Posts in

Archives


There is a way to have two or more synchronized Imap servers, an example would be: If the mail [email protected] receives an email, the mail [email protected] also receives it, which is on a completely different server, in a few words the mail will be duplicated on both servers, in case some are down, the others ...

Generally, when a site is changed servers, the DNS logs take several hours to be replicated. This implies a significant downtime in sites with many visits. To avoid this downtime we have some tips for you. Modify the TTL TTL is the DNS record expiration time. Most websites have a ...

Nmap is not usually installed by default, therefore we proceed to it. Debian, Ubuntu, Linux Mint and derivatives: sudo apt -y install nmap Centos 7, Rhel 7 and derivatives: sudo yum install nmap -y The most used command is simply nmap hostname, this command will give you a list of all open ports and their …

The term hacker has always been misused and is always used to refer to someone who will steal your bank accounts or "hack" your social networks, I will try to explain the difference between hacker, cracker or lick. HACKER. A hacker is a person with advanced knowledge of computer security, networks, programming, etc. This person enjoys ...

With the news of the disappearance of CentOS 8 Linux and its multiple changes which will make it go from a stable enterprise-grade system to a beta system (for testing) many users have expressed their discontent, but it is not just standard users , These are multimillion dollar companies which you know ...

  There are two protocols for the use of emails, these are Imap and POP3, each of these protocols has advantages or disadvantages. 1.-IMAP This protocol works directly on the mail server. To check the mail, it connects to the server and shows the content there is. When they send an email it is stored ...