If you haven’t already, It’s time to check out How to Set Up Google Fetcher for web mail. This is “Part Two” of that discussion. It will allow you to manage your business email all without leaving your Gmail account. Create and log in to a Gmail account.
- Create and log in to a Gmail account. This is where your web emails will be fetched and sent.
- Check for the gear icon in the upper right corner, click the gear and then click See all settings.
- Select the Account and Import tab which is fourth from left in the list of tabs.
- Under the Send Mail As heading on the left – click on Add another email address.
- On the next screen, write the name you want to be displayed when you send the mail, and the email address that you will use to send mail. Leave Treat as an Alias checked. This is what allows you to send from the specific email address. Click Next Step.
- You may need to contact your host for directions. The directions below are for those who host with Stonefield Site Services. Enter your SMTP server as mail.yourdomain.com replacing yourdomain.com with your URL. Your username will be your full email address firstname.lastname@example.org. Enter your password for that email address and the port will be 587. Select Secured connection using TLS (recommended) and save.
- Once verified, you will be able to respond as, or initial new emails from the email address you have added, right from your Gmail inbox. Click New Message and click on the Down Arrow that will now give you a drop down box to select your email address.
I’ve combined more than one technique in order to move upsells to a tab in WooCommerce. This solution works with WooCommerce 2.6.14 as well as WooCommerce 3.0 with WordPress version 4.7.3. Full Credit goes to Skyverge for developing the shortcode and Yikes for the Custom tab plugin.
The end goal was to have upsells display in a more organized manner instead of lost at the bottom of the page or on the shopping cart page where you might end up losing a sale because the potential customer is directed away from checkout. Continue reading
WooCommerce is a popular choice for WordPress enthusiasts that want to incorporate a shopping cart solution in their website. It provides an out of the box solution which has great functionality, and is generally easy to customize.
We ran into a rather unique situation though, and found little to no documentation on how to overcome the hurdle.
The situation: Continue reading
We’re proud to announce that we are now offering free Domain Validated (DV) SSLs for all active hosting packages. The SSLs are insured by Comodo.
There are some important points regarding the Free SSLs which we have outlined below. If you have any questions that are not covered below, feel free to contact us.
Google.com very often makes changes within its search algorithm. These changes take place for a number of reasons. Some of the reasons for these changes is to better the traffic of the web site, improve search engine optimization (SEO), and especially to make using the Google search engine easier for users of the World Wide Web. Within a course of a year, there could be about 500 or more changes. Typically, changes to the search algorithm are minor and sometimes unnoticeable. However, a specific major change to the search algorithm will prove to make using Google a lot easier especially if most of your internet search activity takes place on your mobile device.
In the past, search results that showed up on Google.com were based on SEO keywords and phrases used in each website and web page to relate to the keyword search you entered into the search box. Web masters and designers would carefully pick keywords and phrases that were SEO friendly in an attempt to get their web sites and web pages among the top search hits on Google. In most cases, using the right SEO keywords would be the answer to a high ranking. However, there would soon be more involved with getting a high ranking. Recently, the Google ranking algorithms have changed to better suit avid mobile users. This change is not only significant among mobile users, but also among Google search users all over the world. Continue reading for more information on this change in the Google ranking algorithm.
On April 22, 2015, Google sent out a pre-announcement that there would be a mobile update in the Google search algorithm. The phenomenon, later announced as Mobilegeddon, would give individuals who use their mobile devices to perform Google searches the ability to access web sites that are mobile-friendly and able to be accessed via computer and mobile device. At first, the response to this change was minimal; however, later after the change was put into effect, the impact was significant because mobile users began using their mobile devices more to carry out Google searches.
Not only was this change seen in mobile devices, but this change would affect the rankings of your search results on your desktop as well. Web sites and web pages that once topped the Google list when you first click on the search button will no longer appear among the top hits if the sites or pages are not mobile-friendly as well. This does not change the search method for computer users because mobile-friendly web sites and pages are also accessible on desktop. If you happen to select a web site or web page that is mobile friendly while you are using your desktop, it is typical that the mobile friendly web site or page will allow you to access the desktop version of the web site right from the mobile friendly site.
