Receiving limits in Google Workspace
To keep Gmail efficient and accounts safe, Google limits the number of messages you can receive. If your account receives many automated messages, it's more likely your account will reach the message limit. When an account reaches the limit, you can't receive any new messages. The account might also have general problems, for example slow searching. Any new incoming messages bounce back to the sender. If you're locked out of your Gmail account, an administrator can: Identify which limits haveSome readersEverything You Need to Know About cPanel
Everything You Need to Know About cPanel — Simplified by Thamara Cloud If you’ve ever managed a website, you’ve probably heard of cPanel. It’s one of the most popular and user-friendly hosting control panels out there — and at Thamara Cloud, we make it even easier to use. This guide will walk you through what cPanel is, how it works, and why it’s a favorite for website owners worldwide. What Is cPanel? Think of cPanel as your website’s control center. It’s a web-based dashboard that letsSome readersWhy Buying an Email List Hurts Your Business
Why Buying an Email List Hurts Your Business Building an audience takes time — and that’s okay. It might sound tempting to skip ahead and buy a ready-made email list full of “potential customers,” but that shortcut can backfire badly. Here’s why purchasing email lists is one of the biggest mistakes you can make for your brand, deliverability, and online reputation.' What Is an Email List? An email list is a collection of people who’ve agreed to hear from you — they subscribedFew readersWhat is SEO Toolkit and How to Improve Your Website’s SEO?
What is SEO Toolkit? SEO Toolkit is an extension for the Plesk control panel that helps you analyses, monitor and improve your website’s search‑engine visibility. Key features include: Site Audit – a scan of your site to identify SEO issues (content, technology, indexing) and give you actionable recommendations. Rank Tracker – allows you to monitor how your website’s keywords rank and compare them against competitors. Log File Analyzer – analyses your server log files to unFew readersThe Hidden Benefits of Using a CDN for Your Website
The Hidden Benefits of Using a CDN for Your Website When you visit a website, you expect it to load fast — no matter where you are in the world. That’s where a Content Delivery Network (CDN) comes in. It’s one of the simplest ways to make your site faster, safer, and more reliable. Let’s explore what a CDN is and why it’s worth having for every website. What Is a CDN? A CDN (Content Delivery Network) is a network of servers distributed across different geographic locations. InsFew readersSetting up SSH Keys using PuTTY on Windows
PuTTY is the most typical and effective client for establishing an SSH connection to a server on Windows systems. The setup process requires two tools: PuTTY (the client) and PuTTYgen (the key generator). 1. Download and Initial Configuration A. Download PuTTY and PuTTYgen You should download both tools from the official source. (Insert direct download links for the Windows x86 files here). B. Create the Connection Profile (PuTTY) Open the PuTTY program and configurFew readersWhat Are HTTP, HTTPS, and HTTP/2/3?
What Are HTTP, HTTPS, and HTTP/2/3? Every time you visit a website, your browser talks to the web server using a communication standard called HTTP. This guide explains what HTTP, HTTPS, and their newer versions HTTP/2 and HTTP/3 do — and why they matter for your website’s performance and security. What Is HTTP? HTTP (Hypertext Transfer Protocol) is how browsers and servers exchange data. When you open a page, your browser sends a request to the servFew readersHow to Fix Common WordPress Errors
Overview WordPress is a powerful and flexible platform, but like any software, it can sometimes run into errors. If your site isn't working properly — or has stopped working entirely — don’t worry. Most WordPress issues are common and fixable. Below are the most frequent WordPress problems and how to resolve them. 1. White Screen of Death (WSOD) Symptoms: You visit your website and all you see is a blank white screen — no error messages. Fixes: Disable plugins: Access yFew readersKeeping Your Website Secure with Thamara Cloud
Keeping Your Website Secure with Thamara Cloud Because your website deserves peace of mind. The internet never sleeps — and neither does Thamara Cloud. Your website is the heart of your online presence, and keeping it safe shouldn’t be complicated or expensive. At Thamara Cloud, security isn’t an add-on; it’s built right in. We protect your website from day one, combining smart technology with real human care — so you can focus on your business, not on worrying about hackers oFew readersHotmail Sending Standards Policy
