Help Center

Choose a category below to expand the list of topics or use the Search function below:

Email (50)

Enable 2-Step Authentication

2-Step Authentication adds an extra layer of protection to your email account. It ensures that only YOU can access your account, even if someone knows your password.

How it works

When your account is protected with 2-Step Authentication, logging in to your webmail requires two methods of authentication: your email account password and a verification code that’s only available to you.
 
2-Step Authentication also ensures hackers can’t access your account via third-party applications. In order to configure your email account in third-party applications (including email clients like Outlook, eM Client, Apple Mail, etc.), you must use a unique “Application Password” that is only accessible by logging into your account online.
 

Configuring 2-Step Authentication

You can configure 2-Step Authentication from within your account settings (under SETTINGS > ACCOUNT > 2-STEP AUTHENTICATION > [ENABLE]).
 
The first step in configuring 2-Step Authentication is choosing your preferred verification method: Authenticator App or Recovery Email Address.
 
Retrieve code via Recovery Email Address
Each time you log in, the verification code will be sent to an alternative email address.
 
    1. Select Recovery Email Address from the Verification Methods dropdown.
    2. Enter and confirm the Recovery Email Address that will be used to retrieve the verification code. (This email address will automatically be used as the Recovery Email Address used for resetting your account password as well.)
    3. Click Next.
    4. Wait a moment for the verification code to be emailed. Then enter the 6-digit verification code.
    5. Click Check to confirm the verification code and complete the 2-Step Authentication setup.
 
Retrieve code via Authenticator App
Each time you log in, you’ll retrieve the verification code from an authenticator app.
 
    1. Install an authenticator app, such as Google or Microsoft Authenticator, Authy, or LastPass on your phone or computer. (In this article, we’ll demonstrate how to set up 2-Step Authentication using Google Authenticator on your mobile device.)
    2. Select Authenticator App from the Verification Methods dropdown.
    3. Enter and confirm a Recovery Email Address that will be used as an alternative method to retrieve the verification code. If your authenticator app is not accessible, the verification code will be sent to this address instead. (This email address will automatically be used as the Recovery Email Address used for resetting your account password as well.)
    4. Click Next. A QR code will appear on the next page.
    5. Open the Google Authenticator app. Click “BEGIN SETUP” or use the plus (+) icon to add a new token.
    6. Select Scan QR Code and use your phone’s camera to scan the code that’s displayed in your webmail. A new token will be added to Google Authenticator.
    7. Enter the token’s 6-digit code into the field in your webmail.
    8. (If you can’t scan the QR code, click on “Can’t scan the QR code?” in your webmail. In the Authenticator app, choose to create a new token by Manual entry. In the Account field, enter a token descriptor, such as the username of your account. In the Key field, type in the secret key that’s displayed in the webmail. Then enter the token’s 6-digit code into your webmail.)
    9. Click Check to confirm the verification code and complete the 2-Step Authentication setup.
 

Logging in with 2-Step

To log in to your webmail, enter your email address and password. Then enter the 6-digit verification code that’s sent to your email or displayed in the authenticator app’s token.

Configure Third-party Applications with App Passwords

Note that once 2-Step Authentication is set up for your account, you will also need to re-configure any third-party applications or email clients using the “Application Passwords” that are automatically generated and displayed in Account Settings. Be sure to use the correct password for the corresponding protocol.

Permalink.

How to change your Spam Filtering Preferences

There may be times that you find your email Spam Filters to be too aggressive or not aggressive enough for your individual preferences. You have a large amount of control over how incoming Spam is handled by your email account. You can modify your Spam Filtering preferences by following the steps below:

  1.  Logon to your web-based mail at https://smartermail.scarabmedia.com.
  2.  Click on the SETTINGS icon in the left-hand pane (as shown below)
  3.  Under Settings click on FILTERING to expand that submenu (as shown below)
  4.  Click on SPAM FILTERING (as shown below)
  5.  Select “Override spam settings for this account” (as shown below)

6.  Click on the ACTIONS tab in the right-hand pane (as shown below)
7.  For Low Probability of Being Spam click the down arrow under ACTION and select how you want these scored emails to be handled. You can select “No Action” to have them go directly to your Inbox,  “Add Text to Subject” to have them delivered to your Inbox but with a modified Subject letting you know they may be Junk E-Mail, “Move to Junk E-Mail Folder” to have them quarantined, or “Delete Message” to have the message removed entirely upon receipt.
8.  Repeat Step 7 for Medium Probability of Spam.
9.  Repeat Step 7 for High Probability of Spam.
10. Click on the [SAVE] button at the top of the screen to commit your changes.

Permalink.

How to solve Outlook Error 0x800ccc0f “The connection to the server was interrupted”

In Microsoft Outlook if you are getting the error 0x800ccc0f “The connection to the server was interrupted” when attempting to receive email it may be that your Outlook Personal Folders are corrupted.

To resolve this error step-by-step instructions can be found at How To Repair Your Outlook Personal Folder File.

For Outlook 2013 and later you can use the Automatically Start the Inbox Repair Tool

For Outlook 2007 and before you will have to locate the ScanPST.exe program on your computer. Below is a chart that shows the typical installation locations of this file:

Outlook Version ScanPST Location
For Outlook 2010 on a 32-bit version of Windows <disk drive>:\Program Files\Microsoft Office\Office14
For Outlook 2010 on a 64-bit version of Windows <disk drive>:\Program Files\Microsoft Office(x86)\Office14
For Outlook 2007 on a 32-bit version of Windows <disk drive>:\Program Files\Microsoft Office\Office12
For Outlook 2007 on a 64-bit version of Windows <disk drive>:\Program Files(x86)\Microsoft Office\Office12
For Outlook 2003 <disk drive>:\Program Files\Common Files\System\MSMAPI\1033
Other typical location <disk drive>:\Program Files\Common Files\System\Mapi\1033\
For Windows NT and Windows 2000 <disk drive>:\Program Files\Common Files\System\Mapi\1033\NT
For Windows 95 and Windows 98 <disk drive>:\Program Files\Common Files\System\Mapi\1033\95

Permalink.

