How to Secure Your Windows Server from Ransomware?

Just one fine Monday as you logged into your computers, you were flabbergasted by a mail warning you about one of the biggest Cyber Attacks Ever!

You are lucky if you did not see “Oops! Your files have been encrypted” message on your lock screen as over 200,000 people worldwide did.


By now, you must have already heard the hue and cry surrounding the WannaCry Ransomware attack.

Though the clamor is dying out because a 22-year-old accidentally slowed the attack, the vulnerability of your server is far from over and your business might still be at risk.

While FedEx, Nissan, Deutsche Bahn railway, Hitachi, the Russian Central Bank, Telefonica and the British National Health Service and some other major businesses are grieving over the malware attacking their business, have you taken steps to secure your server yet?

Just in the very initial stage, Ransomware attack kept around 57000 computers from 150 countries hostage by the end of May 12th and the number quickly rose to 200,000 by the morning of May 15th 2017. All this over a weekend when we were lazing around in our homes or cities!

The latest reports suggest that there are around 300,000 computers worldwide infected by the Wannacry ransomware.

Asking for a ransom amount of somewhere between $300 -$600 in Bitcoins, these hackers have still not been traced and so, the threat continues.


If holding onto your Bitcoins instead of letting the hackers sweep them off is important to you, here are a few ways to make your server secure from the Wannacry Ransomware. Before that, let us get into some facts you need to know.


5 Things You Need To Know To Protect Your Server:

  1. Wannacry attack can only infect Windows servers.
  2. Windows 2003 servers are particularly at high risk.
  3. If you have updated your Windows server 2008, 2008 R2, 2012 or 2016 with the latest Microsoft update released in March, you are safe from the attack.
  4. If you have enables auto download for your servers, you are safe from the risk.
  5. If you follow the manual update methodology, you need to either download the patch or update your server as soon as possible to avoid getting infected.

11 Things You Need To Do To Protect Your Server:

  1. Apply the relevant security patches to your Windows server as soon as possible. Microsoft has made security patches for all the server versions here.
  2. If you have Windows Server 2003 and 2008, Microsoft has released Security Update KB4012598 for advanced server safety.
  3. Save all your server data in offline storage so that even if you are infected, your data can be redeemed without having to pay any hefty amount.
  4. Secure your e-mail servers and scan all incoming and outgoing emails for malicious attachments.
  5. Download or update the best anti-virus programs to track malware or else, enable Windows Defender; it’s free.
  6. Do a thorough scan through your server to identify affected files and remove them if any.
  7. Perform server audits in regular intervals.
  8. Monitor and control all software downloads.
  9. Deploy spam-filtering techniques to avoid inbound spamming and e-mail spoofing.
  10. Block SMB port 445 and disable SMB protocols temporarily. Here’s a detailed guide by Microsoft on how to enable and disable SMB protocols.
  11. Contact your server support for expert help to secure your server from ransomware. Bluehost support offers expert help to assist you prevent the ransomware attack.

What Should Your Antivirus Do?

An advanced Antivirus and Firewall system helps protect your server from any malware and not just Ransomware. Some popular Antivirus brands are McAfee, Norton, SOPHO, Intel etc. In case of Firewall, you might choose a software version, however, a hardware Firewall is highly recommended for businesses. Popular Firewall brands include Cisco, Fortinet, Juniper, Sonicwall etc.

So what should an ideal Antivirus do to protect your server? Here’s a snapshot.


Real time tracking of the files, messages and senders for any hint of blacklisting helps identify threats. If your antivirus deletes data that corresponds with known malware, your server is safe.

Host Intrusion Prevention System (HIPS):

Just a little bit of tweaking in the coding makes unique malware and that’s what hackers do. HIPS monitors any the behavior of codes on your server identifying malicious activities thus preventing the server from falling prey to unique malwares.


Like blacklisting avoids suspicious software to run on your server, Whitelisting allows only highly trusted software to run.

