Blogs

How Corporates are Using Live & On-demand Video to Market their Brand

n an era of constantly evolving video dynamics, more and more corporate organizations are using live/on-demand video as part of their internal and external communications strategies to market their products and reach a wider audience. Not just media and broadcasting biggies but top-notch brands functioning in IT/Real Estate/Electronics and Fintech industries are using enterprise video and audio to engage employees and gain customers.  According to Video Enterprise 2019 report, webcasting has become quite popular for enterprises. According to the report, 88% of employees see video use as steady or growing at their organization. How can you use Live/On-demand Video/Audio for Businesses Enterprise video/audio helps businesses build brand affinity and employee advocacy. From engaging participants in a web conference, employee onboarding, business meetings to internal training, video is a great way to not only strengthen communication but also spread brand awareness and enrich corporate culture.  In fact, corporate live streaming is considered as one of the most powerful marketing tools today, helping brands grow faster. It is a great way to deliver your brand message to the world, rope in new customers, and increase revenue. Here’s a chart to help you understand explore your brand’s live video opportunities The possibilities of using live video in the corporate world are endless- even if you are already aware or are using live video for your company’s annual events or product launches, you want to ensure you’re getting the most out of it. 2019 witnessed 86% video use in their particular organization as growing, with another 12% expecting it to stay steady. Some interesting corporate video stats 91% of employees have been trained via video 82% of employees believe interactive videos help hold their attention better than traditional videos 69% of employees would prefer to learn a new skill from video as opposed to a written document 64% of employers use live streaming for remote learning In-house and External Corporate Video Streaming Use-Cases Major MNCs working in departments such as IT, telecommunication, healthcare, etc are using corporate live video streaming internally to help promote corporate culture and build relationships among employees. Such companies often resort to live video sessions for addressing product launches, team meetings, employee training and so on. 1. Video Training for Employees –  Employee training is perhaps the single most primary use case of video for companies. Video is an effective tool for not only teaching company culture to new hires but also remote team members. These videos not only make the process of onboarding less jittery but they can also be updated and reused by the employer. Each live training session could then become video-on-demand (VOD) content delivered on the enterprise CDN, making future reference and reuse possible. 2. Internal Communication –  Often corporate executives resort to live streaming for communicating company updates to employees. This is a tried and tested way to connect with employees on a more personal level than sending out a company-wide email.  3. Internal Webcasts –  Live webcasts are an important internal communications tool. Almost every company uses it for sharing product information and gaining leads. Internal webcasts can include internal webinars, department updates, product launches, annual meetings, special events, and much more.  Whether it’s the product team giving a live demo of an upcoming launch or the marketing department introducing new product messaging, an internal webcast is an effective way of business communication. These webcasts are often turned into VoD versions and used by companies for easier and continuous access amongst employees.  4. Product Launch – Tech biggies like Apple or Google are known for their exciting new product launches through live streaming.  And indeed, product reveal live streams can generate a lot of buzz around new features and releases from big companies. And since a picture is worth more than a thousand words, a live stream is probably invaluable in generating more attention than a newsletter or press release.  Computer giant Apple has been live streaming their product releases globally for years now. The June 2014 product release has been estimated to attract a whopping 20 million viewers!  5. Virtual Conferences and Business Events – Virtual conferences are a great tool employed by large companies and have been gaining a lot of traction in recent years. Tech biggies, software companies and media houses tend to have a lot of employees and instead of gathering hordes of employees, partners, and customers at a single physical location, such companies often resort to smaller local events. The entire event is then live streamed, and participants generally buy tickets to access the stream.  Similarly, many companies like Salesforce choose to live stream their regular large events. Salesforce streams their annual Dreamforce conference online and you can watch it on YouTube. Such live streams tend to have a lot of visitors and companies leave no scope for technical glitches. Why choose Muvi? Today, in order to simplify the process of live streaming for businesses, enterprise video platforms have been built making it possible to securely and/or publicly broadcast live video online without burning a hole in your pocket.  Muvi Enterprise Video Streaming is a scalable, cloud-based online video platform that provides an end-to-end streaming solution for live or on-demand content to an external audience. Our highly scalable architecture is built on a powerful CDN backed by Amazon Cloudfront delivering your live/on-demand video to all corners of the world. Live content is automatically transcoded in the cloud for delivery to practically any device, with adaptive bitrate support to reach a range of connection speeds. Using Muvi’s Enterprise Video Platform, you can intelligently restrict and secure access to corporate video assets and rule out every possible breaching of data or content using encrypted delivery, DRM and watermarking.  Muvi  Live Streaming in Pakistan this article is copy right by muvi.
Read more

