Secure Email Port Added

For customers using our email services, we have added a secure email port to our hosting server that is available to start using now.  We added this for customers using iPhones which try to use this port by default.  However, the port is available for everyone to use if you choose to do so. 

Anyone who is *not* using SSL/TLS won’t be getting any warnings, and don’t need to change anything.  So the rule is, anyone with SSL or TLS turned on (and it may be forced to “on” in some clients like iPhones) should use for the incoming and outgoing server name.

Secure mail uses an encrypted SSL connection for both incoming POP and outgoing SMTP.

The new setting for secure mail are:

Incoming server:
Port for POP3: 995

Outgoing server:
If using SSL, then Port: 465
If using TLS, then Port: 587

Note that if you are using another email service like Office 365, Rackspace or Gmail, this does not apply to you.

Are Your Online Accounts Protected?

When you think of someone hacking your Computer, Website, email account or worse yet, bank account, what do you think of? Some geeky computer prodigy working out of his mother’s basement, meticulously hacking his way into any computer system? The hackers you see in movies and on TV are a far cry from reality.

Hackers, better know now as “Script Kiddies” now rely on “scripts” or automated programs that perform hacking tasks automatically. These scanning scripts are readily available to download.  They run against thousands of IP addresses 24/7 unattended. Once a vulnerability is found anywhere, it is flagged and then exploited.

One of the simplest ways for a hacker to compromise your account is called a Dictionary Attack.

A Dictionary Attack is when a script uses a dictionary file that includes every word in the dictionary to try and access your account. It runs and runs tirelessly trying to login using each word. This is the easiest form or attack because users still do not use strong passwords. Many people are in the habit of using easy, everyday words or names that are easily cracked.

The Next form of attack is called the the Hybrid Dictionary Attack. This stems from the fact the people use numbers or characters after simple words and names. So john1, john2, hello@, etc. are easily cracked using this method.

Finally, there is the brute Force Attack which is comprehensive attack on your password and can take weeks.

The point of all this is that you must use strong passwords to protect yourself from these advanced hacking programs.

A strong password should have alpha, numeric, upper & lower case characters.  A good example of a strong password is “Bl%6i@20Az” .  It may be hard to remember but it is worth the effort.  This simple method can protect you from potential disaster.

Password bit and length correlation is beyond the scope of this post.  Follow this link to learn more on Password Entropy and Length Correlations.