Change Control:

Change control system notifies or disrupts the activity as soon as an attacker tries to change the configuration of detection tools to hide their activity.

Over to you:

Long story short, you need to keep your servers up to date to avoid any malware attack including the dreaded Wannacry ransomware. It has been concluded that if the victims had not delayed security updates, they could have been saved from the attacks. Business Insider reported that India is the third worst hit nation by Wannacry with over 48,000 computers affected. If you have not taken measures to stay safe, do it the first thing now.

A Beginner’s Guide to Choosing a Hosting Plan For Your Business

Every penny that you invest in your business needs to be carefully thought through. Especially, if you are a beginner, things get even trickier for you to decode when it comes to technical details.

Web Hosting is one such factor that needs careful inspection before you zero in on a hosting plan and provider. While most providers promote web hosting as an “affordable” product, decoding the science behind those affordable plans is nowhere similar to shooting a fish in a barrel.

That said, it’s not rocket science either. All you need to do is to understand your requirements and align them with the features offered by various hosting plans.

To begin with, let us understand some of the essential features of a web hosting plan:


Glossary of Essential Features of a Web Hosting Plan:

Disk Space

It is the amount of storage space provided to you by the web hosting provider. You need disk space to store your web files which may be composed of text, images, video, audio, etc.



It is the amount of data that can be transferred over a period. It determines the load speed of your website. More bandwidth means more speed.



It is the percentage of time that a hosting server remains up and running for. A 99.99 percent uptime means that your website will go down for eight hours in a year.


Easy-to-use Admin Panel

Admin panel is the gateway or the dashboard that lets you manage your websites. An easy-to-use admin panel ensures that you do not require through technical know-how of operating a CMS. Cpanel is considered to be the most convenient admin panel.


Customer Support

It refers to the support which is available to you in the case of a breakdown. This support may be available to you in the form of chats, phone calls and emails.

Now that you understand the terms you have to look for while choosing your hosting plan, let us explore the types of web hosting.


Different Types of Hosting

  • Shared Server Hosting
  • Virtual Private Server
  • Dedicated Hosting

It is the very nature of your website and the potential traffic it can receive that decides which hosting will be suitable for you. Let us understand them one-by-one.


1.     Shared Hosting

As the name suggests, shared hosting is when multiple websites are hosted on a single server, like a building shared by multiple businesses. It has its pros and cons. You get to share a server with other websites, which means that you share the cost of the server as well. Shared hosting helps in reducing the costs since the expense of the server and its resources are spread over to all the customers/packages hosted on the server. This kind of hosting is perfect for personal websites, small and mid-sized businesses that don’t require all the resources of the server.

Even if hosting providers promote it as “unlimited this and that,” the fact is, it’s not unlimited. It cannot be. Shared hosting puts limitations on services like disk space, monthly traffic, email accounts, FTP accounts, databases etc.

A server is like a computer. When it says that the same device is used by multiple websites, it precisely means that you are sharing the same RAM and CPU, the Apache server, the MySQL server and the Mail server with other businesses.

Who needs Shared Hosting?

Small businesses, new bloggers, and anyone who is just starting out should preferably opt for shared hosting considering that you do not need to spend a fortune on hosting when you don’t really need it.

Considering that the monthly visits on your website would be somewhere between 0-5000, you can easily manage with a shared hosting plan. You will never use all the features listed in the plan, so it is better to go with a reputed name because most of the providers offer similar products. The only difference you will experience would be the customer support. Although WordPress is widely popular, you might as well choose Linux or Windows depending on your preferences and requirement. If you are looking to find an easy-to-use solution, most shared WordPress hosting has a beginner-friendly admin panel like cPanel or Fantastico.


  • Isn’t good if the there is a spike in traffic.
  • There may be restrictions on the files and the applications that can be run on the website.
  • Lesser Resources are available to you, and if your site outgrows them, you will have to upgrade which is easier to do with reputed hosting providers than with the lesser-known ones.
  • Low levels of security as compared to other hosting options. However, since you have just started, you have a considerably lesser risk of security threats.

