Join rackAID's Facebook community for exclusive chances to win amazing prizes including electronics, premium chocolates, free security software, branded merchandise, pizza deliveries, and cold hard cash. Fans get first dibs on all giveaways.
Technical Services Archive
February 18, 2010 Jeff Huckaby
3 min read
Florida branding firm BoldWater selects rackAID's managed hosting to power 100+ client websites. The partnership combines BoldWater's marine industry design expertise with rackAID's scalable cloud infrastructure and content delivery solutions.
Technical Services Archive
February 16, 2010 Jeff Huckaby
3 min read
Web hosting isn't like a Ronco rotisserie—you can't just set it and forget it. Successful websites require constant monitoring, proper tools, and smart outsourcing. Without vigilance, you risk burning your business.
Technical Services Archive
February 8, 2010 Jeff Huckaby
1 min read
A SpamAssassin bug incorrectly flags 2010 emails as spam by adding 3.2 points to their score. Fix it by running sa-update to download current rules, and consider enabling automatic updates on Plesk servers.
Technical Services Archive
February 5, 2010 Jeff Huckaby
3 min read
When a Plesk migration stalled due to insufficient IP addresses, adding temporary non-routed IPs solved the problem. Understanding your environment's theory and focusing on end goals helps sysadmins overcome obstacles and keep projects on schedule.
Technical Services Archive
February 4, 2010 Jeff Huckaby
3 min read
High server uptime isn't always success—it may signal outdated kernels and unpatched vulnerabilities. Regular reboots ensure security updates take effect, file systems stay healthy, and backups remain uncorrupted. Reboot as needed for optimal security.
Technical Services Archive
January 29, 2010 Jeff Huckaby
3 min read
Optimize your Plesk email service with seven simple configuration tweaks. Learn to limit message sizes, enforce strong passwords, configure SMTP authentication, manage antivirus settings, and implement spam blacklists for better security and performance.
Technical Services Archive
January 29, 2010 Jeff Huckaby
5 min read
SSH brute force attacks are surging. Secure your server by restricting user access, implementing firewall rules, disabling password authentication, using TCP wrappers, and increasing key strength for robust protection.
Technical Services Archive
January 28, 2010 Jeff Huckaby
2 min read
SSH brute force attacks are increasing. Protect your server by using strong passwords, disabling SSH Protocol 1, restricting root login, and reducing grace time. These simple hardening measures significantly improve SSH security.
Technical Services Archive
January 27, 2010 Jeff Huckaby
6 min read
Protect your server from SSH brute force attacks using IPTables rate-limiting rules. This simple solution blocks excessive connection attempts without additional software, maintaining service availability while deterring automated password-guessing bots effectively.