Email errors are quite confusing.
“550 5.4.1 Relay Access Denied” is one such error you see in Office 365 servers.
Here, you know that something is not proper as you see “Access Denied” in the error, but not sure where’s the problem.
At Bobcares, we often resolve such email errors as part of our Technical Support Services for web hosting companies.
Microsoft Exchange Servers enforce strict restrictions on Email sending limits (30 emails per minute) to prevent spam and to keep accounts safe.
If your account exceeds this limit, you may get blocked by your Exchange server.
“550, 5.1.8, Access Denied, Bad outbound sender” is one such issue reported by Office 365 users.
At Bobcares, we often resolve such Exchange email errors as a part of our Technical Support Services for web hosting companies.
In our role as Web support specialists, we resolve and prevent service errors in both Linux and Windows servers. Recently we were contacted by a Windows server owner who was getting “HTTP Error 503. The service is unavailable” in his websites.
Upon examining the EventViewer logs, we could see the error “A process serving application pool ‘plesk(default)(4.0)(pool)’ suffered a fatal communication error with the Windows Process Activation Service”. (more…)
In our role as Server Administrators for website owners, server owners and hosting companies, we perform a wide range of tasks, from hack recovery to resolving server errors.
Recently we were contacted by a Microsoft Exchange server owner, who was getting blank page in OWA. OWA is the Outlook Web Access for Microsoft Exchange users to view their emails. (more…)
Emails form an indispensable part of a hosting account. In our role as Outsourced server support specialists for web hosts, we encounter and resolve many email server issues in both Linux and Windows servers.
Wrong configuration paths, registry errors, lack of synchronization, folder subscription problems, binary corruptions, anything can lead to webmail related issues in Windows servers. (more…)
Are you seeing files with any of these extensions in your server? – .01, .02, .amnesia, .[Help244@Ya.RU].LOCKED, .CRYPTOBOSS, .[email@example.com].SON and .@decrypt_2017. If so, then your server is hijacked.
One of the major ransomware virus that is circulating now is the Amnesia malware. Once infected, it locks up your entire server files and encrypts them in such a way that you can no longer use them.
Not soon after servers have started recovering from WannaCry ransomware, there is this new Petya ransomware which spreads rapidly to Windows servers via the networks.
Once infected, the Petya ransomware locks up your entire server files and encrypts them in such a way that you can no longer use them. The attackers then demand $300 Bitcoins as ransom to decrypt your data.
WannaCry ransomware is all over the news now, causing the internet world to shake in doubt and fear. With over 200,000 computers in 150 countries being affected, the damage is really wide-spread.
For businesses and servers that are affected by this malware, the impact of this attack is huge and can lead to loss of business. As a result, it is important to secure your servers for ensuring their normal functioning. (more…)
A common error that happens when you try to login to the WordPress admin section is ‘You are not authorized to view this page (403 error)’.
This 403 error gets displayed instead of the WordPress admin dashboard, after successful authentication using the admin login credentials. (more…)
Over 80% websites in the internet are vulnerable to hacks and attacks. In our role as hosting support engineers for web hosts, we perform periodic security scans and updates in servers to protect them from hacks.
A recent bug that affects the servers is the SWEET32 vulnerability. By exploiting a weak cipher ‘3DES-CBC’ in TLS encryption, this bug has caused many server owners to panic about their data security.
If you see that your website is failing security scans with this message, that means your server is vulnerable to SWEET32 attacks.
“SSL/TLS server supports short block sizes (SWEET32 attack)”