A peek into Shared Hosting plans from Bluehost:


Expected Visitor Per Month: Low

Security: Average

Options: Linux/Windows/Wordpress

Price: Starts from INR. 289 per month

Plans From Bluehost: Standard/Business/Pro

Domains Supported: One/Five/Ten

What You’ll Get:

  • Unlimited Disk Space
  • Unlimited Data Transfer
  • Unlimited Email Accounts
  • Global CDN
  • Hosting On High-Performance Servers
  • Virus Protection
  • 99 percent uptime
  • Customer Support


2.     Virtual Private Server (VPS) Hosting

There is always a midway to deal with human concerns. So, here it is to deal with your hosting woes. VPS is the bargain between shared and dedicated hosting for situations when neither of the extremes suits your needs.

VPS hosting uses virtualization for creating isolated virtual machines for you with dedicated resources and full access. With guaranteed resources including CPU, RAM, HDD, and Bandwidth, it gives you complete control and even if there are other virtual servers present on the same hardware, you server remains unaffected and acts as a dedicated server (with limitations, of course).

While co-location is an option where you rent rack space and internet connection from a data center and manage your hardware on your own, it is a rather expensive thing to deal with considering that you need human resources to manage the server and to deal with crisis situations.

Who needs VPS Hosting?

If you are sure that shared hosting is definitely not what you need, and confused whether breaking the bank for dedicated hosting is the need of the hour, give VPS a shot. It is ideal for people looking to get full control of their server space in a fraction of the cost of a dedicated hosting.

VPS plays a balanced character between the beginner shared hosting plans and a dedicated hosting or co-location. It gives you complete access to install and configure your preferred programs like PHP with Postgresql, Zope, Plone etc. Also, you can host mailing or FTP server and multiple websites using Apache’s Virtual Hosts which is almost a luxury that you get with dedicated hosting. Given the root control, you can use your virtual server for backup, storage or any way you want.

If your website expects a monthly visit of around 5000- 20000, you are good with VPS. It also allows you to choose bigger plans according to your requirements as and when required to a certain limit. Although, there are other factors you need to consider.



  • Expensive than shared hosting
  • Medium to high security, but not as good as security levels of dedicated hosting
  • Requires involvement in terms of installations, maintenance, security, and updates because you are in complete control of your virtual server in most cases. You can deal with this issue by opting for a provider that offers managed support.
  • Inappropriate allocation by the provider in some cases in an attempt to oversell the space to as many users as possible. This leads to issues at peak times. However, going with a trusted provider and being informed of the number of virtual servers on the hardware will help you combat this matter.


A peek into VPS Hosting plans from Bluehost:


Expected Visitor Per Month: Medium

Security: Medium to High

Option: Linux Hosting

Price: Starts from Top of Form

INR. 1,199 per monthBottom of Form


Plans From Bluehost: Standard/Enhanced/Premium/Elite

Server Resources: CPU/RAM/HDD/Bandwidth

What You’ll Get:

  • Managed Support
  • Additional cPanel
  • Programming Support
  • Domain Name Feature
  • Various Platforms
  • Operational Software
  • 99 percent uptime
  • Customer Support


3.     Dedicated Server Hosting

It’s like renting an entire building to set up an office.  It is the type of Internet hosting in which the client leases an entire server which is not shared with anyone else. It comes with enhanced performance and security. You get the flexibility of choosing your resources. There is no cost of purchasing your server, but you are obviously paying a high amount to get a dedicated server in comparison to what you pay for shared and VPS hosting.

Dedicated Hosting ensures the best possible server security. Moreover, you can rely on the server for better uptime, higher bandwidth, and unlimited space. You can host unlimited websites on a dedicated server and you will never have to worry about load speed.

Who needs dedicated hosting?

