On our hosting platform, SSL certificates are issued automatically when the domain is attached as well as renewed automatically before the expiration period (free certificates are issued for 3 months and our system makes sureContinue reading
Category: Security
How to install an EV certificate?
Currently, web hosts are increasingly offering SSL certificates as standard completely free of charge. These are usually Let’s Encrypt or Comodo branded certificates. These are fully, properly functioning certificates, recognized as trusted by 99+% ofContinue reading
DNSSEC – technical aspects of additional security for your domain.
The way the internet works closely depends on the DNS (Domain Name System). When you type in a domain name in your browser, such as smarthost.eu, or send an email, you don’t usually think aboutContinue reading
Generating DNSSEC keys in cPanel
Having a domain delegated to our DNS servers, the keys can be generated in the cPanel hosting panel. The keys should be configured according to the parameters that are supported by the domain registrar. HowContinue reading
How to detect email sender spoofing?
Recently, the most common way to steal data and infect computers is by sending emails with malicious content. These emails appear very serious, seemingly from a “legitimate” sender that the recipient recognizes. The emails areContinue reading
Fake e-mails from hackers and other dangerous messages.
For a long time, despite the use of various spam filters, suspicious messages from blackmailers can occasionally be observed in email inboxes. They claim to have allegedly hacked the email account’s passwords or taken controlContinue reading
How to Restrict Access to a File/Folder with Authentication
Sometimes, to prevent unauthorized access to a folder or file, it is necessary to add an authorization lock where access to the resource will only be granted after entering the correct username and password. SecuringContinue reading
RoundCube – Webmail in Your Browser
Access to email can be obtained in two ways. One way is by using an email client (e.g., Thunderbird, Outlook). The other way is to use Webmail, which is an email client accessed through aContinue reading
Site infection – first remedial steps
Sometimes, when a website is not updated or plugins are used that are not up to date, the website may become infected unexpectedly through a vulnerability in one of the modules and malicious code mayContinue reading
SPF and DKIM – spam protection
There are various methods to protect against spam and phishing, among which SPF and DKIM are the most popular. What exactly are these mechanisms? You’ll find out in the following post. Before we start describingContinue reading