How to Fix Win10 Mail App Error 0x8007139f

By default the Windows 10 Mail App should have access to your email. However, if you have modified your Privacy Settings in Windows 10 then you may receive an error when attempting to add an account or retrieve email using the Mail App. To resolve Error 0x8007139f follow the steps below:

  1. To begin open the Settings menu
  2. Go to Privacy
  3. Select Email from the list of options in the left-hand pane.
  4. Enable Allow Apps to Access Your Email and make sure the Mail and Calendar option below is also enabled.

If these options are already enabled when you enter the menu, disable them, Restart your computer, then re-enable them. After your computer restarts, the Windows Mail app will allow you to use the app without error 0x8007139f.

Permalink.

How does Spam Filtering work?

When a sender’s Mail Server attempts to connect to your Mail Server to deliver email, we first check the sender’s Mail Server against our Blacklist of known abusers (Brute-Force Hackers, Email Harvesters, and High Volume Spammers) . If they are listed then the connection is dropped as if your Mail Server does not exist. We routinely block @ 8 million connections every day from a list of  127,000-500,000 known abusers that are continuously updated.

If they pass this primary test, we then say “HELLO” to the sender’s Mail Server and ask them to identify themselves and who they are sending mail for. If the identity of the sender’s Mail Server is not a FQDN (Fully Qualified Domain Name) or cannot be verified through a rDNS (Reverse Domain Name System) lookup then their email is not accepted for delivery. However, if the identity of the sender’s Mail Server checks out as valid then the sender’s address is also checked against a list of known Spam domains and email addresses. If the sender is listed then their email is not accepted for delivery. If they fail either verification then the sender should receive a NDR (Non-Deliverable Response) from their Mail Server telling them that the message was undeliverable due to Spam Filters. If, on the other hand, either the sender’s email address or their Mail Server is recognized as “Trusted Sender” then the message goes straight to your Inbox.

If the sender’s email address seems okay but your Mail Server does not recognize the sender as either a Trusted Sender or as having sent email to you in the past 288 days (10 months), then we ask the sender’s Mail Server to please try again in 120 seconds. This waiting period is called Greylisting and is really effective at stopping Spam because  most spammers do not attempt redelivery, whereas legitimate Mail Servers are required to attempt redelivery a minimum of 4 times. A two minute waiting period for an email from an unrecognized sender might seem to be an inconvenience but Greylisting can be 90% effective at reducing Spam as spammers have more than plenty Junk E-Mail to deliver elsewhere to bother returning 120 seconds later to deliver just to you.

Once the message passes Greylisting, or is recognized by your Mail Server for having sent email to you in the past 288 days, then the message is subjected to 179 tests to determine if it is Spam (Junk E-Mail). Each test assigns the message a score, ranging from a maximum of -10 for each HAM (the opposite of Spam) and Whitelist checks it passes to 1-20 (with an average of 5-10) for each RBL (Realtime Block List), URIBL (Uniform Resource Identifier Block List), Checksum, Content Filter, or Bayesian/Statistical check it fails. After all of these tests are run the total score is tallied and an action is determined based on a scale of -100 to +100 as follows:

Email

Total Score Threat Level Default Action
-100 to 9 Good Deliver to Inbox
10 to 19 Low Prefix Subject with “Junk EMail:”. Deliver to Inbox
20 to 29 Medium Quarantine in Junk EMail Folder
30 to 49 High Quarantine in Junk EMail Folder
50 to 100 Severe Reject Message/Bounce back to Sender

By default most email clients (Outlook, Windows Live Essentials, Apple Mail, Thunderbird, etc.) do not download the contents of their Junk EMail Folder and this folder is normally accessible only through your webmail account. If your email client is using IMAP or EWS to synchronize with your email account you should be able to manually subscribe to this folder if it is not already subscribed.

If desired, you can also override the way that your Mail Server handles Low, Medium, and High probability of Spam messages by logging in to your webmail account at https://smartermail.scarabmedia.com  and going to SETTINGS > FILTERING > SPAM FILTERING. You can choose what actions you want taken for these three levels. Your options are NO ACTION, MOVE TO FOLDER, ADD TEXT TO SUBJECT, or DELETE.

 

Permalink.

View category→

Setting Up Email Client (19)

Setup Mac Mail (OS X Version 10.14 “Mojave”) for IMAP or POP

Mac Mail Setup

In this tutorial we will be guiding you through the process of configuring email on Mac Mail. We are using Mac Mail on OS X Version 10.14 “Mojave”. If you are using a different version or operating system, these instructions may differ.

Step 1: Add Account

Launch Mac Mail, click on Mail and then select Preferences.

Step 2: Add New Account

Click the [Accounts] button at the top.

 

Then click on the [+] button in the lower-left corner.

Step 3: Select Account Type

From the list of providers choose Add Other Mail Account and click Continue.

 

Step 4: Enter Account Information

Enter the following information:

Full Name: This is the name that will appear on all outgoing mail from this account.
Email Address: The full email address of your account (i.e. yourname@yourdomain.com).
Password: The password of your email account.

 

 

Then click Create.

 

Step 5: Manually Configure Account

The system will prompt you that manual account configuration is required. Click Next.

 

Enter the following information:

Account Type: We recommend IMAP if you are using multiple devices. If you prefer you can choose POP instead, or if this is your only device.
Mail Server: smartermail.scarabmedia.com
User Name: Your full email address (i.e. yourname@yourdomain.com).
Password: Your email account password.

Step 6: Enter Server Settings

Enter the following information:

Incoming Mail Server (IMAP)

Automatically manage connection settings: Off
Port: 993 (IMAP) or 995 (POP)
Use TLS/SSL: Yes
Authentication: Password

Outgoing Mail Server (SMTP)

Automatically manage connection settings: Off
Port: 587
Use TLS/SSL: Yes

Permalink.

Setup Mac Mail (OS X) for IMAP

To add your email account to Mac Mail on OS X El Capitan (v. 10.11) as an IMAP account, follow the instructions below:

    1. Open the Apple Mac Mail app and click the Mail menu from the top left of the screen and then select Add Account > Other Mail Account and click on the [Continue] button.
      macmail_imap1
    2. Fill in your name, email address, and your password. Click on the [Sign In] button.
      mailmail_imap2
    3. In the new window select Account Type (IMAP/POP). Either option you choose, apply the same settings going forward.macmail_imap3
    4. For both the Incoming and Outgoing Mail servers enter: smartermail.scarabmedia.com
    5. Click the [Sign-In] button. You have now completed setting up e-mail on El Capitan’s Mail app. You can send and receive your email on your email client using a secure connection.

