Smartermail vs. Mailenable – What does it hold for you?

Smartermail vs. Mailenable

With communication being essential in today’s day and age, choosing the right email server is vital. When it comes to the best servers like Smartermail and Mailenable, we strive to deeply evaluate features in order to see which is the most exclusive, down to the tee.

SmarterMail, an award-winning service, is currently benefiting small businesses and large corporate organizations with the most flexible and reliable email server available, giving administrators and users more control over the accounts.

read more

Posted in Dedicated Website Hosting | Tagged , | Comments Off on Smartermail vs. Mailenable – What does it hold for you?

Common Issues with Website Migration

Website Migration

When migrating a website from a previous provider, it is important to test out the site while in development to ensure a smooth transition. If a website is incorrectly migrated, you can run the risk of losing not only functionality but also traffic and search visibility. Common issues that can persist following the move of all data, databases and emails are:

  1. Contact/Enquiry Forms – Commonly, these forms use customized parameters and components that most likely won’t exist within your new server. Furthermore, mail scripts can present a problem by specifying an SMTP mail server that is not compatible with the new host.
  2. PHP and Module Version Differences – Identify the prerequisites of your site by using a simple PHP info script. You can then deploy a system that will be qualified to run your existing service.
  3. Permissions – All custom permissions must be present to ensure no loss of functionality during an FTP migration. Plesk migrations can be used to guarantee all permissions and setting are transferred. Free migration services are offered by certain providers.

Following a sound migration process will give you the best chance at identifying issues quickly to relieve a lot of pressure and frustration.

read more

Posted in Web Hosting | Tagged , | Comments Off on Common Issues with Website Migration

Tips to Evade Spamming

Online security tips to avoid spamming

Email spamming is an ever present issue that can cost you or your business time and money. It is surprisingly easy for email addresses and computers to be hijacked for spamming purposes. Here are steps you can take to increase security and ensure you stay off the blacklist.

  1. Make sure your computer is free of viruses. Many free anti-virus programs are on the market. Find one, make sure it is updated and scan your computer.
  2. Starting fresh is important if you believe your computer or accounts have been compromised. Reset your passwords – this includes email passwords.
  3. Use strong passwords as preventative measures. Strong passwords usually contain a combination of the following: Uppercase and lowercase letters, numbers, and punctuation.
  4. Don’t store passwords. This includes storing on your browser, FTP client or email client.
  5. Keep your passwords secret. Passwords are important and should not be shared with anyone.
  6. Test your computer for keystroke loggers or spyware to ensure passwords stay secret.
  7. Third party applications and plugins that aren’t updated are vulnerable to penetration
  8. Protect servers and websites by regularly scanning with maldet (linux) or clamwin (windows).

read more

Posted in Web Hosting | Tagged , , | Comments Off on Tips to Evade Spamming

Dirty Cow Vulnerability – Check How Dirty It Is?

dirty-cow-vulnerabilityDirty cow vulnerability mainly affects major Linux Operating Systems. Below is the impact of this vulnerability –

Existing since nine years, the Dirty Cow vulnerability is found in Linux kernel and is privilege escalation vulnerability.  A security expert Phil Oester found this vulnerability that can be present in about every available Linux distribution.

A race condition was found in the way the memory subsystem of Linux kernel handled the copy-on-write (COW) breakage of private read-only-memory mappings. This flaw can be misused by an unprivileged local user to gain write access to other read-only memory mappings and further increase their privileges on the system.

read more

Posted in Dedicated Website Hosting | Comments Off on Dirty Cow Vulnerability – Check How Dirty It Is?

It’s Time to Update Your Server

update-server

You might be getting for software updates several times. Though knowing it’s important, you might be ignoring it always.

Surely there are reasons behind ignorance – “Sending an email to the client is important right now”; “It’s my presentation day today so I need to finish the presentation”; “What if something breaks?”

But, when something goes wrong with your software, you hear the nagging voice at the back of our head saying we made a bad decision.

You need to hear it clearly that software updates can’t wait – significantly when it comes to your servers or business systems. Software updates contain critical bug fixes which if left unpatched; your system is a fish in the barrel for the hackers.

read more

Posted in Web Hosting | Tagged , | Comments Off on It’s Time to Update Your Server

How to Change the Listening Port for Remote Desktop?

changing-listening-port-for-remote-desktop

Remote Desktop features in Microsoft Windows XP Professional can be used to connect to your computer from another remote computer.

Here’s an article on steps to change the port that Remote Desktop listens on.

Note: The Remote Desktop Connection Client for the Mac is supportive to only port 3389 which is the default port.

Warning: If the listening port is changed, the Remote Assistance feature in Microsoft Windows XP may not work correctly.

To change the port that Remote Desktop listens on, follow the below steps –

read more

Posted in Dedicated Website Hosting | Tagged , | Comments Off on How to Change the Listening Port for Remote Desktop?

Unique and Shared IP addresses-What You Need to Know

Unique and Shared IP Address

Whenever you type a website address into your browser, the address (say for example the web address: (www.domainnamehere.com) is translated into a set of numbers, known as an “IP address” (the IP stands for internet protocol). So whenever you type a domain name into your browser your computer is actually directed to the IP address that the domain name is associated with.

Every site on the internet has an IP address, and every site can be reached by typing in its IP address, with some exceptions. Some websites on the internet will be hosted on the same server, which means they will have the same IP address. So for example, two websites like www.hisname.com and www.hername.com may be hosted on the same server; in which case a person looking for one of these sites will be routed to the appropriate site by the server. In cases like this, where more than one site uses the same IP, the IP address will be known as a “Shared IP address”. If a website has its own unique IP address that no one else uses, then that IP address will be known as a “unique IP address.”

read more

Posted in Web Hosting | Tagged , , | Comments Off on Unique and Shared IP addresses-What You Need to Know

SSL Errors, What Are They and What Do They Mean?

SSL Certificate

When browsing the internet you may have gotten the occasional popup informing you that the site you want to browse has a security certificate that is not trustworthy; other variants may include: “the security certificate presented by this site is not trusted” or “the security certificate used by this site was not issued by a trusted certificate authority.” These are known as SSL errors (Secure Socket Layer errors). The message you get informing you of the SSL error will vary depending on the browser you are using.

read more

Posted in Web Hosting | Tagged , , | Comments Off on SSL Errors, What Are They and What Do They Mean?

How to secure DNS server?

dns-security-best-practices-oMost internet applications run on the basis of DNS then it may be emails, website browsing, messengers, etc. But very few detect the presence of this extensively used service. And this is the reason why the vulnerabilities in DNS service are ignored by server administrators resulting in easy exploitation by hackers.

Usually, securing a server involves server software plus application software security, file system security, physical and network security.

Below are steps to secure your DNS server –

read more

Posted in Web Hosting | Tagged , | Comments Off on How to secure DNS server?

Want to Block an IP Address? Here a Solution…

ip-blocking-steps

You might sometimes need to block a specific IP address from accessing your server for several reasons. Follow the simple instructions below which include creating an IPSec Security Policy specifying to block access to specific IP address –

Step 1 – Hover your mouse to Start Menu and click on Run.

Step 2 – Type “secpol.msc” in the run window and click OK.

Step 3 – The Local Security Settings window will open. Click on “IP Security Policies on Local Computer”.

Step 4 – Go to the right window pane, right-click and select “Create IP Security Policy”.

read more

Posted in FAQs, Web Hosting | Tagged , | Comments Off on Want to Block an IP Address? Here a Solution…