What is Webuzo ?

What is Webuzo? WEBUZO is LAMP stack which is specially designed for the CLOUD. The goal is to provide solution providers with the ability to easily launch, manage, and maintain a number of popular applications and development stacks for their customers. Softaculous Webuzo helps you deploy Apps like Zend Framework, WordPress, Drupal, MediaWiki, and Joomla on your server, virtual machine or in the cloud. We have covered a wide array of Categories so that everyone could find the required application one would need to power their business. Webuzo enables you to focus more on using applications rather than maintaining them. ALL in ONE Webuzo stack supplies a self-contained environments with all the requirements that greatly simplify development and testing of modern web applications such as WordPress, Joomla, etc.A still Webuzo stack is suffecient to manage all of your difficulties deployin PHP, Pearl, Python, Java scripts within minutes. Webuzo is a mixed blend of PHP, Apache, MySQL, Perl, Python, FTP, Apache Tomcat, etc all stuffed into a single package which avoids the hassle of configuring wach of hem invidually. Click Here to check Webuzo Package
Read more

Identify location of the SQL Server Error Log file

Problem How do I find out where the SQL Server Error Log file is located for a specific SQL Server instance? In this tip we look at different ways a DBA can identify the location of the SQL Server Error Log file used by an instance of SQL Server. Solution In this tip we will take a look at three different ways you identify which SQL Server Error Log file is used by an instance of SQL Server. 1. Reading the SQL Server Error Logs2. Using SQL Server Configuration Manager3. Using Windows Application Event Viewer Let’s take a look at each of the above options in detail. Identify SQL Server Error Log File used by SQL Server Database Engine by Reading SQL Server Error Logs The SQL Server Error Log is a great place to find information about what is happening on your database server. You can execute the below TSQL command which uses the XP_READERRORLOG extended stored procedure to read the SQL Server Error Log to find the location of SQL Server Error Log file used by the instance of SQL Server.   USE master GO xp_readerrorlog 0, 1, N'Logging SQL Server messages in file', NULL, NULL, N'asc' GO     XP_READERRRORLOG The parameters you can use with XP_READERRRORLOG are mentioned below for your reference: 1. Value of error log file you want to read: 0 = current, 1 = Archive #1, 2 = Archive #2, etc…2. Log file type: 1 or NULL = error log, 2 = SQL Agent log3. Search string 1: String one you want to search for4. Search string 2: String two you want to search for to further refine the results5. Search from start time6. Search to end time7. Sort order for results: N’asc’ = ascending, N’desc’ = descending By default, there are six archived SQL Server Error Logs along with the ERRORLOG which is currently used. However, it is a Best Practice to increase the number of SQL Server Error Logs from the default value of six. Hence I recommend you read this tip Increase the Number of SQL Server Error Logs. Identify SQL Server Error Log File used by SQL Server Database Engine Using SQL Server Configuration Manager 1. Click Start -> Programs -> Microsoft SQL Server 2008 -> Configuration Tools -> SQL Server Configuration Manager 2. In SQL Server Configuration Manager, click SQL Server Services on the left side and then right click on SQL Server (MSSQLSEVER) and select Properties from the drop down as shown below. For a named instance, right click on the appropriate SQL Server (INSTANCENAME) service. 3. In SQL Server (MSSQLSERVER) Properties window click on the Advanced tab and then expand the drop down next to Startup Parameters. The location of SQL Server Error Log file is mentioned next to the “-e” startup parameter as highlighted in the snippet below. Identify SQL Server Error Log file used by SQL Server Database Engine Using Application Event Viewer 1. Click Start -> All Programs -> Administrative Tools -> Server Manager. 2. In Server Manager, expand Diagnostics, expand Event Viewer, expand Windows Logs and then select Application on the left side panel. In the right panel you need to filter for events with Event ID 17111 as shown in the below snippet. To set a filter right click on Application and select Filter Current Log. 3. To view the location of SQL Server Error Log file double click an event and you can see the event properties as shown below.
Read more