You may also want to take this time to make the following adjustments to your Mac Mail app:

Permalink.

Setup Mac Mail (OS X) for EWS

Exchange Web Services (EWS) is a newer data synchronization protocol that seamlessly syncs email messages, contacts and calendars with Apple Mail, iCal and Address Book.

Follow these steps to set up Apple Mail to sync with SmarterMail via Exchange Web Services :

  1. On your Mac, open System Preferences.
  2. Click Internet accounts.
  3. Click Exchange.
  4. Complete the display name, full email address and password fields.
  5. Click Next.
  6. Enter the URL https://smartermail.scarabmedia.com/ews/exchange.asmx 
  7. Click Next.
  8. An account summary screen will display. Click Continue.
  9. Click Add Account.

Apple Mail is now configured to sync with SmarterMail. Depending on how much data there is to synchronize, the first sync may take a few minutes.

NOTE: For mailboxes that store large volumes of email (>5000 messages or several GB in size), it is highly recommended that they be set up to connect using IMAP instead as EWS performance may suffer when processing large volumes of email.

Permalink.

Setup Outlook 2011 or 2016 (OS X) for EWS

Exchange Web Services (EWS) is a newer data synchronization protocol that seamlessly syncs SmarterMail messages, contacts and calendars with Microsoft Outlook 2011 or 2016 for Mac.

Follow these steps to set up Outlook 2011 or 2016 to sync using Exchange Web Services:

  1. Open Outlook.
  2. Open the Outlook menu and select Preferences.
  3. Click the Accounts icon.
  4. Click the Exchange icon which will open a new window.
  5. Enter your email address.
  6. Set the Method to “User Name and Password.”
  7. Enter your full email address (e.g. user@example.com) as the username.
  8. Enter the associated password in the password field.
  9. Uncheck the Configure automatically checkbox.
  10. In the Server field, enter the URL https://smartermail.scarabmedia.com
  11. Click Add Account.

Outlook is now configured to sync with SmarterMail. The initial sync may take a few minutes if there is a lot of data.

NOTE: For mailboxes that will store large volumes of email (> 5000 messages or several GB in size), it is highly recommended that they be set up to connect using IMAP as EWS performance may suffer when processing large volumes of email.

Permalink.

Setup Apple iOS (iPhone and iPad) for IMAP

To add your email account to Apple iOS (iPhone or iPad) as an IMAP account, follow the instructions below:

1. From your device’s main screen click on the SETTINGS icon.

2. Select MAIL, CONTACTS, CALENDARS from the left-hand Settings pane (Newer versions of iOS will have PASSWORDS & ACCOUNTS instead).

ios_imap01

3. Click on ADD ACCOUNT Account Settings pane.

4. Select OTHER from the Add Account screen.

ios_imap02

5. Click on ADD MAIL ACCOUNT in the right-hand Other Settings pane.

ios_imap03

6. Enter your Name, Email Address, Password, and a Description into the New Account fields, as below, and click on the [NEXT] button when complete.

ios_imap04

7. Enter the following information on the IMAP screen, as below, and click on the [NEXT] button when complete.

For both the Incoming Mail Server and Outgoing Mail Server enter the following:

Host Name: smartermail.scarabmedia.com
User Name: your full email address (i.e. johndoe@mydomain.com)
Password: your password

 

ios_imap05

8. Once it is complete VERIFYING these settings, you should have the screen below and can click on the [SAVE] button.

ios_imap06

After following these steps if you experience problems sending email please see https://news.scarabmedia.com/help-center/i-cannot-send-email-with-ios-device-iphoneipad/ for an additional changes that you will have to make to the advanced Outgoing SMTP Server settings on your Apple iOS device.

Permalink.

View category→

Passwords (3)

How do I change my email password?

Changing your email password is pretty simple. Just follow the step-by-step instructions with screenshots below to change your password.

1.  Sign-in to your web-based email at http://smartermail.scarabmedia.com using your email address and your old password.

pword01

2.  If this is the first time that you have logged in to your web-based mail you may be prompted for your Time Zone, Country, and Postal Code so that your mail is displayed in local time (otherwise skip to Step 4). Select your Time Zone and Country and enter your Postal Code and click on the [NEXT] button.

pword02

3.  You may then be prompted for an Account Recovery Email Address. This address is used in the event that you forget your password and want a Password Recovery email sent to your backup address. If you have a personal account (i.e. GMail, Yahoo!, Hotmail, etc) that you also use, enter it here and click on the [FINISH] button.

pword03

4.  At the main screen of your web-based mail, click on the SETTINGS (Gear) icon in the left-hand pane.

pword04

5.  Enter your new password into the “New Password” and “Confirm Password” fields. Click on the [SAVE] button at the top of the screen when you are done.

Please note the minimum requirements for a new password:

  • 8 or more characters (12 or more recommended)
  • Mixed-Case (UPPER and lower case letters)
  • At least one number
  • At least one symbol (i.e. ` ~ ! @ # $ % ^ & * ( ) – _ = + [ { } ] \ | < , . > / ? ; : ‘ “)
  • Must not contain your User Name

pword05

6.  If you are using an email client (such as Outlook, Thunderbird, Apple Mail, or a tablet or smartphone) to retrieve your mail, you will have to update your email password there as well after changing it in your web-based mail.

Permalink.

How to Keep Your Password Safe

Although it should be a matter of common sense, people tend to overlook best practices for the sake of convenience.

  1. Create unique password every time. When you are changing a password for an existing account, it should never be the same as the previous password. Also, do not use incremental passwords when changing it. i.e password1, password2, password13, password14, etc. If ever an old password is leaked to the internet and your account would be compromised in a minimal number of tries. A new password should be distinctly unique, and strong (random, Mixed Case Letters, also containing numbers and symbols).
  2.  