Big business websites with higher traffic need dedicated hosting. E-commerce websites typically go with dedicated hosting considering the heavy amount of traffic that they have to deal with especially during sale times. If your website receives over 20000 visits every month, you need dedicated hosting. With dedicated hosting comes the responsibility of managing the technical aspects of installations, updates, security, and configuration. If you are not willing to take that elephantine task, it is recommended go for Managed Dedicated hosting.


  • High Costs
  • Need technical skills to manage if you are not choosing managed hosting
  • You still don’t have physical access to server
  • You might not be using every feature that your plan offers.


A peek into Dedicated Hosting plans from Bluehost:

Website: or

Expected Visitor Per Month: Large

Security: Very High

Price: Starts from INR. 10,499 per month

Plans From Bluehost: DS1-IN/ DS2-IN/DS3-IN/DS4-IN

Server Resources: Intel Processor/ RAM/HDD in RAID 1/ Bandwidth/ Free IPs

What You’ll Get:

  • Control Panels cPanel/WHM
  • WHMCS as Billing Panel
  • Support: Core-Managed & Fully Managed
  • Root Access
  • Ready In Minutes
  • Best Hardware
  • Speeds of up to 1Gbps
  • Failover With HDD in RAID 1
  • 99 percent uptime
Over to You

Long story short, you need a shared hosting plan if you are expecting lesser site traffic, VPS hosting if you have outgrown the features offered by shared hosting, but still aren’t ready to spend big bucks, and dedicated hosting if you are expecting a high amount of site traffic and profits. Choosing a web hosting plan for your business might not be a herculean task, but it definitely requires a lot of thought and knowledge. If your requirements are more complex and you are still confused about which plan you need, you can consider consulting an expert to guide you through the process and align it with your requirements.


21 Real WordPress Tips To Secure Your Website in 2017

If you’ve been a part of the online ecosystem, then the word ‘WordPress’ might not be a new phenomenon. This content management system has grown leaps and bounds from the time of its inception. Ease of use, a large repository of themes and plugins, regular updates and a huge community, supplement to the growth of WordPress.

You can simply evaluate its success by knowing that nearly 25% of all sites on the web are powered by WordPress. This, however, makes WordPress vulnerable to malware and hacker attacks because learning about a simple loophole can provide access to millions of websites. Hence, if you ever decide to work with WordPress then you must consider getting every aspect of the security, absolutely right.

We can go on and on about why you should be securing your WordPress website but what do you really need to do, to ensure that your website is protected? We’ve put together a list of highly effective security tips that will help you secure your website. Let’s get started.

