How to Turn Off Spam Filtering in Yahoo Email - Yahoo is a great email service. One of the problems with Yahoo Mail is that a lot of your incoming messages end up going to your spam folder. I know that Yahoo has very stringent email filters but this can become very annoying. In order to keep your email out of your spam folder all you really have to do is to create a "filter" to route all messages with an "@" symbol (which is all email) to re-route to your inbox.
This blog will show your how to use Dig / NSLookup to check for SPF / DKIM / DMARC and MX Records.
How to Check your Server for the Java Log4j Vulnerability (CVE-2021-44228). The Apache Log4j is a serious vulnerability. If someone sends the library a command in the form of a special string of characters tucked within that data, instead of just logging that information, log4j will execute it as though it is code in a program. This is a serious flaw and you need to check to see if your server(s) are vulnerable.
Managing your DNS, DKIM, SPF, and DMARC records can be a daunting task, especially if you are looking for an error in your configuration that can effect the flow of Email for your Domain. Today I am going to walk through each of these settings and take a look at some of the common errors, that can be overlooked very easily.
I must have heard this a million times! I cannot print! This video and blog article will show you to to fix a few of the most common solutions to one of the most common tech support questions. Finding the Printer! Two of the most common problems are that, (1) your printer is set for DHCP and uses a dynamic IP address, and (2) your printer is set to use WIFI rather than a hardwire ethernet cable.
TrueNAS (formerly FreeNAS) and XigmaNAS are great NAS servers for your Home and/or Office environment. One of the problems is that both of these NAS Servers recommend you to use a USB key to boot and then configure your drives as storage only in whatever RAID or Non-RAID configuration you wish. What if the USB boot device fails? It would be nice if you could make a copy of the USB bootable device, and to do so automatically rather than making them manually. You can! Thanks to the script we have developed using the dd command.
Today we see more and more websites being compromised, therefore it is vital that you do some sort of Security Audit to see if your Website or Webserver is vulnerable to hackers. There are two routes you can take depending on your budget. You can pay a professional firm to do the audit or you can do a basic security check yourself using FREE tools that are readily available on the Internet.
Today more and more websites are getting compromised and vital important data is being exposed to hackers. Most of this is due to misconfiguration or lack of protection from the hosting company or a web designer that just wants to make the site work. If you are a website owner ensure that your webdesigner and server administrator protects your website from Clickjacking, code injection, MIME types, XSS (cross-site scripting), etc.
Securing your Website or Webserver is very important. If you are using Cloudflare to speed up and protect your network from Bot's, DDoS attacks, along with protecting certain area's of your site such as an admin or protected area, you may be well aware that Hackers can bypass cloudflare by obtaining the real IP of your server or website. You can essentially block all traffic from the Internet and allow only Cloudflares NetBlock's. This Blog post will show you how to do exactly that.
If you are a Web Developer you know that Cloudflare's Cache can be very annoying. Did you know your can modify your hosts file so that you can bypass networks such as Cloudflare, Fastly or Akamai? This is helpful if you wish to bypass some DNS settings such as bypassing Cloudflare to work directly on your webserver or website. Another thing you can do is give static IP's to devices on your network that never change, such as routers, switches, printers and NAS (network attached storage) devices.