  3. Change your passwords once every 6 – 12 months. Since passwords have a fixed length (commonly 8 -16 characters), a brute-force attack to guess the password will always succeed if enough time and processing power is available to the attacker. So, it is only a matter of time before your password is compromised, no matter how secure it may be. It is therefore always recommended to change the passwords frequently. Schedule an recurring appointment on your calendar to change your passwords once every 6 – 12 months.
  4.  

  5. Never keep the same password for different sites. It is very tempting to create one set of passwords for all your email accounts, another password for all the banking sites, another password for all the social networking sites, etc. It is very important to keep unique passwords for each and every one of your accounts. If you have trouble remembering more than one password (and who doesn’t) then by all means use a Password Manager to keep track of them for you.
  6.  

  7. Never send your password in an email.  It is a common Phishing scam for hackers to send emails as a support technician asking for your username and password through email. Legitimate website or organization will never ask you for your username and password. Likewise, email accounts can be forwarded or compromised, resulting in your password sent to a trusted person being compromised as well.
  8.  

  9. Change passwords immediately when they are compromised. If ever you have the slightest suspicion that your password has been compromised, change it immediately! Don’t waste a single minute thinking about it.
  10.  

  11. Don’t use the “Remember password” option on the browser without setting a Master Password first. It is a temptingly useful feature of modern web-browsers to offer to store your username and passwords. You certainly can take advantage of this feature but only if you have enabled the “Master Password” option. For example: If you do not set master password on the Firefox browser, anybody who uses your Firefox browser (or any malware or virus that affect your computer) can see (and use) all the passwords that you have previously stored. Also, be very careful with this option when using a computer that doesn’t belong to you and always choose “Not Now” in the remember password pop-up.
  12.  

  13. Don’t type your password on a computer that does not belong to you. If possible, don’t use someone else computer that you don’t trust implicitly to login to any website, especially to very sensitive websites such as financial institutions. It is a very common practice for hackers to use keyloggers that will log all the key strokes on a system, which will capture everything you type including the passwords. Even if you do trust the person, resist the urge to enter passwords to sensitive accounts as their device may be infected with malware or viruses that have installed a keylogger.This same rule applies when using a device connected to Wi-Fi that doesn’t belong to you. It is a trivial matter for a malicious person to monitor internet activity over Wi-Fi and capture your usernames and passwords. If you have to login to an account over Public Wi-Fi be sure that your connection is encrypted before doing so.
  14.  

  15. Never write down your passwords. Creating a very strong password and writing it down on a paper is almost as bad as creating an easy to remember weak password and not writing it down anywhere.  It is an all too common practice for people to write down their passwords and keep it somewhere next to the computer. You should never write down the password on a paper. Papers can be lost, they can be read by others (including visitors, on-site technicians, and even by hackers if you have a webcam). If you want to carry your password around with you all the times, consider using a password manager that runs from USB stick.
  16.  

  17. Don’t share with anyone. Although we are taught as children that sharing is good, sharing your passwords is bad. Passwords are like underwear, you really shouldn’t share them with anybody, under any circumstances. And by “anybody” this includes family members, spouses, and children. It’s not a matter of trust (or lack thereof) as much as it is a matter of safety and security.
  18.  

  19. Don’t type your password when someone is looking over your shoulder. This is especially very important if you type slowly and search for the letters in the keyboard and type with one finger, as it is very easy for someone looking over your shoulder to figure out the password. If you wouldn’t let someone look over your shoulder when entering your Credit Card PIN number into an ATM, why would you want someone looking over your shoulder when entering your password?

Permalink.

Top 500 Worst Passwords

Rarely a day goes by when another high-profile provider is compromised due to weak or insecure passwords. To date over 1.2 Billion account passwords have been leaked to the internet for use by hackers and script-kiddies. The saddest thing is that the vast majority of these passwords consist of, or contain, the same 500 phrases. As such, our system blocks the use of any kind of variation of these passwords. New passwords must not contain or consist of a variation of the following 500 most commonly used passwords:

123456 password 12345678 1234 pussy
12345 dragon qwerty 696969 mustang
letmein baseball master michael football
shadow monkey abc123 pass fuckme
6969 jordan harley ranger iwantu
jennifer hunter fuck 2000 test
batman trustno1 thomas tigger robert
access love buster 1234567 soccer
hockey killer george sexy andrew
charlie superman asshole fuckyou dallas
jessica panties pepper 1111 austin
william daniel golfer summer heather
hammer yankees joshua maggie biteme
enter ashley thunder cowboy silver
richard fucker orange merlin michelle
corvette bigdog cheese matthew 121212
patrick martin freedom ginger blowjob
nicole sparky yellow camaro secret
dick falcon taylor 111111 131313
123123 bitch hello scooter please
porsche guitar chelsea black diamond
nascar jackson cameron 654321 computer
amanda wizard xxxxxxxx money phoenix
mickey bailey knight iceman tigers
purple andrea horny dakota aaaaaa
player sunshine morgan starwars boomer
cowboys edward charles girls booboo
coffee xxxxxx bulldog ncc1701 rabbit
peanut john johnny gandalf spanky
winter brandy compaq carlos tennis
james mike brandon fender anthony
blowme ferrari cookie chicken maverick
chicago joseph diablo sexsex hardcore
666666 willie welcome chris panther
yamaha justin banana driver marine
angels fishing david maddog hooters
wilson butthead dennis fucking captain
bigdick chester smokey xavier steven
viking snoopy blue eagles winner
samantha house miller flower jack
firebird butter united turtle steelers
tiffany zxcvbn tomcat golf bond007
bear tiger doctor gateway gators
angel junior thx1138 porno badboy
debbie spider melissa booger 1212
flyers fish porn matrix teens
scooby jason walter cumshot boston
braves yankee lover barney victor
tucker princess mercedes 5150 doggie
zzzzzz gunner horney bubba 2112
fred johnson xxxxx tits member
boobs donald bigdaddy bronco penis
voyager rangers birdie trouble white
topgun bigtits bitches green super
qazwsx magic lakers rachel slayer
scott 2222 asdf video london
7777 marlboro srinivas internet action
carter jasper monster teresa jeremy
11111111 bill crystal peter pussies
cock beer rocket theman oliver
prince beach amateur 7777777 muffin
redsox star testing shannon murphy
frank hannah dave eagle1 11111
mother nathan raiders steve forever
angela viper ou812 jake lovers
suckit gregory buddy whatever young
nicholas lucky helpme jackie monica
midnight college baby cunt brian
mark startrek sierra leather 232323
4444 beavis bigcock happy sophie
ladies naughty giants booty blonde
fucked golden 0 fire sandra
pookie packers einstein dolphins 0
chevy winston warrior sammy slut
8675309 zxcvbnm nipples power victoria
asdfgh vagina toyota travis hotdog
paris rock xxxx extreme redskins
erotic dirty ford freddy arsenal
access14 wolf nipple iloveyou alex
florida eric legend movie success
rosebud jaguar great cool cooper
1313 scorpio mountain madison 987654
brazil lauren japan naked squirt
stars apple alexis aaaa bonnie
peaches jasmine kevin matt qwertyui
danielle beaver 4321 4128 runner
swimming dolphin gordon casper stupid
shit saturn gemini apples august
3333 canada blazer cumming hunting
kitty rainbow 112233 arthur cream
calvin shaved surfer samson kelly
paul mine king racing 5555
eagle hentai newyork little redwings
smith sticky cocacola animal broncos
private skippy marvin blondes enjoy
girl apollo parker qwert time
sydney women voodoo magnum juice
abgrtyu 777777 dreams maxwell music
rush2112 russia scorpion rebecca tester
mistress phantom billy 6666 albert

