featured-image

An Apple or Andriod Smartphone?

Today, we are talking topic not so related to hosting. This came to me, asking myself why am I buying an Android smartphone and some like my daughter would insist for an apple smartphone. I think its a difficult question but I realized it has to do with the user’s experience. User’s experience is not limited to a smartphone. It applies to all services and products. It […]

featured-image

Do you really need a NAS?

The last few days, I’m debating on do I really need a NAS? I have asked myself many questions, and until now it hasn’t come to a conclusion. Basically, I have a few SATA hard drives lying around and as a gadget guy, I’m thinking what can I do with those drives? The idea of NAS strikes. But the question is do I really need one? […]

featured-image

File or block-level backup?

Most will recommend a block-level backup. Theoretically, bl0ck-level backup is utilising less bandwidth and storage. Block-backup can only backup block that part of the file is modified, thus it is using less space. If you are using block-level backup and VSS is enabled to backup a Microsoft Windows Server, you can back up an open file. The file-level backup will fail in this situation. If […]

featured-image

How to backup your WordPress website

There are a few ways to backup a WordPress website. Easy, complicated, paid and free version. But you will not store the backup at the same place unless you are using it as temporary rollback. Storing backups on the same server will not serve its purpose. Who’s do that? It is a common mistake many made. The backups were stored on the same server. Ask […]

featured-image

If you are given root or administrator access

If you are given root or administrator access, you likely have a dedicated hosting like our VPS and dedicated server. This is an important credential.  Anyone with the credential can access the server to update, delete or append without restriction. It is important to restrict the access to these users. But how? Basically, there are ways to protect these accounts from unauthorized usages. If you have a Linux […]

featured-image

Do you need web hosting?

Very often when you pick up a phone? You will hear this from the other party. My company needs some email accounts blah blah blah… Yes, it is obvious that web hosting space to create email accounts. Generally, they create these email accounts to communicate with their clients using their domain name. Yes, they are your clients already or probably your clients in near future. But this isn’t […]

featured-image

Dedicated Server? The common mistakes

If you put a website on a dedicated server, mainly there are 2 reasons. Either the website has a lot of users or visitors that you require resources or physical security is your concern. But there are many dedicated servers out there. How do you choose https://www.vastspace.sg/dedicated-server/a server for your website? Price? Specification? or Brand? Today, we gonna share the common mistakes we have seen […]

featured-image

How to avoid not reading important emails

In many occasions, you did not receive an important email from someone. Yes, they did not end up in your inbox but junk or spam box? Because the email was either marked as spam or the spam score is high. In this situation. you have little control. Worst, your email client application is set up as POP3. Your local folders do not synchronise with the email server. Today, we share tips […]

featured-image

Is DKIM a must?

Like what is explained in DKIM.org, DomainKeys Identified Mail (DKIM) enables an organization to take responsibility for an email sent.  The organization is a handler of the message, either as its originator or as an intermediary. Their reputation is the basis for evaluating whether to trust the message for further handlings, such as delivery. Technically DKIM provides a method for validating a domain name identity that […]

featured-image

Is SPF important?

SPF is a DNS record to tell other email servers that emails from the designated email servers are permitted. If emails are not originated from the mentioned email servers in the SPF, they are likely impersonated, not genuine or spam emails. At the end of the SPF statement, you will see these syntaxes – ~ ?, the common one is ~ follows by a like this […]

  • 1
  • 2
© 2022, Vastspace Pte Ltd