DOMAIN ADMIN TOOLS BLOG

Tips and tutorials for webmasters and domain administrators

What is Phishing?

What is Phishing?

Phishing is a cybercrime in which a target or targets are contacted by email, telephone or text message by someone posing as a legitimate institution to lure individuals into providing sensitive and personal data such as banking, credit card details, and...

Easydmarc vs Dmarcly

Easydmarc vs Dmarcly

There are a bucketload of dmarc monitoring and management services out there to choose from, ranging from free to stupidly expensive. This time round we are going to take a look at Easydmarc vs Dmarcly. If you don't know what Dmarc is all about, please take a look at...

What is DKIM?

What is DKIM?

DKIM stands for DomainKeys Identified Mail and is used for the authentication of an email that’s being sent. Like SPF, DKIM is an open standard for email authentication that is used for DMARC alignment. A DKIM record exists in the DNS, but it is a...

What is DMARC and how does it work?

What is DMARC and how does it work?

Domain-based Message Authentication Reporting and Conformance (DMARC) is a free and open technical specification that is used to authenticate an email by aligning SPF and DKIM mechanisms. By having DMARC in place, business owners large and small can fight the massive...

What is SPF (Sender Policy Framework)

What is SPF (Sender Policy Framework)

Sender Policy Framework (SPF) is used to authenticate the sender of an email. With an SPF record in place, Internet Service Providers can verify that a mail server is authorized to send email for a specific domain. An SPF record is a DNS TXT record...

7 Important HTTP Security Headers for Your Website

7 Important HTTP Security Headers for Your Website

When it comes to website security, most people are quite oblivious to the vulnerabilities that exist and are exposed on their own site. Securing your website is all about minimizing attack surface and adding more layers of security. One strong layer that you can (and...

5 Citrix ShareFile Alternatives for Safer File Transfers

5 Citrix ShareFile Alternatives for Safer File Transfers

Many people today are seeking ways to simply, quickly, and safely get files from one place to another. The ability to share files easily through file sharing, file transfer, and other means of file communication helps mobilize business data for optimization. Using...

14 Top CMS Platforms in 2021

14 Top CMS Platforms in 2021

Are you struggling to decide what CMS platform to use for building your new website? A CMS (Content Management System) platform lets you easily create and managed a website without understanding any code (at least for most of them). There are lots of CMS options...

What Is a Hostname?

What Is a Hostname?

A hostname is a label assigned to a device (a host) on a network. It distinguishes one device from another on a specific network or over the internet. The hostname for a computer on a home network may be something like new...

What is a DNS Cache and How Does It Work

What is a DNS Cache and How Does It Work

A DNS cache (sometimes called a DNS resolver cache) is a temporary database, maintained by a computer's operating system, that contains records of all the recent visits and attempted visits to websites and other internet domains. In other words, a DNS cache...

Best Free Public DNS Servers

Best Free Public DNS Servers

The best free public DNS servers include Google, Quad9, OpenDNS, Cloudflare, CleanBrowsing, Alternate DNS, and AdGuard DNS. Here's a quick reference if you know what you're doing, but we get into these services a lot more later in this article: Best Free & Public...

The Ultimate Guide to Active Directory Best Practices

The Ultimate Guide to Active Directory Best Practices

Security Groups, User Accounts, and Other AD Basics At many enterprises and SMBs that use Windows devices, IT teams are likely to use Active Directory (AD). Essentially, Active Directory is an integral part of the operating system’s architecture, allowing IT more...

is Email Secure?

is Email Secure?

Yes and No. Email is a highly valuable tool that has evolved to be more secure, but there are still ways to exploit email for nefarious purposes. Email users should be careful with how they use email and the emails they respond to. Let’s look at email security in more...

19 Best Free Live Chat Software

19 Best Free Live Chat Software

Live chat is big right now – and the numbers behind its adoption prove why. Recent research from Kayako, which surveyed more than 400 consumers and 100 businesses, found that: Consumers are more likely to remain loyal, engage in positive word of mouth, and...

How to keep your domain secure

How to keep your domain secure

The short guide to domain security Keep all of your web accounts secure with hard-to-guess passwords. Add 2-step authentication where possible and never give out your domain account information to anyone.Employ anti-virus and spyware measures to prevent keylogging...

7 Great Disaster Recovery Solutions

7 Great Disaster Recovery Solutions

Organizations can face disruption due to unexpected events: human-made and natural disasters, cyberattacks, or unexpected system failures. It is imperative to strategize and implement disaster recovery before disaster can impact operations and lead to significant...

What is the biggest threat to cybersecurity?

What is the biggest threat to cybersecurity?

What is the biggest threat to cybersecurity or IT infrastructure right now? According to one of Canada’s premier cybersecurity experts, if you answered malware or ransomware or crypto, you’d be wrong. According to Calgary-based cybersecurity leader Sonya Goulet,...

What Is DNS? | How DNS Works

What Is DNS? | How DNS Works

What is DNS? The Domain Name System (DNS) is the phonebook of the Internet. Humans access information online through domain names, like nytimes.com or espn.com. Web browsers interact through Internet Protocol (IP) addresses. DNS translates domain names to IP...

Pin It on Pinterest

Share This