List of all articles
This is a list of all 745 articles available on our support site. It's mainly here to make sure that every page can be found and indexed by search engines. Human beings probably want to use the main page instead.
Support pages for Tiger Technologies Web hosting and domain name customers.
Information about Tiger Technologies and the services we offer.
How to sign up for or cancel your service, update your billing and contact information, retrieve a lost password, and more.
Explains how to send and receive email, set up your email program, and configure spam filtering.
Using PHP and CGI scripts, MySQL databases, SSH connections, SSL certificates, and other website tips and tricks.
Publishing your files using an FTP program, getting statistics about your visitors, and promoting your site.
Our company has been in business under the same ownership since 1991 in the San Francisco Bay Area.
We're committed to running our company in an environmentally friendly manner. We support renewable energy projects to make our company carbon neutral.
Tiger Technologies proudly participates in the "Hosting Code of Ethics" program.
Tiger Technologies has been certified as a "Guaranteed Host" by CompareWebHosts.com.
This page lists frequently asked questions and explains how to contact us if you still need help.
You can also buy domain names from us without Web hosting service. Use the additional domain names to point to websites you have with us, use them with another company, or just "park" them to make sure that nobody else uses them.
Tiger Technologies is an ICANN accredited domain name registrar.
We communicate with customers using our system status page and our blog.
This section contains legal agreements and policies such as our privacy policy.
We have years of experience supporting Macs and other types of computers. Whether you use Mac OS X, Windows or Unix, we’ll be able to help.
We’re strong advocates of open source software, and we make extensive use of it.
We don't outsource tech support to India or anywhere else. Everyone you'll ever deal with is a employee of our company.
We offer Web hosting, email and domain name registration plans that allow you to create a website and permanent, memorable email addresses.
This page lists some unsolicited testimonials and reviews of our service.
Our most popular service is Web hosting and email with a free .com, .net or .org domain name.
The $1.00 fee is an “authorization only” charge to check that the card is valid, and will not appear on your final credit card statement.
Unmetered bandwidth means we never charge extra fees for high bandwidth usage.
Domain name owners are occasionally the target of scams designed to prey on the unwary. This page explains what to look for.
There are no charges to cancel your Web hosting service, and you can cancel at any time. You aren't locked into a fixed-term contract.
Unlike most Web hosting companies, we never lock you into a long-term contract, even if you prepay.
You can securely update your credit card using our account management control panel.
Many popular domain names are free with our hosting service. If you buy additional domain names, or buy a domain name without hosting service, our basic price is $16.92 for one year, dropping to $13.92 a year if you pay for several years.
We offer a money back guarantee that makes signing up with us virtually risk-free.
You can prepay for longer terms to guarantee the current price.
Like most online companies, we don’t offer paper billing by postal mail.
We accept payment by credit or debit card, check, money order, or PayPal.
Unlike most hosting companies, we never charge any kind of setup fee.
We have three Web hosting plans that are tailored to accommodate almost any need. Prices start at just $11.95 a month.
Service costs, payment methods, and other billing questions.
How to change or cancel your service.
Updating the information we have on file for you, including your credit card number and address.
How to change and reset your account password.
Explains how to sign up for our service.
This section covers the basics: it explains the different kinds of email addresses you can create and gives other background information. Read this section first.
Beyond the basics: other email questions answered, such as IMAP support, creating mailing lists and using autoresponders.
Explains exactly how to set up many common email programs, with "screen shot" pictures showing what setting goes where.
We scan and filter your incoming mail to block spam and viruses. You can control some of the settings used.
You can use an FTP program to publish ("upload") your website files on our servers. It’s a good alternative to traditional FTP in most cases.
Answers to common questions customers ask when getting started with a website.
Explains how to promote your site, using search engines and our public customer list.
Our Referral Rewards program lets existing customers earn up to $79.00 by referring new customers.
This page explains how to transfer your domain name or website to or from our company.
We make full backups of your site that you can use to restore from, but you should consider several important points. This topic explains our backup policies.