Google has always strived to make Internet search easier and more enjoyable. Making mobile-friendly sites among the top hits to appear when using Google search is a significant change that will continue to make your Internet search hassle-free!
At times, email deliverability becomes a very serious issue, especially when an important email lands in the Spam. Email has today become one of the most important parts of our life and if we are unable to communicate effectively, it becomes a big issue. Just like Google adjusting its algorithms for ensuring effective results, similarly, email settings also need to be adjusted on a regular basis so that there is no problem in delivering non spam email. The following topics can help the effectiveness of email deliverability-
Make sure you are compliant with the CAN-SPAM Act
If you are sending across an electronic message, you must make sure that you comply with the primary 7 requirements of electronic communication with another.
- Avoid using misleading headers in your mails
- Avoid using subject lines that are deceptive
- Identify your message as an advertisement
- Tell recipients where you are located
- Tell recipients how they can opt out of your list
- Honor any requests for opting out of your list
- Monitor what the others are doing on your behalf
Make your list a “double opt-in” list
Make sure you convert your list into a double opt-in list. People will have to confirm twice before they can receive your email newsletters. The people, who subscribe to your email newsletter, should not think it is SPAM and delete your messages. You should, therefore, make sure that they understand how the double opt-in process works. If you want an effective e-mail list, you must make sure that you set up the double opt-in process for your email newsletters. This will help reduce complaints against you that you are spamming the inboxes of your subscribers. When someone blames you for spamming, it is a very serious matter.
Avoid phishing messages and spam trigger words
Unfortunately, the list of spam trigger words is never complete. Furthermore, it is not always the case that when you use a spam trigger word, your mail will necessarily end up in the spam folder of your subscribers. The main thing that you have to remember is that the spam filter is only trying to remove promotions and commercial advertisements. So, you should sparingly use such words or completely avoid them in order to prevent your newsletter from landing in the spam folder of your subscribers. Phishing emails are fraudulent emails that are sent out to look as if they are from trusted companies to get the details of the users. You would thus want to avoid phrases that are used solely in phishing emails in order to avoid being reported as a person, who indulges in phishing.
Get off blacklists
Your web server should not be on any blacklists. Otherwise, it can become difficult to send emails reliably. Check whether your website has been blacklisted or not. You can do this by visiting any of the following links:
If your website is found on one of these blacklists, then make sure you follow up with the website that has put you on their blacklist.
The hackers and scammers have made internet an unsecure area. The magnitude of risk makes it tough to be overlooked. We all know the case with Sony Corporation following the “The Interview” controversy. Neither can we pretend to move on, from the 2014 Gmail hack incident which revealed more than a million login credentials. It’s high time we take steps to secure our website from hackers, scripts of any element that would bring harm. Most hacks have been result of careless web-mastering more than intelligent hacking activities. Here we have discussed a few failsafe rules and tips to help you boost website security.
SSL is your ticket:
Use SSL protocol to safeguard passage of personal details of your users and website. SSL can help prevent attackers from sniffing login credentials and other confidential information.
Essential website security tools:
A full packed security tool set would come in handy to deal with cases of security breach. “Netsparker” and “OpenVas” would help testing vulnerabilities, XSS and SQL injections
Managing file uploads:
When you even permit your user to upload a new avatar, there is a prospect of security risk. Treat every upload with suspicion and make sure you allow a limited set of file formats.
Dealing with SQL injection:
SQL injection has been the classic attack tool ever since WWW launch. SQL injections require only the URL parameters and form fields. Always use parameterized queries in site.
Outdated software always leaves security holes for hackers to launch an attack. Make sure to update server side software regularly or switch to managed hosting solution.
Smart error messages:
Always make sure you don’t give too much information via error messages. Use generic messages instead of transparent ones which give away which part of query was right.
Fix your gadgets:
Securing website begins with securing your devices. Keep your phone, PC or any other device you use to login to your website c-panel, virus free.