Hotmail has strict anti-SPAM policies using SmartScreen, a program developed by Microsoft, to scan and classify incoming emails. Hotmail limits the number of emails sent from a single IP based on its reputation. Exceeding this limit results in SMTP error code 421. Anti-SPAM Policy: No fake addresses or deceptive content. No nonexistent domain names. No hiding information about the email's path. No sending misleading emails. No subject lines that don't match the email conteFew readersFile upload problem in WordPress
In the following example, the site path will be: /home/user/ And the path for the WordPress program is: /home/user/publichtml/wordpress Log in via FTP, then create a new folder named: wptmp The path of the folder will be: /home/user/wptmp Set the folder's permissions to 777. Navigate to the WordPress folder, which in our case is: /home/user/publichtml/wordpress Edit the wp-config.php file and add the following line: define('WPTEMPDIR', '/home/user/wptmp'); Then save the fFew readersSpam and abuse policy in Gmail
When you sign up for a Gmail account, you agree not to use the account to send spam, distribute viruses, or otherwise abuse the service. All users on your domain are subject to these agreements, which are part of the Google Workspace Acceptable Use Policy. If Google identifies a Gmail user who is violating these agreements, we reserve the right to immediately suspend the user. If the problem is domain-wide, we reserve the right to suspeFew readersCreate New Database, Configure wp-config.php, and Import WordPress
Overview In this part, you will: Create a new WordPress database and user in your Thamara Cloud hosting (via Plesk or C-panel). Edit the wp-config.php file to connect WordPress to the new database. Import your old site’s data into the new database using phpMyAdmin. This completes the migration process — after this step, your WordPress site will be fully transferred to Thamara Cloud. Create a New Database and Database User Create the database and user Log inFew readersUnderstanding IP and TCP
Understanding IP and TCP In today’s connected world, every message, file, and video that travels across the Internet relies on two core protocols — IP (Internet Protocol) and TCP (Transmission Control Protocol). Together, they form the foundation of how data moves online — you may even recognize them combined as TCP/IP, the heart of the Internet itself. This article explains what IP and TCP are, how they work together, and why they’re essential for smooth online communication.Few readersBackup WordPress Database (phpMyAdmin)
Overview This part covers two essential steps of a WordPress migration: Exporting (backing up) your WordPress database using phpMyAdmin. Downloading all WordPress files from the old host and uploading them to the new host using FileZilla (FTP/SFTP) — including hidden files like .htaccess. This is Part 1 of 3. After finishing this part you’ll be ready for Part 2 (create DB & edit wp-config.php) and Part 3 (import DB + final checks). Before you start — checklisFew readersWhat is a CMS (Content Management System)?
What is a CMS (Content Management System)? A CMS (Content Management System) is software that allows you to build and manage a website without needing to code. It provides all the tools you need to create, organize, and publish content — making it ideal for beginners and professionals alike. Whether you’re running a blog, online store, or company website, a CMS gives you the flexibility to control everything from one dashboard. How a CMS Works A CMS separates your website into twoFew readersAdvanced Security Measure: How to Disable Password Authentication for SSH
Once you have successfully configured your SSH Keys, disabling password authentication is the best practice to ensure no one can access your server except through an authorized Private SSH Key. Before proceeding, you MUST confirm that you can successfully log into the server at least once using your newly configured Private SSH Key.If you disable password authentication and key authentication fails (for any reason), your server will become inaccessible vFew readersUnderstanding SSH Access and Its Importance
In today’s digital landscape, secure server management is essential for maintaining data privacy and ensuring reliable website performance. One of the most trusted methods for secure remote access is SSH (Secure Shell). SSH provides a safe way to connect to your hosting environment over an encrypted channel, allowing users to manage files, run commands, and perform administrative tasks remotely — all without compromising security. When a connection is established through SSH, all communicatiFew readersWhat is FTP (File Transfer Protocol)?
What is FTP (File Transfer Protocol)? Have you ever wondered how files move between your computer and your website? That’s where FTP — File Transfer Protocol — comes in. Think of it as the digital courier service of the internet, designed specifically to move files between devices over a network. Originally developed in the 1970s, FTP was one of the first ways to upload website content, share files, and create online backups. While newer and more secure methods exist today, FTP rFew readersWhy Is My Website Loading Slowly?
