Writing

Thoughts on technology, business, and the gap between them.

Services and Tools We Use

Discover the essential tools and services powering rackAID's operations, from hosted PBX systems and wireless solutions to printing services and invoicing software. Learn what works for a hosting business.

How to Remove Google Site May Harm You Warning

Learn how to remove Google's "This site may harm your computer" warning by cleaning malware from your site, identifying security vulnerabilities, and requesting a review through Google Webmaster Tools.

TMP Directory Hardening Increasingly Ineffective

TMP directory hardening, once effective against attackers executing code from world-writable directories, now offers minimal protection. Attackers easily bypass noexec restrictions using interpreters like Perl or PHP, while modern XSS exploits render this hardening technique largely obsolete.

How to Remove Your IP from Earthlink’s Blacklist

Stuck on Earthlink's blacklist? Learn the step-by-step process to remove your IP, including cleaning up spam issues, contacting the postmaster, and properly formatting your unblock request to restore email delivery.

Host.conf Hardening Does Little for Server Security

Popular host.conf hardening tweaks offer minimal security benefits for typical servers. They don't prevent IP spoofing as claimed, and unnecessary modifications complicate long-term management. Stick with default settings unless you have specific requirements.

Forwarded Emails May Cause Backscatter Spam Complaints

Email forwards to invalid addresses can generate backscatter spam even when your server rejects mail to unknown users. The forwarding process bypasses recipient verification, allowing spam bounces that can get your IP blacklisted.

Zoho: The Future of SMB IT Services?

Zoho's affordable SaaS tools represent the future of small business IT—offering flexible building blocks for project management, collaboration, and more. At $100 yearly, it's transforming how solution providers deliver integrated, customized applications without technical complexity.

10 Immutable Laws of Security Administration Revisited

Microsoft's decade-old security laws remain surprisingly relevant today. Small businesses often ignore threats until compromised, while outdated software and weak passwords continue causing breaches. Simplicity and vigilance trump technology alone in protecting networks.

DSBL Defunct

The DSBL blacklist shut down nearly a year ago, but its nameservers just stopped responding. Remove list.dsbl.org from your RBL settings immediately to prevent mail delivery failures and timeout issues.

Let's talk about what you need.

Tell me about your situation. If there's a fit, we'll schedule a call.

Start a Conversation