Blog

Support


In order to not interfere with the proper functioning of the websites on the same server as you while making a mass mailing, there are several tools that can be used that will ensure a smooth process. Of all the softwares used, the’re one’s called PHPList.

Continue reading...

Several customers are wondering how to ensure the delivery of their mass e-mailing to Gmail users. (Best practice) The way Gmail classifies spam depends heavily on reports from their users. Gmail users can mark and unmark any message as spam, at any time. To increase the inbox delivery rate of your messages, make sure that all recipients on your distribution lists actually want to receive the mail.

Continue reading...

Effective on July 1st 2014, a new law comes into effect. This law aims to combat spams, phishing and reduce the transmission of junk mail. This new law C-28 will result in many changes to achieve your mass mailings. In this article we provide you some tips that will help you comply with the new law.

Continue reading...

So what is the dreaded DDoS? A Distributed Denial of Service attack usually starts with hackers infecting thousands or even millions of unprotected servers and personal computers and turning them into zombies or bots. All these botted computers combine to create a massive network or botnet of compromised computers that will do whatever the hacker, sometimes called a bot herder, asks them to.

Continue reading...

Note that Astral Internet customers can rest easy when it comes to the latest SSL vulnerability: our customers will be happy to learn that they are already protected from POODLE, as all of our shared cloud hosting clients (and clients with service included) are patched to protect against the POODLE security flaw.

Continue reading...

Popular, customizable and easy to use. On the internet, you are often browsing on it without even noticing it. For certain it’s the ‘Eldorado’ and for others, it’s a nightmare. It doesn’t need much to get started and will offer a lot as long as you take care of it. Yes, you’ve guessed it, we are talking about WordPress. In this article we will take a look at the pros and cons of the content management system that is becoming more and more popular on the web.

Continue reading...

Hackers have many ways of attacking your website, and it’s important to stay up to date on the most common attacks so you can do what you can to prevent them from occurring. Malicious individuals can attack your data via your computer or they can infect an entire network. Two of the most common website attacks are Denial of Service (DoS) attacks and SQL Injection attacks.

Continue reading...

So many reasons could explain the cyber criminality committed on the internet. You’ll find in this article three of the main reason why a cybercriminal would like to hijack your website. You’ve been told that your website security has always been, and will always be important, after reading this blog you will better understand why.

Continue reading...

The choice of Linux or Windows hosting is not determined by your operating system. In other words, you can run a Windows-hosted site on a Mac or Linux system just as easily as you can on a PC with Windows installed. Even if you are more familiar with Windows than you are with other operating system, this doesn’t matter either.

Continue reading...

Proprietary software can be pretty pricey. Heck, just running MS Word on your MacBook will set you back $130. Fortunately, you can find a lot of free, open-source software to meet practical needs such as transferring files to your website, editing images, and modifying HTML code. As follows are some of our favorite free software programs.

Continue reading...