So, for example, using the password of “Pa$$w0rd”, “P@ssword”, or “p455word” would neither be advisable or allowed, as these are all a variation of the 101st most commonly used password. Likewise the password of “TimeLord” would not be advisable or allowed either as this contains the 495th most commonly used password “time”.

For a password to be truly effective it should neither contain a name or a word found in a dictionary (in any language). It should be a randomly chosen series of letters (of Mixed Case), numbers, and symbols. For help with choosing a secure password see https://news.scarabmedia.com/help-center/guide-to-creating-strong-passwords. It is important, both to protect yourself, as well as to protect the integrity of the Hosting Services you share, to use strong and secure passwords.

A series of more comprehensive lists of commonly used passwords can be found at https://github.com/danielmiessler/SecLists/tree/master/Passwords

Permalink.

View category→

Web-based Mail (7)

How to change your Spam Filtering Preferences

There may be times that you find your email Spam Filters to be too aggressive or not aggressive enough for your individual preferences. You have a large amount of control over how incoming Spam is handled by your email account. You can modify your Spam Filtering preferences by following the steps below:

  1.  Logon to your web-based mail at https://smartermail.scarabmedia.com.
  2.  Click on the SETTINGS icon in the left-hand pane (as shown below)
  3.  Under Settings click on FILTERING to expand that submenu (as shown below)
  4.  Click on SPAM FILTERING (as shown below)
  5.  Select “Override spam settings for this account” (as shown below)

6.  Click on the ACTIONS tab in the right-hand pane (as shown below)
7.  For Low Probability of Being Spam click the down arrow under ACTION and select how you want these scored emails to be handled. You can select “No Action” to have them go directly to your Inbox,  “Add Text to Subject” to have them delivered to your Inbox but with a modified Subject letting you know they may be Junk E-Mail, “Move to Junk E-Mail Folder” to have them quarantined, or “Delete Message” to have the message removed entirely upon receipt.
8.  Repeat Step 7 for Medium Probability of Spam.
9.  Repeat Step 7 for High Probability of Spam.
10. Click on the [SAVE] button at the top of the screen to commit your changes.

Permalink.

Enable 2-Step Authentication

2-Step Authentication adds an extra layer of protection to your email account. It ensures that only YOU can access your account, even if someone knows your password.

How it works

When your account is protected with 2-Step Authentication, logging in to your webmail requires two methods of authentication: your email account password and a verification code that’s only available to you.
 
2-Step Authentication also ensures hackers can’t access your account via third-party applications. In order to configure your email account in third-party applications (including email clients like Outlook, eM Client, Apple Mail, etc.), you must use a unique “Application Password” that is only accessible by logging into your account online.
 

Configuring 2-Step Authentication

You can configure 2-Step Authentication from within your account settings (under SETTINGS > ACCOUNT > 2-STEP AUTHENTICATION > [ENABLE]).
 
The first step in configuring 2-Step Authentication is choosing your preferred verification method: Authenticator App or Recovery Email Address.
 
Retrieve code via Recovery Email Address
Each time you log in, the verification code will be sent to an alternative email address.
 
    1. Select Recovery Email Address from the Verification Methods dropdown.
    2. Enter and confirm the Recovery Email Address that will be used to retrieve the verification code. (This email address will automatically be used as the Recovery Email Address used for resetting your account password as well.)
    3. Click Next.
    4. Wait a moment for the verification code to be emailed. Then enter the 6-digit verification code.
    5. Click Check to confirm the verification code and complete the 2-Step Authentication setup.
 
Retrieve code via Authenticator App
Each time you log in, you’ll retrieve the verification code from an authenticator app.
 
    1. Install an authenticator app, such as Google or Microsoft Authenticator, Authy, or LastPass on your phone or computer. (In this article, we’ll demonstrate how to set up 2-Step Authentication using Google Authenticator on your mobile device.)
    2. Select Authenticator App from the Verification Methods dropdown.
    3. Enter and confirm a Recovery Email Address that will be used as an alternative method to retrieve the verification code. If your authenticator app is not accessible, the verification code will be sent to this address instead. (This email address will automatically be used as the Recovery Email Address used for resetting your account password as well.)
    4. Click Next. A QR code will appear on the next page.
    5. Open the Google Authenticator app. Click “BEGIN SETUP” or use the plus (+) icon to add a new token.
    6. Select Scan QR Code and use your phone’s camera to scan the code that’s displayed in your webmail. A new token will be added to Google Authenticator.
    7. Enter the token’s 6-digit code into the field in your webmail.
    8. (If you can’t scan the QR code, click on “Can’t scan the QR code?” in your webmail. In the Authenticator app, choose to create a new token by Manual entry. In the Account field, enter a token descriptor, such as the username of your account. In the Key field, type in the secret key that’s displayed in the webmail. Then enter the token’s 6-digit code into your webmail.)
    9. Click Check to confirm the verification code and complete the 2-Step Authentication setup.
 