Troubleshooting Microsoft SQL Server Error 18456, Login failed for user

Login errors with Microsoft SQL Server (MSSQL) are a fairly common issue and can be easily solved with some basic troubleshooting steps. Before we dig in, let’s take a look at the details of the error to try and determine the cause. Solutions to Microsoft SQL Server Error 18456 Sometimes, the error presents as “login failed for user ‘<username>’,” this information will help us as we identify the user we need to troubleshoot. From the message, we’ll know the error number as a reference to search for next steps. In this case, it is Microsoft SQL Server, Error: 18456. Other times, we may only see “Microsoft SQL Server Error 18456” along with the severity and state number. On its own, a state number might not mean much, yet it can offer more details as to what is wrong and where to look next. These states of the error, 18456, are the most common. The descriptions and potential solutions offer a quick explanation and potential troubleshooting guide.     Step 1:  Log In with Remote Desktop The troubleshooting and solutions require you to login to the server or at least be able to make a Windows Authentication connection to MSSQL using Microsoft SQL Server Management Studio. The most common and easiest method is to connect directly to the server with a Remote Desktop Connection. If you need more information about Remote Desktop Connection, these Knowledge Base articles will help you get connected: Step 2: Run Microsoft SQL Server Management Once you are logged into the server, you’ll want to run Microsoft SQL Server Management Studio (SSMS). SSMS is the tool best suited to configure, manage, and administer MSSQL. When you start SSMS, you will be asked to log in to the server. By default, most MSSQL servers have Windows Authentication enabled, meaning you must log in with the Windows Administrator or the account specified as the SQL Administrator when MSSQL was installed and configured. In addition to Windows Authentication, MSSQL supports SQL Server Authentication. Depending on the version of MSSQL and how it was installed and configured, you may or may not have SQL Server Authentication enabled by default. Step 3: Checking the Server Authentication Mode Once we login to SSMS using Windows Authentication, we need to check the security settings to confirm whether MSSQL is set up to allow both Windows and SQL Authentication. In SSMS, right-click the Server Name at the top of the Object Explorer window and choose Properties. Next, click the Security page. If you find Windows Authentication is the only mode configured, this is the likely cause of Error 18456, Login failed for user ‘<username>’. Setting the Server authentication mode to allow SQL Server and Windows Authentication, you will be able to login to MS-SQL with a SQL user and password or a Windows user and password. After making this change, you will need to restart the SQL Server service. Step 4: Restart the SQL Service In SSMS, right-click the Server Name at the top of the Object Explorer window and choose Restart to apply the new authentication mode settings.   In the above example, Windows Authentication mode was the only mode configured, and the Error 18456 occurred because the user ‘sa’ is a SQL user and SQL Server Authentication was not permitted. Step 5: Checking SQL User Permissions As we check the SQL user permissions, we need to answer the following questions: Is the user allowed to log in? Does the user have a valid password set up? Does the user have the needed permissions for access to the desired database? In SSMS Object Explorer, expand Security, Logins. Locate the user that was failing to log in. A red x on the user indicates this user has login disabled. To allow the user to login, right-click the user and choose Properties, then click the Status page. Enabling login for the user and click OK. After refreshing the list user logins, we can confirm the user no longer has a red x present. This should allow the user to log in. In this example, the SQL user ‘sa’ failed to log in because there was no permission to log in.  Continuing with user troubleshooting, right-click the user and choose Properties, then click the General page. Here you can enter a new password and then enter the confirmation password. Click OK to save the new password. We set a new password for the user so that we are certain of the password when we attempt to log in. Step 6: Mapping the User to the Database Our last step in troubleshooting a user is to check user mapping to verify the user has access to the desired database and to set or verify their role for the database. Right-click the user and choose Properties, then click the User Mapping page. Select the Database from the list of databases. From the database role memberships, select the desired/required memberships. Click OK. In this example, we mapped the user ‘ProdX709’ to the database Production X709.2019 and granted them database role db_owner. In many cases, you only need a user to have db_datareader and db_datawriter roles to be able to read and write to the database.   In this troubleshooting article, we learned how to identify specifics of Error 18456 to help us track down the root cause of the issue. Still looking for support?  Our MSSQL database solutions come with assistance from our technical support team. Find out how our high-availability database can work for you!
Read more