  1. Secure Hosting: This is probably the very first thing you’ll need to strike off the list. Your website needs a fast and reliable hosting service that can not only withstand Brute Force and DDoS attacks but also ensure that your website functions swiftly. A clean and fast website will ensure a positive impact on your search engine rankings.
  2. Update WordPress to the latest version: The WordPress core is regularly updated with new features and security patches to add functionalities and counter any vulnerabilities. You need to ensure that your website receives these updates to maintain continued protection. This applies for all plugins and unused themes within your WordPress installation. There may be a chance that your developer has blocked automatic updates to your WordPress site, fearing that it will break the code. But you can always ask him to test run the website with the new update in a staging environment and ensure that all required changes are made before you can go live.
  3. Use Plugins and Themes from reliable sources: You can access thousands of free themes and plugins from within your WordPress Dashboard. There are also loads of websites providing premium themes and plugins with really good support. We highly recommend that you don’t download and install items from unknown sources as they could be potentially injected with code that will leave your website vulnerable.
  4. Take Backups: We can’t stress enough about how important it is to maintain regular backups of your WordPress website. If your site is taken down due to an unfortunate attack then your best possible option is to quickly roll back to the best available backup. Backups can be managed using plugins like BlogVault and BackupBuddy but we highly recommend that you rely on a more advanced security solution that provides extensive protection and cloud-based backups.
  5. Stronger Username and Password: Almost 8% of hacked WordPress websites are due to weak username and passwords. The default username while installing WordPress is ‘admin’ and we recommend changing it to an alphanumeric one so that it can’t be easily guessed. 
    • Avoid Username: admin
    • Weak Password: 1234567
    • Preferred Username: alphanumeric (you can use email as login as well)
    • Secure Password: ApAsSw0rd#1 (alphanumeric with special characters)
  6. Rename Login URL: In order to access your website dashboard you will typically use ‘yourwebsite/wp-login.php’. But did you know that this url can be changed so that you can restrict access? You can use the plugin Rename wp-login.php and change the URL according to your preference.
  7. Add Two-Factor Authentication: You can now add an extra layer of authentication to make your WordPress website more secure. You can also use the Google Authenticator plugin for the purpose. After this, your login page will have an additional option for Google Authenticator code.
  8. Add Security Question to Login screen: By adding a security question to your login screen, you’re ensuring that you’re giving a tough time to a hacker. Use plugin WP Security Question to quickly set this up.
  9. Use a Security Plugin: By using the security plugins, you can block malicious networks, prevent security threats, enforce stronger passwords, run a vulnerability scan, implement a firewall, monitor DNS changes and so on. One of the most popular security plugins is Wordfence Security and is extremely easy to setup. We also recommend a more advanced security solution that can fortify your website with minimum effort.
  10. Stop Bad Bots: To block multiple User-Agent strings at once, just add the following code snippet to the .htaccess file.
    RewriteEngine On RewriteCond %{ HTTP_USER_AGENT} ^.*(agent1|Wget|Catall Spider).*$ [NC] RewriteRule.* – [F, L]
  11. Use SSL certificates to encrypt data: Installing an SSL certificate (https://) is the smartest move you can make today. An SSL certificate ensures secure data transfer between browsers and the server. In fact, Google has announced that it will consider any website without an SSL certificate as an unsafe site and ensure it goes down in ranking.
  12. Securing Database: Consider using a different table prefix, rather than using wp_. Changing it to atpwd_ or any other name will make it much harder for an intruder to break in. You can make these changes when you’re installing WordPress or you can make use of plugins like iThemes Security, Sucuri Security, etc.
  13. Restrict Logins: You can lock the /wp-admin page if a particular user is not able to log-in beyond the limited number of attempts. You can use the plugin ‘WP Limit Login Attempts’ to quickly add this additional layer of security on your website.
  14. Logout idle users Automatically: When there is a long period of inactivity, it’s best to log out of WordPress. Unfortunately, this doesn’t happen automatically and hence you’ll need ‘Idle User Logout’ plugin. Visit Settings> Idle User Logout page to configure plugin settings.
  15. Secure wp-config.php: This is the most important file in the entire installation. You can prevent this file from being accessed by using the following code snippet to the .htaccess file:
    <Files wp-config.php> order allow, deny deny from all </Files>
  16. Disable browsing of /wp-includes: Don’t leave the directory wide open for browsing. To prevent access simply add the following snippet to the .htaccess file.
    # Block the include-only files. RewriteEngine On RewriteBase / RewriteRule ^wp-admin/includes/ – [F,L] RewriteRule !^wp-includes/ – [S=3] RewriteRule ^wp-includes/[^/]+\.php$ – [F,L] RewriteRule ^wp-includes/js/tinymce/langs/.+\.php – [F,L] RewriteRule ^wp-includes/theme-compat/ – [F,L]
  17. Disable XML-RPC: It was found that a lot of brute-force attacks exploit XML-RPC. To disable it, you can use the plugin Disable XML-RPC. This plugin disables the XML-RPC API on a WordPress site running 3.5 and above.
    To Block XML-RPC in Apache use the following code:
    ## block any attempted XML-RPC requests <Files xmlrpc.php> order deny,allow deny from all allow from </Files>
  18. Disable File Editing: If a hacker finds a loophole to penetrate your website then he will be able to edit your files. You must disable file editing to ensure that you keep your website safe. To disable file editing, just add the following code to the wp-config.php file: 
    define( ‘DISALLOW_FILE_EDIT’, true );
  19. Harden HTTP Security Headers: The HTTP security headers provide yet another layer of security. They tell the browser how to behave when handling the site’s content. Two common HTTP security headers that can be implemented are:
    1. Content-Security-Policy
    2. Public-Key-Pins
  20. Hide WordPress Version: You must consider hiding the WordPress Version. All you have to do is to add the code to your functions.php file 
    function wpversion_remove_version() { return ”; } add_filter(‘the_generator’, ‘wpversion_remove_version’);
  21. Use a Website Application Firewall (WAF): This is one of the easiest ways to protect the website. You can use Sucuri Security to enable WAF for your website