Logging in with 2-Step

To log in to your webmail, enter your email address and password. Then enter the 6-digit verification code that’s sent to your email or displayed in the authenticator app’s token.

Configure Third-party Applications with App Passwords

Note that once 2-Step Authentication is set up for your account, you will also need to re-configure any third-party applications or email clients using the “Application Passwords” that are automatically generated and displayed in Account Settings. Be sure to use the correct password for the corresponding protocol.

Permalink.

Do I have to use Web-based Mail?

Short answer: Absolutely not!

Long answer: You can use any email client of your choosing to access your email using either POP3 or IMAP. The Web-based Mail is just another way you can check your mail (especially if you are away from your preferred device). You can also choose to access your email using your smartphone if you wish. You are not limited to using the Web-based Mail to retrieve your email.

Note: To manage email for your domain or make changes to your account, you would need to either do this from the Web-based Mail, or you can contact us at support@scarabmedia.com and have us make the change for you.

Permalink.

How do I retrieve emails using another provider’s webmail?

Almost all Mail Providers offering webmail allow you to remotely retrieve email from other external accounts. If you prefer using your existing webmail, such as Google, Outlook.com, or Yahoo! Mail) you can configure that account to retrieve your email from your email account(s) hosted at AHN/ProjectA/Scarab Media.

Simple login to your preferred wemail account and follow the appropriate instructions below:

In all cases the settings you will need are below:

POP3/IMAP Server: smartermail.scarabmedia.com
Port: 110 (for POP3) or 143 (for IMAP)
Use TLS: Yes
Username: Your full email address (i.e., yourname@yourdomain.com)
Password: The password for your account.

Many services will also allow you to remotely send email using their account. In such cases the settings are precisely the same as for retrieving mail, the only difference would be the Port which would be 587.

Permalink.

I get an error message when logging in to my webmail

This article applies if you are receiving a similar error when logging into your webmail account:

 Page:

/Login.aspx

Message:
The page or resource that you are accessing is unavailable or an error has occurred.

This specific webmail error is actually caused by outdated cookies being stored in your browser.

If you clear your browser’s cookies, you should have no problem logging in to web mail once more. You can find instructions on clearing your cookies here.

Permalink.

View category→

General Hosting (3)

I have a question. How do I get assistance?

You can contact our General Support by phone during regular business hours at  (541) 488-1702. If there is an emergency outside of our regular business hours you can contact our Emergency Support at (541) 488-1702 x301. This will page our on-call technicians, and you will receive a response within 2 hours. In your message, please make sure you leave your full name, organization name, domain name, and a phone number where you can be reached.

You may also contact our General Support by email at support@scarabmedia.com. We respond to all requests received before 5pm Pacific Time M-F the same day, or next business day for requests received after-hours.

You can also submit a Support Ticket any time. We respond to all Support Tickets received before 5pm Pacific Time M-F the same  day, or the next business day for requests received after hours.

Permalink.

I already contacted Support but haven’t heard back yet.

Scarab Media provides in-house Technical and Customer Support. We are available Monday – Friday from 9am – 5pm Pacific Time (and after-hours for Emergency Support).

If your request was received outside of business hours (after 5pm, on a weekend, or on a national holiday) then we will contact you immediately the next business day.

If for some reason you haven’t heard back from us the next business day, then it is possible that your email/voicemail may have not reached us. In such a case give us a call direct at (541) 734-7308 (or Toll-Free at 1-888-755-7308), or file a Support Ticket.

Permalink.

Do you have a backup of my website?

Scarab Media, Project A, Inc. keeps a rotating backup of nightly, weekly, and monthly snap-shots of all Hosting services which are kept offsite for disaster recovery. We can restore a backup of an individual file or your entire site upon request, usually in the span of a few minutes.

For previous customers who have cancelled Hosting services with us we provide a link to a backup of your site upon cancellation which is valid for 30 days. After that we may retain a backup for up to 6 months after cancellation, we can make no guarantees of such, but we will gladly take a look for you if you ask.

We certainly do NOT retain backups of your website indefinitely. It is an unfortunately common occurrence for us to receive desperate requests for a backup of their Hosting two, four, seven, and even ten years after cancellation!

If your data is important to you then we strongly recommend that you treat it importantly by retaining your own backups (notice the plural) of your website in multiple locations.

Permalink.

View category→

Registration (3)

Registering a Domain Name

Registering a domain name provides an easy way for people to find your website and build credibility on the Internet. You can use domain names to support your business and assist in creating a dynamic online presence. Your domain name establishes your online identity and increases branding, marketing and communication opportunities. You can Register multiple domain names to:

  • Keep your competition from registering a domain name that draws customers away from you.
  • Promote the products and services you offer.
  • Drive more traffic to your website.
  • Enjoy more opportunities to market to — and be listed on — search engines.
  • Create distinct advertising strategies to reach different target markets.
  • Provide customers more ways to find you on the Internet.
  • Capture common misspellings of your domain name, instead of sending visitors to an error page.
  • Protect your brand and online identity from unsavory parties.

To get started, check to see if the domain name you want is available. If available, either contact us and we can register the domain for you, or you can go to Check-Out and register the domain name for a period of time you specify.

Checking a Domain Name’s Availability

  1. Go to our Registration Home Page.
  2. In the Domain Name Search field, enter the domain name you want to register, and then select the domain name extension from the list.
  3. Click GO.

If the domain name you requested is already registered, we provide available alternatives. For example, you might be able to select a .info or .ws domain extension, rather than .com. Or you could register www.coolexample.info instead of www.coolexample.com.

If the domain name is available, follow the instructions to complete the checkout process. Be sure to include valid contact information for each contact. The Internet Corporation for Assigned Names and Numbers (ICANN), the governing body for domain names, requires valid contact information (registrant, technical, billing, and administrative). If you enter false information, your domain name can be canceled.

