How to create a DMARC record

What is a DMARC record? DMARC stands for Domain-based Message Authentication Reporting and Conformance. A DMARC record tells email servers/receivers what the domain owner’s policy is regarding non-compliant email. For example, if your email is missing an SPF record or a DKIM record, should they allow it through, quarantine it or reject it. This is […]

Cloud Platform Release v19.6.0

Today we released minor version 19.6.0 of our cloud platform. This release includes a few bug fixes, back-end improvements plus a couple new features and enhancements: DNS Failover: We enhanced A and AAAA records to now show (in a slightly greyed-out text) the IP address(es) that the Failover service is giving out in DNS. Previously […]

Unchanging Internet Concepts

Internet technology continues to change at a rapid pace, but the fundamentals are the same. Most networks are still using TCP/IP. Networks are designed and analyzed using protocol stacks. And data packet switching is still the lifeblood of the network. In this post, we take a look at some fundamental concepts in networking that the […]

Top External Monitoring Tools in 2020

What is external monitoring? In a general sense, it means regularly checking on something to find out what is happening. It’s a way to gather information. In a large network, it means observing and recording data from a wide variety of devices and applications. We should clarify that monitoring and management are not the same […]

How to create an SPF record

What is SPF? Sender Policy Framework (SPF) is a protocol designed to help combat forged email. It allows the owner of a domain to specify which hosts are authorized to send email from that domain. Full details can be found in RFC 7208. How does SPF work? Domain owners publish SPF records in the Domain […]

What Went Down in 2018

Despite whatever bad news you read in this article, we encourage you to remain positive. It’s just human nature to have a curious interest in the calamities of others. So if that’s what gives you your kicks, feel free to enjoy our 2nd annual dispatch on some of the most interesting outages of the past […]

An Introduction to Form Field Manipulation

You use web forms all the time. All across the internet, you are called upon to give certain information about yourself in order to access a site, use an application, or purchase a product. And the truth is most of us have become more open to these kinds of interactions as we have become immersed […]

Cross-Site Scripting (XSS) Exploits

JavaScript is a dandy programming language. And it’s very popular. A report from W3Techs shows that 94.7% of all websites surveyed used JavaScript. But it’s also vulnerable to a top web application hack called cross-site scripting (XSS). Unlike SQL injection, which targets the server side, XSS goes directly for unsuspecting web users. XSS injects malicious […]

Defending Against SQL Injection

If you’re worried about computer hackers, you should be worried about SQL injection (SQLi). It keeps showing up on the top ten list of the Open Web Application Security Project (OWASP). In 2013, the year of their latest approved list, OWASP put injection at the top of the list. “Injection flaws such as SQL, OS, […]

Network Availability – Is it Important to you?

Alright, we admit that our company has a certain obsession with network availability we collectively call “uptime”. It’s even in our name. We’re totally committed to keeping services up and running for our clients. And while uptime is our best friend, we seem to spend a lot of time thinking about the enemy:  downtime. We’ve […]