SSL Certificate Validity Will Be Limited to One Year by Apple’s Safari Browser

Starting Sept. 1, Safari will no longer trust SSL/TLS certificates with validity periods longer than 398 days Starting Sept. 1, Apple’s Safari browser will no longer trust SSL/TLS leaf certificates with validity of more than 398 days. (This is the equivalent of a one-year certificate plus the renewal grace period.) Other types of SSL/TLS certs, including intermediates and roots, are unaffected. Apple announced their unilateral decision at a face-to-face meeting of the CA/Browser Forum (CA/B Forum) on Feb. 19, which is the industry standards group that consists primarily of certificate authorities and several of the major browsers. While there’s been no formal posting anywhere that we’ve found by Apple about this change, we were able to verify this information with some of our CA partners who were in the meeting. The good news is that this change doesn’t really come as a surprise, and the SSL industry is ready for it — so there won’t be any major impacts to customers or service providers. So, what exactly has transpired here? And, more importantly, what does this all mean for you, the user or seller of SSL/TLS certificates? Let’s hash it out. Is Shorter Validity a Good Thing? We knew it was only a matter of time before this type of initiative would occur. Last year, we wrote on how one-year certificate validity was back on the ballot of the CA/B Forum. The idea here is that the shorter an SSL/TLS leaf certificate’s validity period, the more secure the certificate is. That’s the argument that’s been made for several years for why browsers wanted to cap the maximum validity for SSL/TLS certificates to 1 year. The theory is that by requiring SSL/TLS certificates to be renewed after a shorter period: When any security updates to certificates are made, they roll out into the wild more quickly. It also theoretically makes websites more secure by ensuring that new keys are being generated regularly. SSL/TLS leaf certificates used to have a maximum validity of five years (for domain and organization validated certificates). However, a compromise was ultimately struck that led to certificate validity being reduced to a maximum of three years, and then later, it was capped at two years for all SSL/TLS leaf certs. Last year, Google’s Ryan Sleevi introduced a ballot at the CA/B Forum that pushed for a maximum one-year validity for SSL/TLS certificates. The initiative ultimately failed, but it looks like Apple has picked up where Google left off in the fight for shorter validity. Today, Tim Callan at Sectigo posted the following on his LinkedIn page: Honestly, we knew it was only a matter of time before this move would be made. We just figured it would have been Google or Mozilla making the first move. But, regardless of who made the first move, there are a few things you should know. What Does This Mean for Your Website and Customers? Safari is one of the internet’s two leading web browsers. W3Counter lists Safari’s browser market share at 17.7% as of January 2020. This falls behind only Google Chrome (58.2%) and ahead of Microsoft Internet Explorer and Edge (7.1%). So, as you can imagine, you want to ensure that your website — and your customers’ websites — are trusted by Safari.   What Site Admins Need to Know Essentially, any SSL/TLS certificates issued prior to Sept. 1, 2020 are not affected by this change. They’ll remain valid (barring any unrelated certificate revocations) for the entire two-year period and won’t need to be modified or replaced. However, any certificates that are issued on or after Sept. 1 will need to be renewed every year to remain trusted by Safari. What this means is that you’ll want to streamline and improve your existing certificate management practices. For larger organizations, in part, this entails using a reliable certificate management solution and no longer relying on manual cert management. What Certificate Resellers Need to Know In a nutshell, you can continue issuing two-year certificates until Aug. 31, 2020 that your customers can use until they expire. Any certificates that you issue after that date, however, would need to be issued with one-year validity to remain valid as far as Safari is concerned. This means that any two-year certificates that you sell will need to be re-issued after one year in order to continue being trusted by the browser. A New Option: Multi-Year Subscription SSL Luckily for you, the leading CAs saw the writing on the wall. They decided to create new certificate lifecycle automation options and subscription plans that would make certificate management easier for shorter certificate lifecycles. Some CAs announced a new option for purchasing/implementing SSL. Sectigo rolled out their SSL subscription plan months ago and DigiCert will roll out their multi-year plans before September. With these multi-year subscription-based SSL services, webmasters can purchase coverage for longer periods and reissue their certificate as often as they need with the maximum allowed validity period. There are a few benefits to this option: Cost: It allows customers to continue receiving a multi-year pricing discount, which saves money, and Time: Customers only have to purchase the subscription once and not worry about it again for five years (especially useful if you need to get purchases approved by your accounting department). So, basically, customers can purchase SSL coverage for an extended time period (for example, 5 years) and then just re-issue their certificate each year to update it —while saving money and time. That sounds like a win-win for everyone.  
Read more