Your contact information is public and accessible through the Whois database at most registrars. However, you can protect your privacy by registering your domain name with us using our private domain name registration services.

When you purchase a private domain name registration through our affiliate company, Domains By Proxy® (DBP), the Whois database lists DBP’s name, postal address, and phone number — instead of your personal contact information.

Permalink.

Can I (and should I) register more than one domain name?

If you’re thinking about registering more than one domain name, you’ve got the right idea. Registering and using multiple domains names is great for building your business, protecting your brand name, and creating a dynamic online identity.

When you register multiple domain names, you can:

  • Keep your competition from registering a similar domain name drawing customers to them instead of you
  • Promote the different products and services you offer
  • Drive more traffic to your website
  • Enjoy more opportunities to market to — and be listed in — search engines
  • Create distinct advertising strategies reaching different target markets
  • Provide customers more ways to find you when searching the Internet
  • Capture common misspellings of your domain name, instead of sending visitors to an error page
  • Protect your brand and online identity

Permalink.

My domain expired! Can I get it back?

Domain names are registered in one year increments (up to a maximum of 10 years). Most people will commonly renew their domains every year. A lot can happen in a year (let alone 10 years); contact email addresses may change, your bank may issue you a new Credit/Debit Card number, your phone number may have changed, you may have moved, etc. When such changes occur you may not have received your invoices for your annual renewal (we bill 30-60 days before expiration), or your Credit/Debit Card on file for auto-pay may have expired. In such cases we will make every effort to contact you at your last known email address, phone number, and physical address, but unless we successfully get a hold of you to update your payment information your domain name may not be renewed on time.

It happens sometimes. Besides renewing your domain for multiple years at a time, or just remembering to keep us updated to any changes in your contact information or billing information, your domain will enter a 30-day Grace Period after it expires. During this Grace Period your domain can be renewed for it’s normal cost. It’s all good…let out a big sigh of relief.

However, after the 30-day Grace Period your domain is held by our Registrar in a Redemption Period. Registrars can hold an expired domain for up to a maximum of one year after expiration in this Redemption Period. During this time we can “redeem” your domain, but at whatever increased cost the Registrar is asking for the domain. In many cases your domain can be redeemed for around $150 (which includes a 1 year renewal), but if your domain is a high-profile domain the cost to redeem may be $5000 or more.

In such cases, you have three options:

  1. You can pay the Redemption fee. If your domain is that good and that important, then it’s probably worth it.
  2. We can back-order your domain and when it is released from the Redemption Period by the Registrar it will be automatically re-registered for you. Back-orders cost $20.00. A back-ordered domain may take anywhere from 45 days to a year before it becomes re-registered (assuming no one else pays the Redemption fee before then for your domain).
  3. We can order an alternate domain for you that is similar to your original domain. Domain registrations are $15.00 a year.

Permalink.

View category→

DNS (2)

Why can’t I see my new website

If changes have been made to your Domain Name, such as changing your DNS (Domain Name Service) Servers, or making any changes to your domain zone records in DNS, then DNS or Domain Propagation must occur. Domain Propagation may take anywhere from a few minutes to as long as 24-72 hours.

When a visitor tries to visit your website their computer contacts the DNS Servers belonging to their ISP (Internet Service Provider). These DNS Servers then query the registration database to find out who the DNS authority is for your website. Then they visit our DNS servers to find out what the IP Address is for your domain name, and from there your visitor can view your website.

The problem with this is that in order to speed up the rate at which their customers can view the internet, some Internet Server Providers tend to cache non-authoritative DNS records. This means that they make a copy of the master records and read from them locally instead of looking them up on the Internet each time one of their customers wants to view a website. This can create the appearance of speeding up web surfing by a few milliseconds, by reducing the return time it takes for a web browser to request a domain lookup and get an answer, and also reducing the amount of overall traffic on their service.

The downside to caching and why it takes so long for your website to be visible to everyone is that each ISP that caches DNS records only updates them every few days. There is unfortunately no standard for how this is handled, and although the practice is widely discouraged, this time can be set anywhere from a few hours to several days by some ISPs. The slow updating of the DNS server cache is called Domain Propagation, as changes to your domain name’s DNS information are being propagated across all DNS servers on the internet. Once this is complete everyone can visit your new website. Being that the cache time is different for all DNS servers, as mentioned above, it can often take anywhere from 24 to 72 hours for DNS changes to be totally complete.

Please note that all non-caching DNS Servers will see the changes to your domain’s DNS immediately. Google’s DNS Servers and OpenDNS, and most Public DNS Servers are non-caching.

Permalink.

How long does DNS Propagation take

Non-caching DNS (Domain Name Services) Servers will see your domain changes immediately. Caching DNS Servers may take anywhere from a few minutes to as long as 24-72 hours to propagate your domain changes.

Permalink.

View category→

Domains (2)

What is a Domain Name?

A domain name represents a physical point on the Internet — an IP address. The Internet Corporation for Assigned Names and Numbers (ICANN) governs coordination of the links between IP addresses and domain names across the Internet. With this standardized coordination, you can find websites on the Internet by entering domain names instead of IP addresses into your Web browser.

Here’s an example: Think of a street address for a house or business — let’s say the White House. The street address, 1600 Pennsylvania Avenue, is an exact location — like an IP address. You might not know the exact street address, but when you visit Washington, D.C., you can tell your cabbie that you want to visit the White House and still get there. This is how a domain name is used: It’s an easy way to reach the exact location of a website without having to remember the numeric address.

A domain name consists of, at least, a top-level and a second-level domain. See What are top-level domains (TLD) and country code top-level domains (ccTLD)? and What are second-level domains (SLD) and country code second level domains (ccSLD)? for information on these terms. Domain names must be registered with an ICANN-accredited registrar. We are an ICANN-accredited registrar, and you can register domain names through us.

Many TLDs, also called extensions, can be registered by anyone. The extensions .com, .net, and .org are good examples that anyone can register.

Others, primarily country-code extensions (ccTLDs), have residency requirements — like .eu (representing the European Union) and .us (representing the United States).

Still others, like .aero, .biz, .edu, .mil, .museum, .name, and .pro, are restricted to a certain type of entity or community — like .edu, which is reserved for educational entities and .gov, which is reserved for government agencies.