Why Is My Website Loading Slowly? A slow-loading website can frustrate visitors and negatively impact your search ranking. If your site takes too long to load, don’t worry — it’s a common issue with several possible causes, and most can be easily fixed. Common Reasons for a Slow Website 1. Large Images or Media Files Uploading full-size, uncompressed images or videos can slow down your website significantly. Solution: Optimize images using tools like TinyPNG or CompressJPFew readersCompare Gmail features across Google Workspace editions
Gmail features for Business editions (1-300 users) Email addresses and mailing lists * Requires verifying your domain. Email usage and limits * Requires verifying your domain. Email security & compliance (https://sFew readersSetting up SSH Keys via Terminal - Linux or macOS X
Setting up SSH Keys is straightforward and essential for enhancing security, especially when utilising the native Terminal applications available on Linux or macOS systems. 1. Generating the Key Pair Start by opening the Terminal program on your local machine and typing the following command to generate the keys: Bash Generation Options: This command will prompt you with a few questions; it is recommended to accept the defaults for the file name (usuallyFew readersWhat Are Cookies?
What Are Cookies? Every website you visit asks for your permission to store “cookies” on your device — but what exactly are they? Cookies are small data files that websites use to remember your preferences, login details, and browsing activity. They help make your online experience smoother and more personalized — but they also raise important privacy questions. What Are Cookies? A cookie is a small text file saved on your device when you visit a website. It helps websites “rememberFew readersSpam Prevention
Keeping Your Inbox Clean: Spam Prevention with Thamara Cloud Spam is more than just annoying — it’s a drain on time, productivity, and even server resources. At Thamara Cloud, we take spam prevention seriously and make it easier for you to keep your inbox and hosting environment safe. What Is Spam and Why It Matters Spam includes unwanted or unsolicited emails — often advertisements, phishing attempts, or bulk messages. Over time, spam can slow down your email system, waste bandwidth,Few readersWhat Are Google Workspace?
Google Workspace (formerly G Suite) is Google’s integrated suite of cloud-based productivity and collaboration tools, built to help teams communicate, create, and manage work seamlessly. It combines Gmail, Drive, Docs, Sheets, Slides, Meet, Calendar, and other services under one platform with a consistent, secure admin backbone. Key Features & Benefits of Google Workspace Below is a structured overview of the main features, with what they offer and why they matter.Few readersWhat’s the Difference Between Parked, Addon, and Subdomains?
What’s the Difference Between Parked, Addon, and Subdomains? Understanding Domain Names A domain name is the human-friendly address of your website — the text users type into their browser to reach your site (for example, thamara.cloud). Behind every domain name lies an IP address — a series of numbers that computers use to locate the exact server where your website’s files are stored. For example: 64.238.67.1 Since numerical IPs are difficult to remember, domain names servFew readersEthernet Explained: What It Is and How It Works
Ethernet Explained: What It Is and How It Works What is Ethernet? Ethernet is the standard technology used to connect devices in a local area network (LAN) — such as computers, routers, and printers. It allows devices to share data efficiently inside homes, offices, and data centers. While the Internet connects computers globally, Ethernet connects them locally using wired connections. How Ethernet Connects Your Devices When your device connects to the Internet, the connectionFew readersWhat is a MAC Address?
What is a MAC Address? Every device that connects to a network — whether it’s a computer, phone, or router — has a unique identifier called a MAC Address (Media Access Control Address). This address helps devices communicate within local networks and ensures that data is delivered to the right destination. Understanding MAC Addresses A MAC address is a hardware-based ID assigned to your device’s Network Interface Controller (NIC) — the component that enables wired or wiFew readersGmail Bandwidth Limits
All Google Workspace accounts have Gmail bandwidth limits that help ensure the health and safety of Google systems and accounts. As an admin, you can check the User list in your Admin console for accounts that have been suspended because they’ve reached Gmail limits. You can also see when the accounts will be reset. In some cases, you can reset the Gmail suspension. For more information, go to Restore a suspended Gmail account. Avoid large tranFew readersWhy Is My Domain Not Showing After a DNS Change?