Using complex passwords:
Use complex passwords and make it virtually impossible for hackers or scripts to crack your combination. Include numbers, special characters and upper case letters to help your case.
Choosing your web hosting provider is not a daunting task. However you must have the basic know-how of web hosting to choose provider wisely. Most of the times, your decision would be dependent on your preferences. We are going to discuss the common criteria and personal preferences which play a significant role in deciding right web hosting service.
Reputation of the company:
Before we rush to check the packages and plans, reputation of the company needs to be examined. Years of existence of the company speaks volume about the reliability they bring to table. You can check for reviews on popular web hosting review sites.
Customer service is what you are going to need the most once, you turn into an active webmaster. It is natural to have few issues once in a while considering the software updates that need to be done. Check for the responsiveness of the company’s support staff prior to purchasing a package.
Availability of trial period:
Check whether the hosting provider offers prospective clients with a trial period or not. A week of trial period should be sufficient to rate the hosting plan. Some hosting companies may ask for credit card details in order to avail their trial packages.
These factors decide the value of packages and plans listed in the company’s website:
Disk size and bandwidth:
Amount of storage and bandwidth forms the core of your web hosting package. A video hosting site may require loads of storage space or bandwidth. Depending on the number of visitors you expect to have, the required bandwidth would vary.
Depending on the type of website you manage, your server requirements would vary. When you have user management system, the server should support MySQL at the least. It’s always good to have a high end web hosting server, but a lot depends on your budget and requirements.
Number of domains supported:
When you are an active webmaster, more often than not you would be in need of another domain. One can imagine the mess of managing different hosting account for every domain they own. Therefore having a hosting plan which supports more number of domains is preferred.
With today’s modern world, having the ability to connect with your customers as well as other businesses is the number one way to pave the road to success. In the old days, businesses used to rely on advertising and physically handing out business cards to do the work for them, but the digital age has made the process so much easier. Websites have become the means in which businesses have started to advertise and provide the information that customers need to start connecting with them and finding out more about them.
Not only does it disseminate key information about new products and services, but customers can also find your location. This provides them with the foundation they need to trust the validity of your business if they choose to send physical mail to your location. It also puts their mind at rest that you are legitimate business with a solid location that they can rely on. Despite the aspects of the digital realm, customers are still more trusting of service providers who have a physical office at a fixed location, instead of something less tangible.
Hours of operation is also an important piece of information to include on business websites, as customers can be aware of when they can visit your location, should they require your services and/or products. It also provides them with future planning during special occasions, such as public holidays, so that they can plan accordingly if you are not operating on those days. Including the hours of operations can be very important for those who work until late into the evening, and require some means of determining whether you’re open or not, before visiting your physical location.
Websites not only serve to provide information to your customers, but they can also be used to promote your new products and services that you’re putting out into the market. Customers tend to do research online about the specific products that they’re looking for before they decide to purchase anything, and providing them with this information through an easily-accessible medium ensures that they make the informed decisions that they need.
If you’re keen on expanding your market and making your websites more functional, there always exist the options of transforming part of your site into an online store. This makes it easy to operate the old-fashioned way as well as digitally so that you can increase customer loyalty, as well as your conversion rates.
Establish your credibility as a business within the digital realm with websites stating your hours of operation and your location so that customers’ minds can be put at ease. Having websites to represent your business can make all of the difference in the world, and transform your small business into the thriving enterprise it was always meant to be.
Google is gradually starting to sunset SHA1 Encryption. This will mean that if your SSL is using SHA1 Encryption, it will eventually show that your site is untrusted despite the fact that you have purchased the SSL from a reliable issuer.
How do you know if you are affected?
- If you have a website that has an SSL installed, you will want to verify the encryption for your certificate.
- If you have an active SSL, you will want to visit https://shaaaaaaaaaaaaa.com/ to check the encryption of your secured site.
- If the site shows that the SSL is SHA1 Encrypted, please contact the issurer of your SSL to have it reissued using SHA2.
- If the site shows that the SSL is SHA2 Encrypted, you are not required to take any further steps.