In most cases, the rDNS setup will be done by the Data Center (DC) technicians. But in case if the DC delegates it to a support team like us, you have 2 choices – to leave it in the hands of server management expert like us or to do it on your own and in which case, this blog post might come handy. Come let’s see what it takes for you to setup the rDNS by yourself.
Purpose of Reverse DNS (rDNS/PTR)
As the main purpose of the Domain Name System (DNS) is to point domains to IP addresses, PTR record also known
In a web hosting environment, running a FTP server is an essential function and it give client access to file servers. In this blog post lets look at how to install and configure ProFTPD on a Linux server.
The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of files between a client and server on a computer network. FTP is built on a client-server architecture and uses separate control and data connections between the client and the server. The FTP functions are used to open, login and close connections, as well as upload, download, rename,
The Data Protection Directive regulated and safeguarded the movement of information around and outside EU since 1995. However, the active involvement of today’s population on the internet has caused an increase in cybercrimes giving rise to the need for stricter laws and standards, which is the reason for The General Data Protection Regulation (GDPR) which will replace the Data Protection Directive when it becomes enforceable from 25 May 2018.
Since its announcement, companies operating within EU, or having customers in EU, have been jittery sorting out the impact of the GDPR. ACTSupport has kept a keen eye on the development of the GDPR, restructuring
Security is a basic requirement of the server. We will use SSLLabs, a testing project of Qualys, a company that provides strategic security solutions. In this post, we will see how to use their A+ indicator which is the industry high standard in SSL security and try to meet its requirements. The SSLLabs checker covers two substantial parts of the investigation: Authentication, which reflects details about installed SSL certificate and additional certificates provided by a server, and Configuration, which shows server settings for secure negotiation used in client-server interaction.
This blog will cover the steps to get your A+ rating on
Consider for a moment there was a way to know exactly how many visitors are live on your website, which region they belong to, and then having the option to contact them even before they do. This simple visitor interaction could create innumerable conversions, boosting your business exponentially. This is exactly what a live chat does: Gives you live analytics of traffic and the option for you to connect with a visitor or vice versa. Here are 6 live chat applications you can start using today!
Developed by LiveChat Software in 2002, LiveChat is one of the top choices when it comes
Git Clone Over Http Returns 500 errors
When you clone, push and pull changes between Gitlab repositories and your computer there are two network protocols, one is HTTPS and the other one is SSH.. If Gitlab uses Apache instead of built-in Nginx server and if you are able to clone over SSH but not over http, have to check Apache related configurations. Here we are going to see some solutions to fix 500 errors.
HTTP status code 500 usually indicates that there is an issue with the remote end and not a problem on your client side.
Email is today’s number one mode of communication, and with the rise in mail flow across the globe, email providers are constantly tightening security. The ‘spam filter’ is one such security measure.
Even with all the tweaks, however, it very often happens that a genuine email ends up in a recipients spam folder. There are some measures you as a sender can take to ensure your important email always ends up in the recipient’s inbox.
Tip 1: What you Say Matters Every spam filter scans the email body looking for trigger words. Filters are tuned to flag promotional emails by looking for words
As the mansion gets Bigger, the number of windows for thieves to break in through, goes higher.
This is exactly the case with the internet today. There has been a surge in the number of web languages, content management platforms and online applications, all for the benefit of you and me of course. But the inadvertent drawback of this expansion is that there are now more vulnerabilities and options for hackers to exploit than ever before.
As a server admin, you can utilize numerous tools that are available to safeguard servers. Anti-virus and anti-phishing software, secure connections, hashed passwords etc. However,
Outsourcing your web hosting support service is always the best option. There are a number of reasons, which we have discussed here: Why outsource? When you begin your search for the best outsourced support service, you will quickly realize that the number of options is high. Many support companies, however, belong to the lower tier in terms of quality, but there are simple ways for you to differentiate between low quality and high-class outsourced support services. You are obviously going to look for an outsourced support company that provides a high number of great features and is also cost efficient. Here
Every business arrives at the critical juncture of establishing a customer support team sooner or later. You might be a product based company or a service provider, if you have a customer, you need customer support. This need becomes even more critical when your business deals with web hosting, because with the internet, it is all about uptime.
Then follows the important question “should we hire professionals and host the support team in-house, or outsource our hosting support needs?” Here are a couple of reasons why outsourcing is the better option:
Customer support is a critical component in any business. It is
Page 1 of 1612345...10...»Last »