Why Is My Domain Not Showing After a DNS Change? If you’ve recently updated DNS records, changed nameservers, or moved your website to a new host and your site isn’t loading — don’t worry. This is usually due to DNS propagation, a normal process that takes some time. What Is DNS Propagation? DNS propagation is the period it takes for DNS changes (such as pointing your domain to a new IP address or nameserver) to update across the internet. Internet Service Providers (ISPs) worldwide cache DFew readersInternet Protocol (IP): Shared vs. Dedicated Addresses
What is an IP Address? The Internet Protocol Address, commonly known as the IP Address, is essentially the digital identity of any device or server connected to the Internet. It can be likened to your home address; it is a unique string of numbers (typically looking like $192.0.2.1$) used to pinpoint the location of a specific device on the network. Its Importance: Without an IP address, devices cannot locate each other or exchange data. When you visit a website, your computer commFew readersImplementing SEO on Plesk — Step-by-Step and Best Practices
Learn how to use Plesk’s SEO Toolkit and built-in features to optimize your website. This guide covers audits, redirects, robots.txt, sitemaps, caching, keyword tracking, and monitoring. Prerequisites Admin or domain access to your Plesk control panel. SSL certificate (Let’s Encrypt or commercial). CMS or website access to edit content (e.g., WordPress, Joomla, or Presence Builder). Step-by-Step Implementation Guide 1) Install and Activate SEO Toolkit Go to Plesk → ExFew readersKnown Scams | How to Spot and Avoid Phishing Emails
This article helps you recognize and avoid scam or phishing emails that might pretend to be from Thamara Cloud or our partners. We also provide an example of a fake message and steps you can take to protect your account. Protect Your Account and Data Always be cautious with emails that: Use a generic greeting like “Dear Customer” instead of your name. Ask you to click a link or enter details on a website other than thamara.cloud. Claim you must make a payment, renewalFew readersHow to Optimizing MySQL
You can choose to optimize the MySQL server at a basic level or at an advanced level. Basic Optimization MySQL Server can be optimized at a basic level using the MySQL tuner script. Download the script using the command: wget&32;https://github.com/major/MySQLTuner-perl/zipball/master Run the commands: unzip master cd major-MySQLTuner* chmod +x&32;mysqltuner.pl&32;perl&32;mysqltuner.pl The script will check the status of MySQL and update you with the variables that you needFew readersLayers of the Internet
Layers of the Internet Have you ever wondered what happens behind the scenes when you open a website, send a message, or download a file? Every online action relies on a structured system of protocols — organized into layers — that manage how data travels across networks. These layers form two foundational models of communication: The Internet Protocol Suite (TCP/IP) – the model actively used today. The Open Systems Interconnection (OSI) – a conceptual model that explains nFew readersWhat is Google Workspace?
Google Workspace (formerly G Suite) is Google’s integrated suite of cloud-based productivity and collaboration tools, built to help teams communicate, create, and manage work seamlessly. It combines Gmail, Drive, Docs, Sheets, Slides, Meet, Calendar, and other services under one platform with a consistent, secure admin backbone. Key Features & Benefits of Google Workspace Below is a structured overview of the main features, with what they offer and why they matter.Few readersDownload WordPress Files from Old Host (FileZilla)
What to copy (important) Entire WordPress root (usually publichtml or www), especially: wp-content/ (themes, plugins, uploads) — critical wp-config.php .htaccess (hidden file — controls permalinks) wp-admin/, wp-includes/, top-level PHP files (index.php, etc.) Steps — Download with FileZilla Install FileZilla (or open it Connect to the old server Host: ftp.yourdomain.com or server IP Username: your cPanel/FTP userFew readersUnderstanding Sender Reputation and Why It Matters
Understanding Sender Reputation and Why It Matters If you send business or marketing emails — whether from your domain or an email platform — your Sender Reputation determines whether those emails reach inboxes or disappear into spam folders. A good sender reputation means your messages are trusted by Gmail, Outlook, and other providers. A poor one means your audience may never see what you send. This article explains what sender reputation is, why it matters, and what you can do to protecFew readersBest Practices for Google Workspace Accounts
Get the best Gmail performance If you use Gmail for work or school, follow the guidelines in this article to get the best Gmail performance. Avoid bulk operations. Select less than 1,000 messages at a time when you delete emails, discard trash, apply labels, or archive messages. Use Search in Gmail the same way you use Google to search the web. Enter keywords to find messages in your account. Use filtFew readersOptimizing Apache
Optimizing Apache The efficiency with which Apache runs with can be greatly improved with a few small tweaks in the Apache configuration file. Below are the major parameters that can be tweaked to improve the performance of the server. Timeout: This directive is used to define the amount of time Apache will wait for a GET, POST, PUT request and acknowledges on transmissions before automatically disconnecting, when idle time exceeds this value. This value is set to 120 to improve pFew readers