We allow customers to use cron jobs (scripts that run at regular intervals) with a few restrictions.
The amount of disk space you’re allowed depends on your hosting plan, with a maximum of 100 GB for any plan. Limits on the number of total files and files per directory apply, too.
You can use the account management control panel to add custom DNS entries.
You can customize the messages displayed for common website errors such as "404 Page Not Found".
Our servers support FastCGI and OPcache to speed up scripts for busy sites.
Our servers support Apache .htaccess files and mod_rewrite. Advanced users can add password protection to Web pages, control MIME types, change "404 Not Found" messages, deny pages to certain IP addresses, and more.
How to install and configure custom scripts.
Information about integrating your website or email with popular third-party services.
We offer IPv6 connections for customer websites, although you can disable it if you wish.
In some cases, "mailto:" links may not work because of problems on your visitor's computer.
Our service includes complete support for MySQL databases.
Explains some pitfalls when using non-ASCII characters in URLs.
You can use your account management control panel to protect Web page directories with a password.
Each website comes with a hit counter and FormMail feedback form scripts preinstalled.
Tips to protect valuable content from copying.
Some recommendations and installation instructions for software you can install on your website, including forum, blog, photo album and mailing list software.
An RSS feed is just a text file in a special format that can be uploaded to your website.
Information about custom scripts — including PHP and Perl scripts — and how to use them.
The Unix Shell access gives hosting customers direct access to the Linux operating system of our servers. This allows advanced customers to modify their sites from the command line.
There are several things you can do to improve the speed of your site.
We offer SSL security for your website.
Several independent sites can be used to test that your site (and our servers) are working properly.
We do support TLS 1.2 and 1.3. This article explains more.
How to troubleshoot script problems and get more assistance if you need it.
Our music on hold is a collection of Paul Anka covers.
Using email allows us to route your question to the person on our staff most qualified to answer it, allows that person to research your question to find the right answer, and allows us to send you a complete solution.
It usually takes less than an hour from the time you fill out the form.
You can purchase additional domain names that show the same content as an existing website with Tiger Technologies. We call these extra domain names "domain name aliases".
Domain names without hosting service remain registered until they expire.
Our control panel allows you to view and make changes to your domain name settings, including your contact information, DNS nameservers, domain name locking, and transfer authcode.
Domain names are generally free if you have Web hosting service with us; otherwise, there's an annual fee.
Very few of our customers transfer their domain names elsewhere. But if you do ever decide to do that, we want to make sure that the process goes as smoothly as possible.
If you register a domain name to use with another company's Web hosting service, you'll need to know the names of two DNS name servers.
The company that runs “.biz” and “.us” domain names calculates expiration dates slightly differently than other registries.
You can park your domain name with Tiger Technologies, allowing you to register a domain name now for future use.
You can use our control panel to redirect pages of your site to a different address.
Explains how to renew a domain name registered through Tiger Technologies.
We offer registrations for several types of domain names.
WHOIS expiration dates can be confusing. Make sure you're using the right WHOIS service to avoid inaccurate dates.
Describes when you can “abandon” a domain name registered for you as part of hosting service.
You can update your contact information (e-mail address, postal address and telephone number) using the account management control panel.
You can view a record of all charges and payments to your account in the account management control panel.
If you're acting on behalf of a company or organization, it's important to enter that company or organization name on the order form or contact pages.
When you sign up for our service or update your contact information, you can enter three separate contacts.
The account management control panel is a powerful Web page interface that allows our customers to make changes to their accounts.
Explains how to login to the "My Account" control panel to control your account.
You can group domain names together under one account, or split them, using the control panel.
You can use the account management control panel to view copies of any signup or billing messages we've sent you.
You can change the ownership of an account by modifying the “legal owner” contact to specify a new company, organization or individual.
Providing an SMS-capable phone number improves the security of your account.
You can use the account management control panel to view how much disk space and bandwidth your Web hosting account is using.
Tiger Technologies provides a free WHOIS privacy system to help protect your personal data.