DigiCert SSL Certificates

DigiCert SSL Certificates in Pakistan DigiCert Inc. is a US-based technology company focused on digital security and headquartered in Lehi, Utah with international offices in Australia, Ireland, Japan, India, South Africa, Switzerland and United Kingdom. As a certificate authority (CA) and trusted third party, DigiCert provides the public key infrastructure (PKI) and validation required for issuing digital certificates or TLS/SSL certificates. These certificates are used to verify and authenticate the identities of organizations and domains and to protect the privacy and data integrity of users’ digital interactions with web browsers, email clients, documents, software programs, apps, networks and connected IoT devices. Core Certificates of DigiCert Standard SSL Certificate Multi Domain SSL Certificate Extended Validation SSL Certificate Wildcard SSL Certificate Code Signing Certificates Extended Validation Code Signing Certificates DigiCert Document Signing Certificates www.ITBrands.pk – Official Reseller / Channel Partner of DigiCert in Pakistan
Read more

How to Find and Fix Mixed Content Warnings on HTTPS Sites

Simply supporting HTTPS isn’t always enough — you also need to know how to identify and fix mixed content errors If you recently migrated your website from an insecure HTTP connection to a more secure HTTPS connection, you may still run into the problem of receiving mixed content warnings. Worse yet, your site may render as insecure to site visitors, causing them to quickly click the ‘back’ button and find elsewhere to explore. That said, the real problem with mixed content warnings on HTTPS connections is emerging with Google Chrome’s latest release — Chrome 79. With this new release, some content that continues to load over an insecure connection will automatically be blocked. It will mark websites that use TLS 1.0 or 1.1 as “Not Secure” and no longer show the lock icon for them. Further down the road with Chrome 81, scheduled to be released sometime in March, Google will completely remove support for the legacy TLS protocol, which will block all non-secure content by default. In other words, content on your site that is not loading via HTTPS will not load at all, and your site visitors will not see this content. If you want to make sure all your site’s content is loading over a secure connection and site visitors see it all, keep reading. Today we’re explaining what mixed or insecure content is, why it’s a problem, and how to find and fix mixed content warnings if you see them on your HTTPS website. Let’s hash it out. What is Mixed Content? According to Google, mixed content occurs when HTML on a website loads over a secure HTTPS connection (thanks to a recently installed SSL certificate) but other content, such as images, video content, stylesheets, and scripts, continue to load over an insecure HTTP connection. This results in some web content loading securely and some web content loading insecurely. Hence the name “mixed content.” The thing with mixed or insecure content is that it all loads over a secure HTTPS connection, whether the content itself is secure or not. And when this happens, modern browsers such as Google Chrome display warnings to users trying to view the web content that the site contains insecure content. Secure websites that load over HTTPS connections provide the following benefits: Authentication. Reassure your site visitors that they’re safe when they land on your website and engage with your site content, especially if you run an online shop where financial information is shared. In addition, verify for site visitors that they’re on the website they want to be and haven’t been redirected to a malicious site. Data Integrity. Visually tell site visitors that their personal and financial information is secure and safe from hackers no matter what action they take on your site. In addition, give browsers the ability to detect whether a hacker has changed any data a browser receives. In other words, help users trust that a hacker hasn’t redirected money paid via your online store to another