††Shop Now
Limited Inventory: High-Performance AMD-Powered Servers Now Available.* Shop Now >
Dedicated Hosting Deals | From $99/moShop Now

Tag: SMTP

The Simple Mail Transfer Protocol (SMTP) allows for mail to travel from one user to another, but as we know, delivery problems can sometimes arise.  Check out our many articles from subjects on how to configure an email client to how to implement email DNS records.

Reading Time: 13 minutes

Email is a crucial component of our online lives. Almost everything we do online requires an email address, including creating login credentials, signing up for newsletters, and leaving website comments. There's a good chance you've already encountered spam if you have an email address.

Continue reading →
Reading Time: 10 minutes

In part one of How to Troubleshoot SMTP Errors, we reviewed email status codes, internal reasons for email issues, and troubleshooting steps to address those issues. In part two of this series, we will examine some of the external reasons for email issues. 

Continue reading →
Reading Time: 8 minutes

What is SMTP?

The Simple Mail Transfer Protocol (SMTP) is a communication protocol used to transmit email between corresponding email servers. Using an email client like Mac Mail, Outlook, Thunderbird, or web clients like Gmail or Windows Live, SMTP can send messages to an email server. Although SMTP was initially designed as an email transport and delivery system, it later encompassed the email submission protocols that are now in use by both the Post Office Protocol (POP) and the Internet Message Access Protocol (IMAP). The above-noted email clients use these protocols to retrieve email from an email server. When this system fails, it provides the means to identify and resolve SMTP errors.

Continue reading →
Reading Time: 9 minutes

Introduction

stop spam emails

The most effective method to protect a server from sending spam is to prevent it in the first place. In this article, we provide several techniques to use to keep the server from sending out unwanted spam or junk mail. Typically, unwanted, and unsolicited spam email is usually bulk sent out to an indiscriminate list of recipients. Spam is often used for commercial purposes but can be sent out in massive volume by a botnet or a network of infected computers.

Continue reading →
Reading Time: 6 minutes

What is Thunderbird?

Thunderbird

Thunderbird is one of the most widely used open-source email clients in the world. Mozilla originally developed the software in 2004, but the project waned in 2014/15, and Mozilla stated that they would only deliver security and maintenance updates in the future. Until recently, the community maintained the software when a Mozilla Foundation subsidiary, MZLA Technologies Corporation, took over. Today, the improvements in security and stability are very much appreciated, and since version 78, Thunderbird has built-in OpenPGP encryption technology enabled by default. Earlier versions used the available PGP technology, but it needed to be installed as a supplemental plugin. 

Continue reading →
Reading Time: 6 minutes

What is Tmpmail?

Tmpmail is a utility written in bash that allows a user to create and use a temporary email address for receiving emails from the command-line. Underneath the covers, the bash script uses 1secmail’s API to receive the emails. By default, email addresses are created at random unless a specific email address follows the --generate flag.

Continue reading →
Reading Time: 5 minutes

What is SMTP?

Email with arrow

When you send an email, your email client and multiple servers on the internet use the Simple Mail Transport Protocol or SMTP to move that message around the internet and ultimately into the recipient’s mailbox.

Continue reading →
Reading Time: 13 minutes

Introduction

nmap-logo

In this article, we will review the Nmap software program and multiple commands. Nmap is an open-source mainstream tool used by network administrators to scan ports and map networks. Nmap commands are primarily used to identify which ports certain software is running on our system. It is also used to discover available hosts and what services they are offering and detecting potential security risks. Using Nmap, you can check a single host or a complete network. In this tutorial, we will cover several basic as well as advanced Nmap commands in the “Pro Tips and Tricks” section of the article.

Continue reading →

Gmail Blacklist

Posted on by Joe Reblin | Updated:
Reading Time: 4 minutes

What is the Gmail Blacklist?

As one of the most trusted email providers, Google keeps top-notch security by maintaining their own blacklist and security information. With the numerous users the company provides email accounts to, there is an overwhelming amount of data that Google can scrutinize for spam or malicious emails. By gathering this valuable information, rules are created to filter problem content. These rules are highly sophisticated, and as this data is compiled, specific IP addresses are flagged and sorted into what is called a blacklist.

Continue reading →
Reading Time: 3 minutes

Pre-Flight Check

  • These instructions are intended specifically for setting up an email account in Mozilla Thunderbird 38.3.0 on Mac OS X 10.11.1.
  • While the steps should be similar across platforms and operating systems, they may not necessarily apply to older versions of Thunderbird.
  • For help with general email account settings, see How to Set up Any Email Client.

You can edit an email account that already has been configured in Thunderbird, for example should you decide to switch between non-SSL and SSL settings or change the server’s connection port. You change the connection type between standard (non-SSL) and secure (SSL) by changing the hostname and port for the incoming and outgoing servers.

Continue reading →
← Older posts
Have Some Questions?

Our Sales and Support teams are available 24 hours by phone or e-mail to assist.

1.800.580.4985
1.517.322.0434