If your account has extra fees in addition to the standard plan fees, an annual prepayment may not cover the full 12 months.
Describes our “Add-On Hosting” plan.
You can switch between annual prepayment and monthly billing using the account management control panel.
You can cancel your hosting service through the customer control panel. If you wish, you'll be able to convert your domain name to a parked, aliased or redirected domain name.
You can switch your Web hosting to a new domain name at no extra cost by signing up for the new domain name and canceling the old one.
You can upgrade or downgrade your Web hosting plan by sending us an email message.
You can easily switch your domain name between hosting and “domain name only” services.
You can transfer your hosting to another company using the account management control panel.
You can change your account password using the account management control panel.
You can request a temporary password that can be used to reset the master account password.
This article explains how to reset various passwords, including the master account password, FTP passwords, and email passwords.
This page generates secure, random passwords for use with our services (or anywhere else) in your web browser.
Explains how you can use a two-factor authentication app to add security to your account.
The catch-all address is a special kind of forwarding address. It accepts mail sent to any unknown address.
This topic explains how to change an email address.
You can create an email mailbox using the "My Account" control panel.
Changing your ISP usually won't affect your Tiger Technologies email accounts. However, there are a few things it's wise to check.
You can change your POP/IMAP mailbox email password using either the Webmail screens or the account management control panel.
If your email has stopped working even though you didn't change anything, this page explains the three most common causes.
Explains how to make sure you don't miss any email when you transfer a domain name.
Explains how to choose between an email mailbox or a forwarding address.
Explains how to verify that the settings are correct for many common email programs.
An email forwarding address simply sends mail to another address. The other address can be a mailbox on our servers or a mailbox on another server.
You can reset an email mailbox password using the account management control panel.
A mailbox is an email address that receives email messages and stores them on our servers.
Our Web hosting service allows you to receive email messages sent to custom email addresses you create.
You can use our Webmail system to read and send email using a normal Web browser.
AOL will reject any message from and to the same aol.com address if it goes through another network (including ours).
Do not use AOL's "Report Spam" button for forwarded email, because it reports your own address as a "spammer".
If you see timeouts when sending attachments via email, it's probably because of the message size.
The autoresponder can send an automatic reply to each message that arrives.
Mail servers can sometimes try to deliver an outgoing message for up to 5 days, causing “bounces” to be delayed.
You can direct mail received via the catch-all address into a mailbox.
We don’t delete unread mail, but we may archive more than 10,000 unread messages in a mailbox.
We sign outgoing mail with DKIM signatures, and you can optionally enable DMARC.
EarthLink will reject any message from and to the same earthlink.net address if it goes through another network (including ours).
Explains how to archive copies of mail from our servers to your own computer.
To avoid problems, don’t set your mail program to check for new mail more often than once a minute.
Explains how to use IMAP and other messages to copy messages.
Explains why you might receive multiple copies of incoming email messages.
We don’t offer a plan that includes only email service, but you can use only the email part of our hosting service if you wish.
Our email servers allow incoming messages up to 200 MB in size, and outgoing messages up to 100 MB in size, but it’s a good idea to keep them below 15 MB.
Explains how you can test whether your computer is able to connect to our mail servers and solve any problems.
Explains why Gmail rejects messages with the error “This message does not pass authentication checks”.
Explains why you might not see messages you sent to Gmail, and how to find them.
Gmail will discard any message from and to the same gmail.com address if it goes through another network (including ours).
Our servers support the newer IMAP mail protocol for reading email.
We don't place individual limits on mailbox size.
Our Web hosting accounts include the powerful Mailman mailing list software, which can be used to create group discussion lists or announcement-only lists.
We can help you move old mail into folders if the size of your Inbox gets overwhelming.
Explains where mail is stored for each mailbox, including exact paths.
Some anti-virus or anti-spam programs can change the incoming and outgoing mail server settings.
Deleting an account can affect previously downloaded mail on some programs.