Permalink.

Registering a Domain Name

Registering a domain name provides an easy way for people to find your website and build credibility on the Internet. You can use domain names to support your business and assist in creating a dynamic online presence. Your domain name establishes your online identity and increases branding, marketing and communication opportunities. You can Register multiple domain names to:

  • Keep your competition from registering a domain name that draws customers away from you.
  • Promote the products and services you offer.
  • Drive more traffic to your website.
  • Enjoy more opportunities to market to — and be listed on — search engines.
  • Create distinct advertising strategies to reach different target markets.
  • Provide customers more ways to find you on the Internet.
  • Capture common misspellings of your domain name, instead of sending visitors to an error page.
  • Protect your brand and online identity from unsavory parties.

To get started, check to see if the domain name you want is available. If available, either contact us and we can register the domain for you, or you can go to Check-Out and register the domain name for a period of time you specify.

Checking a Domain Name’s Availability

  1. Go to our Registration Home Page.
  2. In the Domain Name Search field, enter the domain name you want to register, and then select the domain name extension from the list.
  3. Click GO.

If the domain name you requested is already registered, we provide available alternatives. For example, you might be able to select a .info or .ws domain extension, rather than .com. Or you could register www.coolexample.info instead of www.coolexample.com.

If the domain name is available, follow the instructions to complete the checkout process. Be sure to include valid contact information for each contact. The Internet Corporation for Assigned Names and Numbers (ICANN), the governing body for domain names, requires valid contact information (registrant, technical, billing, and administrative). If you enter false information, your domain name can be canceled.

Your contact information is public and accessible through the Whois database at most registrars. However, you can protect your privacy by registering your domain name with us using our private domain name registration services.

When you purchase a private domain name registration through our affiliate company, Domains By Proxy® (DBP), the Whois database lists DBP’s name, postal address, and phone number — instead of your personal contact information.

Permalink.

Can I (and should I) register more than one domain name?

If you’re thinking about registering more than one domain name, you’ve got the right idea. Registering and using multiple domains names is great for building your business, protecting your brand name, and creating a dynamic online identity.

When you register multiple domain names, you can:

  • Keep your competition from registering a similar domain name drawing customers to them instead of you
  • Promote the different products and services you offer
  • Drive more traffic to your website
  • Enjoy more opportunities to market to — and be listed in — search engines
  • Create distinct advertising strategies reaching different target markets
  • Provide customers more ways to find you when searching the Internet
  • Capture common misspellings of your domain name, instead of sending visitors to an error page
  • Protect your brand and online identity

Permalink.

My domain expired! Can I get it back?

Domain names are registered in one year increments (up to a maximum of 10 years). Most people will commonly renew their domains every year. A lot can happen in a year (let alone 10 years); contact email addresses may change, your bank may issue you a new Credit/Debit Card number, your phone number may have changed, you may have moved, etc. When such changes occur you may not have received your invoices for your annual renewal (we bill 30-60 days before expiration), or your Credit/Debit Card on file for auto-pay may have expired. In such cases we will make every effort to contact you at your last known email address, phone number, and physical address, but unless we successfully get a hold of you to update your payment information your domain name may not be renewed on time.

It happens sometimes. Besides renewing your domain for multiple years at a time, or just remembering to keep us updated to any changes in your contact information or billing information, your domain will enter a 30-day Grace Period after it expires. During this Grace Period your domain can be renewed for it’s normal cost. It’s all good…let out a big sigh of relief.

However, after the 30-day Grace Period your domain is held by our Registrar in a Redemption Period. Registrars can hold an expired domain for up to a maximum of one year after expiration in this Redemption Period. During this time we can “redeem” your domain, but at whatever increased cost the Registrar is asking for the domain. In many cases your domain can be redeemed for around $150 (which includes a 1 year renewal), but if your domain is a high-profile domain the cost to redeem may be $5000 or more.

In such cases, you have three options:

  1. You can pay the Redemption fee. If your domain is that good and that important, then it’s probably worth it.
  2. We can back-order your domain and when it is released from the Redemption Period by the Registrar it will be automatically re-registered for you. Back-orders cost $20.00. A back-ordered domain may take anywhere from 45 days to a year before it becomes re-registered (assuming no one else pays the Redemption fee before then for your domain).
  3. We can order an alternate domain for you that is similar to your original domain. Domain registrations are $15.00 a year.

Permalink.

Why can’t I see my new website

If changes have been made to your Domain Name, such as changing your DNS (Domain Name Service) Servers, or making any changes to your domain zone records in DNS, then DNS or Domain Propagation must occur. Domain Propagation may take anywhere from a few minutes to as long as 24-72 hours.

When a visitor tries to visit your website their computer contacts the DNS Servers belonging to their ISP (Internet Service Provider). These DNS Servers then query the registration database to find out who the DNS authority is for your website. Then they visit our DNS servers to find out what the IP Address is for your domain name, and from there your visitor can view your website.

The problem with this is that in order to speed up the rate at which their customers can view the internet, some Internet Server Providers tend to cache non-authoritative DNS records. This means that they make a copy of the master records and read from them locally instead of looking them up on the Internet each time one of their customers wants to view a website. This can create the appearance of speeding up web surfing by a few milliseconds, by reducing the return time it takes for a web browser to request a domain lookup and get an answer, and also reducing the amount of overall traffic on their service.

The downside to caching and why it takes so long for your website to be visible to everyone is that each ISP that caches DNS records only updates them every few days. There is unfortunately no standard for how this is handled, and although the practice is widely discouraged, this time can be set anywhere from a few hours to several days by some ISPs. The slow updating of the DNS server cache is called Domain Propagation, as changes to your domain name’s DNS information are being propagated across all DNS servers on the internet. Once this is complete everyone can visit your new website. Being that the cache time is different for all DNS servers, as mentioned above, it can often take anywhere from 24 to 72 hours for DNS changes to be totally complete.

Please note that all non-caching DNS Servers will see the changes to your domain’s DNS immediately. Google’s DNS Servers and OpenDNS, and most Public DNS Servers are non-caching.

Permalink.

View category→

Comments are closed.