account. Anonymity. Guarantee site visitors that their behavior while on your site isn’t being intercepted by others and used maliciously. In short, HTTPS allows website owners to secure their data and build trust with those that visit their site so they can continue to build their brand and business. Why is Mixed Content a Security Issue? If mixed content loads over a secure connection, you may be asking yourself why it matters. After all, the HTTPS connection should be securing the resources regardless of whether it’s mixed or not, right? Wrong. Any time there is mixed or insecure content on a webpage, the entire website becomes vulnerable to attack. While it doesn’t open the webpage up to all types of cybercrime, it weakens the overall security of the site. This means that if a hacker breaches a website that loads mixed content, they might be able to take control of the entire page, not just the resource that is insecure. While most modern browsers display mixed content warnings for people to see before they visit a website, the truth is, many of these warnings come too late. In fact, oftentimes hackers have already broken into mixed content websites and have begun doing damage without the site owners or visitors knowing what’s occurred. Here are some other ways mixed or insecure content on your HTTPS site can become a security problem: Hackers can intercept HTTP requests to load an image and swap your site’s image out for another one the hacker prefers. Your ‘save’ and ‘delete’ button images can be switched, causing site visitors to accidentally save or delete content. The front end of your site can be defaced, which is especially bad when it’s with lewd or inappropriate images or text. A hacker can intercept written content and rewrite it entirely. Passwords, session cookies, and other login credentials can become compromised and land in the hands of cyber criminals. Your site visitors can be redirected to another site without knowing any different. Browsers do their best to block the most dangerous types of mixed content on websites. However, it’s impossible to block all of it (though that seems like an obvious solution) because so many well-established and highly trafficked websites render mixed or insecure content for site visitors. Blocking all of it will lead to ruin and cause a lot of problems. That said, you can expect popular browsers like Chrome to continue to block more and more mixed content as new versions are released. How to Find and Fix Mixed Content Warnings on Your HTTPS Website If you’ve taken a proactive approach to site security and have installed an SSL certificate on your site, be proud. Data from Google’s Transparency Report indicates that desktop users load more than half the pages they visit over HTTPS connections and spend more than two-thirds of their time on HTTPS webpages. Unfortunately, data encryption is less prevalent across mobile devices, though more site owners are taking measures to secure their mobile sites as
Read more

DigiCert Partner & Distributor in Pakistan

YISolutions,  is proud to announce its appointment as the exclusive distributor & Partner of the complete range of DigiCert products & Services in Pakistan.   About DigiCert At DigiCert, finding a better way to secure the internet is a concept that goes all the way back to our roots. That’s why our certificates are trusted everywhere, millions of times every day, by companies across the globe. Core Services;  Managed SSL / TLS Code Signing Grid Host Document Signing Digital Signature Email Security Authentication About  YISolutions YISolutions is a key player in IT Consultancy, Cyber Security and IT Managed Services. YISolutions was established in 2002-2003 and our Pakistan Registered Office is located in Karachi at Clifton. And our Principle Registered office is located in the US at Herndon.   Core Services; IT Managed Services Cyber Security & Protection Cloud Solution Digital & Social Media Marketing Software Solution Web Solution For more information please email us at  support@yi.com.pk   You can also visit DigiCert e-Store in Pakistan 
Read more