Explains how to recover an accidentally deleted mailbox.
Explains why you might not see messages you sent to recipients who use Microsoft Office 365, and how to find them.
We support tagged “plus addresses”, allowing you to give a different address to different companies you deal with.
You can make email for two different addresses go to the same mailbox. Just create a normal mailbox for one of the addresses and a forwarding address for the other.
You can add the same address as both a "Mailbox" and a "Forwarding Address".
If you suddenly start having trouble sending mail, this article explains how to fix the problem.
You can reject messages sent to certain email addresses.
You can block mail using either our reject list or your mail program.
In a small number of cases, mail forwarding may not work due to anti-spam technology called "SPF". Using mailboxes avoids the problem.
This will not work — it’s neither secure nor reliable. Always send mail from your own domain name.
Advanced users can deliver their email via Unix .forward files.
Unreadable “winmail.dat” attachments are caused by a setting in the sender’s Microsoft Outlook program.
We don't block spam arriving via Yahoo Groups lists, because Yahoo will unsubscribe you if we do.
All incoming email for your account is checked for viruses, with virus patterns updated hourly.
If the spam filter is blocking legitimate messages from one of your correspondents, you can add the address to your “always allow” list.
If spammers "forge" your address in mail they send, you might receive erroneous "bounce" messages.
Occasionally you might receive a warning claiming you sent a virus. If this happens, the virus was almost certainly sent by someone else with an infected computer, not by you or us.
You can take a number of steps to minimize the amount of spam you receive.
If mail you send ends up in a recipient’s spam folder, you can probably fix it if you find why it’s happening.
Advance fee fraud spam (often called "Nigerian widow" or "419" spam), stock scams, and lottery scams are the most difficult types of email for a filter to block.
We recommend using a free service such as SpamCop to report spam. This topic explains how to do that and describes the "full headers" needed to report spam.
You can use Sieve mail filters to control how mail is delivered.
We use a content-based scanner called SpamAssassin to allow advanced users to create additional anti-spam mail rules.
We use a number of different filters to detect and reject spam.
If you're forwarding your mail to addresses that track spam, you won’t be able to disable our spam filtering.
We don’t use a “spam folder” by default, although you can enable one if you wish.
If you use a forwarding address to direct mail to a mailbox, the spam filter setting of the the forwarding address is used when mail arrives for that address, and the mailbox spam filter setting is ignored.
Explains how you can use Webmail to login multiple email addresses simultaneously.
We’re improving our webmail system. This article has more details.
Explains how to fix incorrect Webmail (or other IMAP search) results.
Explains how to make the Webmail login screen remember your email address or password.
Explains how you can use a two-factor authentication app to add security to your webmail logins.
You can set the domain name Mailman uses to match a domain name alias.
The archive system supports up to 100,000 messages per list and provides searching in English text.
You can allow attachments to be sent to your Mailman mailing list by turning off "content filtering".
You may occasionally be notified that a large number of undeliverable addresses have been unsubscribed at once.
You can use a simple list creation screen to set up a new mailing list.
Although the default appearance of the archives can't be changed, advanced users can use their own software to create archives.
We can manually delete archives upon request.
Mailman's "digest" option allows list members to receive several messages grouped together.
This can happen in some mail programs when non-plaintext messages are sent to a list that has content filtering turned off.
If someone with a Gmail address posts a message to a mailing list, the message won't show up in their own Gmail "Inbox".
You can allow HTML messages to be sent to your Mailman mailing list by turning off "content filtering".
This happens when messages are forwarded or BCC:ed to the list address.
You can manually use the Mailman pages to "invite" new recipients to join your list. When you do so, Mailman verifies each address for you.
This topic explains several ways to stop automated mailing list loops.
You can manage your mailing list by going to a special page in your Web browser.
You can download copies of the Mailman “.mbox” file from our backup system.
You can change member names, email addresses and subscription options in the Membership Management section of the Mailman administration pages.
Mailman's "mod" checkbox controls who can post messages to a list.