There’s a popular saying ‘Prevention is better than cure’, this is applicable for WordPress as well. Cleaning an infected site is a tedious and time-consuming task and it is essential that you do everything to ensure that your site is well protected. We’ve just given you some quick and easy steps to secure your website and we really hope that it keeps your WordPress website safe.
If you think that we’ve missed out on some important security tips then feel free to share them in the comments section below

Replace Bulky WordPress Plugins With Light Weight PHP Code

We all know how plugins can improve the functionality of WordPress, but we also know that too many of it can cause the site to slow down. But what if we have to tell you that you can get the same functionalities as the plugin by replacing it with PHP code.

Not everyone is familiar with writing code but thankfully there’s a site that will help you with ready made codes with different functionalities. The site is called You Might Not Need That WordPress Plugin(that’s a pretty long domain name!) and has more than 10 code snippets that will replace existing plugins.

Some of the code snippets include custom shortcodes, 301 redirects and adding Google Analytics code to the website. Every snippet has a brief description along with links to the respective WordPress codex. This site is still work in progress and there’s definitely room for new snippets.

If you wish to contribute to this list and help make WordPress sites around the world a little faster (minus the plugins), then you should connect with Luke Liasi via his twitter account @likeliasi.

Please note that you need to have basic WordPress and development knowledge to make the best use of this snippets. The owner and Bluehost are not responsible if it breaks your website.

Important Announcement: ‘The Dirty Cow’ Linux Bug

A privilege escalation vulnerability being branded as “Dirty Cow” (CVE-2016-5195) was recently discovered and fixed yesterday in the Linux Kernel. It has existed for 11 years, so pretty much every device running Linux is affected (this includes VMs, physical machines, mobile devices, and so on) and, in general, distros from every vendor are affected. Fortunately, most major distributions have already released a fix. However, if you’re running an older server, please follow this tutorial to check and patch your server.

How to detect if you’re vulnerable:


To find out if your server is affected, check your kernel version.

$ uname -rv

You’ll see output like this:

4.4.0-42-generic #62-Ubuntu SMP Fri Oct 7 23:11:45 UTC 2016

If your version is earlier than the following, you are affected:

4.8.0-26.28 for Ubuntu 16.10

4.4.0-45.66 for Ubuntu 16.04 LTS

3.13.0-100.147 for Ubuntu 14.04 LTS

3.2.0-113.155 for Ubuntu 12.04 LTS

3.16.36-1+deb8u2 for Debian 8

3.2.82-1 for Debian 7

4.7.8-1 for Debian unstable


If you’re on CentOS, you can use this script provided by RedHat to test your server’s vulnerability. To do so, first download the script.


Then run it with bash.


If you’re vulnerable, you’ll see output like this:


Your kernel is 3.10.0-327.36.1.el7.x86_64 which IS vulnerable.

How to fix the Vulnerability:

Fortunately, applying the fix is straightforward: update your system and reboot your server.


Update and upgrade your packages using apt-get.

sudo apt-get update && sudo apt-get dist-upgrade

You’ll need to reboot your server to apply the changes.

sudo reboot


As always, there are subtleties and potential defenses and configurations which may make this a non-issue for your specific situation, so we’ll leave the assessment up to you – but our general advice is to upgrade your kernels and reboot as soon as possible.

