How do I enable SMTP Authentication?

It is necessary to enable SMTP Authentication (or SMTP Auth) in your email client (the software on your computer that you use to send and receive email) in order to send email through your server. Below are instructions on how to set up SMTP Authentication in several of the most popular email clients. If you…

Goldmine 6 Settings

Important:  Our systems require SMTP authentication to send e-mail.  This is necessary to keep spammers at bay.  The earliest version of Goldmine that is SMTP authentication capable is version 5.7.  Earlier versions cannot be used to send e-mail through our systems. Incoming Mail Server = yourdomainame.comOutgoing Mail Server = yourdomainame.com SMTP Authentication (e-mail username) is…

Common FTP Problems and Solutions

The majority of FTP problems are caused by 3 easy to fix settings.  In this article I will go through these items so that you can get FTP working properly. Remote path issues: The default FTP login location on our servers is NOT the public web folder.  This is done for security reasons, however it means that…

CIIC Web Site Acceptable Use Policy

CIIC Web Site Acceptable Uses Policy and Terms Of Service. Welcome to CIIC Web Hosting and Design. We are pleased that you chose CIIC’s web hosting service to for your website. IMPORTANT: Please read the Agreement of CIIC Hosting Services below carefully and thoroughly. Print it out and save a copy for your records. By…

Setting Filters for SPAM in your mail program

All mail arriving at our servers from outside will be passed through a set of filters which attempt to classify it as spam or non-spam. You can customize your SPAM setting by following the instructions here. Once the classification has been made, special headers are inserted into the mail message, and the mail is delivered…

CIIC Remote Support

CIIC offers Remote Desktop support. This means that with your permission we can remotely help you make changes and setup your email service with CIIC. This is done through a secure software program and you always have total control. Nobody can access your machine without your approval and password you give to a support rep…