MDaemon Technologies Blog

Four-Step Swindle: The Anatomy of a Business Email Compromise Attack

By Brad Wyro posted in BEC, Business Email Compromise, CEO Fraud, Email Security, spear phishing, phishing, Trending

0 Comments

This week, we continue our series on Business Email Compromise. Click here to read Part 1, which includes an overview and various statistics on this growing threat.

Read More

Alt-N Technologies is Renamed MDaemon Technologies

By Daniel Draney posted in News, About, mdaemon, MDaemon Technologies, Press Release, SecurityGateway, Alt-N Technologies, Trending

0 Comments

New Name to Leverage Global Brand Equity of Company’s Flagship Email Server

Grapevine, TX (USA) January 2, 2018 Alt-N Technologies announced today that, effective immediately, the Company’s legal name will be MDaemon Technologies, and that it will begin doing business under the new company name.

Read More

Steps to Track Spam Sent Out From a Local Machine on Your Network

By Brad Wyro posted in antispam, Email How To, Email Security, security, anti-spam, how-to, tutorial, spampot, Trending

0 Comments

Has this happened to you? Let’s say you’re the MDaemon administrator for your company, and you’ve noticed that somewhere, somehow, spam messages are being sent from within your network. Perhaps one of your PCs has been compromised. What do you do? Here are some tips to help you track the issue down.

Read More

Easy Backup & Recovery with MDaemon

By Brad Wyro posted in backup, configuration files, Email How To, file structure, mdaemon, recovery, restore, Trending

0 Comments

MDaemon's user-friendly flat-file structure makes it easy to backup and recover your email messages, user accounts, security settings, and any other data stored in MDaemon. No extra Windows components or third-party applications are required, and you won't have to navigate through any confusing dialog boxes to backup & recover your data. Backing up and restoring MDaemon is as easy as drag & drop. All you would need to do is map a drive letter from the MDaemon server to another drive on your network, then drag over the files you want to back up.

Read More

Follow These 13 Tips to Avoid Being Blacklisted

By Brad Wyro posted in Email Best Practices, Email Security, Trending

0 Comments

Tips to Avoid Being Blacklisted

With the prevalence of spam circulating the globe in massive amounts, it becomes increasingly important for administrators to understand the potential causes of their IP address ending up on a blacklist. Spammers employ all kinds of tricks to try to send out as many spam messages as possible without revealing their identities. They do this through various techniques such as social engineering, employing malware, botnets, forging of message headers, and exploiting weaknesses in email systems or network infrastructures. For the spammer, it’s basically a numbers game. It costs next to nothing to send out thousands of spam messages, and if even a small handful of people click on a link or purchase a product advertised in a spam message, the spammer can profit. If your email infrastructure is not properly secured, then you risk being infected with malware and becoming part of a spam botnet. Even if your server is not infected with malware, if your firewall and mail server security settings are not configured properly, your IP address could wind up on a blacklist. To protect yourself from being blacklisted, consider the following recommendations:

Read More

SSL & TLS Best Practices

By Brad Wyro posted in Email Best Practices, Email Security, encryption, cryptography, SSL, best practices, email security, TLS, Trending

0 Comments

You may have heard the terms SSL and TLS, but do you know what they are and how they’re different?

Read More

Is slow email making you pull your hair out? Here's how to improve Microsoft Outlook performance

By Brad Wyro posted in Email Best Practices, Email How To, how-to, performance, Inbox Management, Outlook, best practices, Trending

0 Comments

Read More

Are You Receiving Replies to Messages you Never Sent?

By Brad Wyro posted in antispam, Email How To, Email Security, security, how-to, mdaemon, spam, email security, Trending

0 Comments

Image "Return to Sender"

Read More

Make it Easier For Your Users to get WorldClient Login Assistance

By Brad Wyro posted in Email How To, login, password, username, Webmail, assistance, webmail, WorldClient, Trending

0 Comments

Occasionally, our support staff will receive calls from end users who have forgotten their email password or are having issues logging into WorldClient. Users are then instructed to contact their mail server administrator for assistance. But what if users don't know who to contact for help, and don't know how to even find out who to contact? For some users, trying to track down the appropriate contact for help can lead to wasted time and lost productivity.

Read More

How to Track an Email in MDaemon's Log Files

By Brad Wyro posted in Email How To, Trending

0 Comments

Our friends at C&C Software wrote a blog post recently about how to track an email message in MDaemon's log files for troubleshooting purposes, and I wanted to share it with you. When troubleshooting a mail delivery issue, it helps to know what logs to look at and what information to search for in the logs. For example, if you're looking for an inbound message, you can review the MDaemon-SMTP(in).log file. If you're tracking a message as it passes through the queues, you can use the MDaemon-Routing.log file.  You can also use Queue & Statistics Manager to pull up log transcripts for specific messages. Click here to view a tutorial video on Queue & Statistics Manager. Click here to read C&C's post on tracking email messages in the logs.

Read More
BACK TO ALL ARTICLES

Subscribe to Email Updates