For the curious, here’s the patch from Linus Torvalds.

CentOS has released patched kernel for CentOS 6 and CentOS 7.

You can install the Kernel using the following command :

yum install kernel*

You can also initiate a full yum update to update all the packages on the server :

yum update

The server should be rebooted after the installation to apply the changes.


If you need any assistance, please contact our support team with the root password of the server. 

We hope this has been helpful and that you put the fixes in place as soon as possible.

3 Awesome Websites To Check DNS Propagation

Whenever DNS or Domain Name Server records are modified, propagation steps in. DNS propagation can take anywhere between 24 to 48 hours and during this time the DNS IP will fluctuate. This means that your website visitors may land on your old or new website.

There is a way that you can check the current state of your DNS records during propagation. Check out the following free tools to check DNS Propagation

1. DNS Checker : You can run a DNS propagation check from more then 20 locations worldwide. Record types like A, AAAA, CNAME, MX etc are supported by this tool.

2. Site24x7 : This tool lets you check for DNS propagation from more than 50 locations and also allows you to customize location checking.

3. WhatsMyDNS : You can check DNS propagation from 21 locations and supports multiple record types.

That’s it folks, hope these tools help.

How To Use Free Domain Forwarding Services

If you’re planning to forward your domain to a different domain name then, here’s how you can do it.

1.Login to your customer panel



2. Click on Manage Orders >> and then ‘List/Search Orders’



3. Click on the domain name and scroll down to locate ‘Domain Forwarding‘ category


4. Click on ‘Manage Domain Forwarding


5. Input the destination domain name and click on Save.


You have now forwarded your domain to a different website. Please allow 2-4 hours for the domain forwarding services to start working.

Please Note:

Free Email Services, Domain Forwarding, and DNS Management will stop working once you update your Domain’s Name Servers. 

POP/IMAP Email Client Configuration

Do you wish to use an email client (desktop or mobile device) to manage your emails? E.g. Microsoft Thunderbird, Outlook Express, Outlook 2007, Email on Phone etc. Take a look at all the settings below to help you get started

Settings POP IMAP
Incoming Mail Server pop.your-domain-name imap.your-domain-name
Incoming Server Port Number 110 143
Outgoing Mail Server (SMTP) smtp.your-domain-name smtp.your-domain-name
Outgoing Server (SMTP) Port Number 587 587
Devices Supported 1 device Multiple Devices
Remember: *Please use Authentication for Outgoing Email Server for both POP & IMAP


  • Enter your domain name in the settings mentioned above.
    e.g. If your domain name is, the settings will be: ‘’ or ‘’ and similarly, ‘’
  • Use complete email ID in the username section [email protected]
  • Enter the port numbers correctly for the settings.

How To Use Free Email Services

Setting up an Email Account was never this easy. Follow the steps in our tutorial below to get your Email Account setup in minutes.

1.Login to your customer panel



2. Click on Manage Orders >> and then ‘List/Search Orders’



3. Click on the domain name and scroll down to locate the Email category.



4. Click on ‘Manage Email



5. A new pop-up window will open. Click on Add User



6. Fill in the information and then click on ‘Add User‘ to create an email account. Email account password will be shown once the user is created.


  • Visit to access your email account.
  • Input your complete email ID and password.
  • Your email account is all set up. Now you can send and receive emails.




How To Locate Your Name Servers

Please follow the below procedure to locate your nameservers,

When Hosting package is with us:

1.Login to your customer panel



2. Click on Manage Orders >> and then ‘List/Search Orders’


3. Click on the domain name of whose Name Servers you want to update


4. Click on ‘Name Servers‘ under the ‘Domain Registration‘ section



When Hosting package is with a different service provider:

If your web hosting package is with a different service provider please check for an email from them that you may have received during the purchase of the product, If not,  you can contact them for the name servers. Once you have acquired your hosting name servers please follow the instructions on How to update Name Servers’.

Recent Comments

    Twitter Widget