How to Setup POP3 Account in Microsoft Outlook

Setup POP3 Account in MS Outlook 2016 The first time you run Outlook 2016, you’ll see a welcome screen that looks like this: Click Next to Get Started. If you’ve previously configured Outlook 2016, click the File tab at the top of the window and in the Info category, click the Add Account button. In the Add an Email Account wizard displayed, you’ll be asked Do you want to set up Outlook to connect to an email account? Ensure the radio button next to Yes is selected, then click Next. In Auto Account Setup panel, enter the following details:      Your Name: Enter the name you’d like to appear on your emails.      Email Address: Your full email address.      Password: Your email account password.      Retype Password: Enter your email account password again. Click Next. Outlook will now attempt to retrieve your email server details and set up account access. Manual setup If your server cannot be found, check that the email address you entered is correct and try again. You can enter your server details manually by selecting Manual setup or additional server types. Then, click Next. Outlook 2016 supports standard POP3/IMAP email accounts, Microsoft Exchange or Office 365 accounts, as well as webmail accounts from a range of providers including Outlook.com, Hotmail, iCloud, Gmail, Yahoo and more. Select POP or IMAP. Manually set up POP3 or IMAP email accountsOnce you have clicked the radio button next to POP or IMAP, select Next to proceed with your email account configuration. You’ll need your email server details, username and password to hand.       Enter the following details:      Your Name: Enter the sender’s name you’d like to appear on your emails.      Email Address: Your full email address.      Account Type: Use the dropdown menu to select POP3 or IMAP.      Incoming mail server: For POP or IMAP accounts use   mail.yourdomain.com .      Outgoing mail server (SMTP): For POP or IMAP accounts use   mail.yourdomain.com      User Name: Your email account username.      Password: Your email account password. Now click the More Settings… button. In the Internet Email Settings window that opens, select the Advanced tab. Enter the following details:Incoming server: Ensure the default port is set to 110 for POP accounts.Outgoing server (SMTP): Ensure the default port is set to 587 for POP accounts. In-case SSL; Incoming server: Ensure the default port is set to 995 for POP accounts.Outgoing server (SMTP): Change the default port (587) to 465. Use the dropdown menu next to Use the following type of encrypted connection to select SSL. Switch to the Outgoing Server tab. Check the box next to My outgoing server (SMTP) requires authentication, then click the radio button next to Use same settings as my incoming mail server. If the test fails, retrace your steps, ensuring your server and account details have been entered correctly. Once the test completes successfully, click Next and then Finish to wrap up
Read more

How to Setup POP3 Account in Android Phone

Setup pop3 Account in Android Phone Open Settings of your Android device and tap on Accounts menu in section Personal: Tap on Add Account at the very bottom of the screen. On the next screen you will need to choose whether you wish to configure IMAP or POP3 account. Simply choose the desired option by tapping on Personal (IMAP) or Personal (POP3) correspondingly: The next screen will prompt you to enter your email address.Make sure to type in full Email address: Once done, tap Next to proceed to the next step.Here you will need to indicate your email account password. If you decided to use POP3 protocol, the following settings should be indicated:      Your Name: Enter the sender’s name you’d like to appear on your emails.      Email Address: Your full email address.      Account Type: Use the dropdown menu to select POP3 or IMAP.      Incoming mail server: For POP or IMAP accounts use   mail.yourdomain.com .      User Name: Your email account username.      Password: Your email account password.       Once done, tap Next to verify the settings and proceed to Outgoing Server settings menu. Outgoing mail server: For POP or IMAP accounts use   mail.yourdomain.com .      Outgoing mail server (SMTP): For POP or IMAP accounts use   mail.yourdomain.com      Security Type: None or SSL/TLS : None      User Name: Your email account username.      Password: Your email account password.       Once ready, tap Next to verify SMTP settings and finish the account setup:
Read more
Cart

No products in the cart.