Arbitrary Limitations: Unlimited email, unlimited traffic, and unlimited websites

What are arbitrary limitations: Unlimited Bandwidth, Unlimited Emails and Unlimited Traffic

Much of the hosting industry for the most part uses arbitrary limitations as their bread and butter. It enables them to pad their profit margins while forcing superficial limitations on what you can do with your servers. Instead of offering unlimited email, unlimited traffic, and unlimited websites within the restrictions of the hardware, they force unnecessary limits.

Read More

How to Setup an Email Server with Mail-in-a-Box on Ubuntu

How to Setup an Email Server with Mail-in-a-Box on Ubuntu

Today we will show you how to setup Mail-in-a-Box on an Ubuntu 14.04 VPS. Mail-in-a-Box is a free and open source application that makes it easy to turn your Ubuntu 14.04 server into a complete, full-stack email solution for multiple domains. Mail-in-a-Box helps individuals take back control of their email by defining a one-click, easy-to-deploy SMTP+everything else server: a mail server in a box. Each Mail-in-a-Box provides webmail and an IMAP/SMTP server for use with mobile devices and desktop mail software. It also includes contacts and calendar synchronization. The installation process should take about 10-15 minutes if you follow the very easy steps described below.

Read More

Check if an Email Exists

check if email exists
Check if Email Exists

check email address validityIn this article, you’ll learn how to use the command line to Check if Email Exists, without sending an email. You don’t have to pay for any software or online services and you don’t have to send out test emails. You can do it all for free through the command line, without any limits on how many times you can do it!

Read More

Install and Configure openDKIM on Debian Squeeze

Installing and Configuring openDKIM on Debian

This guide will show you how to install and configure openDKIM on a Debian Squeeze VPS. DKIM is a signature/cryptography email authentication technology used to validate that a message was sent by an authorized source. DKIM allows an organization to take responsibility for transmitting a message, in a way that can be verified by a recipient. More information can be found at the official DKIM web site.

Read More