Mailman's "nodupes" option can sometimes prevent subscribers from receiving copies of their own messages.
We don’t provide Mailman list hosting unless we handle all the email for the same domain name.
You can change or reset a Mailman mailing list password using the account management control panel.
"Full personalization" controls the "To" header of the message that list subscribers receive.
Turning off the “Send welcome message to newly subscribed members” option can cause this problem.
You can send a message to your list using your normal mail program, sending to a special address.
Explains how to view or export all members of a Mailman list.
This usually happens when a subscriber accidentally sends his or her personalized unsubscribe link to all the other subscribers.
Visitors can subscribe using a Web page or by sending an email message.
Why does Mailman tell me a page I'm saving “contains suspicious HTML”?
Some mail programs incorrectly create "multipart/related" messages that will be filtered by Mailman.
You may need to ask our staff for assistance if you see an IMAP error that says “[CANNOT] Renaming not supported across conflicting directory permissions”.
Explains how to make an IMAP mail folder “read-only”.
By default, an iPhone or iPad will remove old mail from the Trash folder after seven days.
Explains how to fix error 8004DF03-0-0-560 when synchronizing folders in IMAP.
Your computer or device might re-download old mail if it loses track of what it’s already seen.
Explains what a “domain not found” or “has no A or MX record” e-mail error means, and how to work around it.
As long as your video or audio file doesn't require a special "streaming media server", it will work with our servers.
When you change a Web page, the change takes effect immediately. However, you may need to clear your Web browser's cache to see it.
Our web servers usually do not treat URLs as being case sensitive. In other words, URLs pointing to "mypage.html" and "MyPage.html" will usually both work. However, it’s best not to rely on this feature.
Explains how to avoid common mistakes when creating a site.
To create a website without using WordPress, you'll need to design the Web pages and "publish" them onto our servers.
Learn how to use shopping carts and accept credit cards on your website.
You can give your website a special icon that (usually) appears in the visitor's address bar and bookmarks.
You can use an FTP program to publish your website files if you aren't using WordPress.
Our servers support Macromedia Flash and Shockwave. Of course, you do need to make sure that your visitors have the appropriate plug-in.
We support scripts written in Perl and PHP. That means you can use a wide variety of scripts written by other people, or create scripts yourself.
In some cases, we can transfer your existing Web pages.
If you sign up for a brand new domain name, it usually starts working in less than an hour. Transfers of existing domain names can take several days.
We handle the technical side of "hosting" your website, but we don't create the text or graphic design of the Web pages that will go on your site: the content is up to you.
Our servers support Apache Server Side Includes (SSI).
Explains how you can view statistics about the visitors to your website.
Subdomains allow you to access your site using names like "sales.example.com", as well as "www.example.com". You can create unlimited subdomains at no extra charge.
FTP stands for "file transfer protocol", which is a standard method of copying files from your computer to a Web server.
We don't support anonymous FTP, but you can use your website to distribute files instead.
You can use our file manager from any web browser to publish, download or modify your files. It’s a good alternative to traditional FTP in many cases.
You can create additional FTP accounts, with separate passwords, through the customer control panel.
Explains why you can’t use the FTP “SITE CHMOD” command to remove your own write permissions.
Our servers store your website files and your home directory in different places. To access both, you will need to create an extra FTP account.
The most common cause of FTP problems is that you have some kind of firewall installed, or you're using a cable or DSL modem that acts like a firewall. Turning on FTP "passive" mode will help.
You can reset the password for any additional FTP accounts you have created.
If you remove “read permissions” from your files or folders using FTP, you may need to use the shell to fix it.
Screen shots and instructions explaining how to use common FTP programs.
A “weak ciphers are not accepted” error means your FTP program is using an old, unsupported version of SSL.
We support SFTP ("secure FTP") and scp.
Explains how to speed up the transfer of many small files when using FTP.
Explains how to publish (upload) your website files using FrontPage 2002.
We no longer support Microsoft FrontPage. Customers who use FrontPage should switch to a different program.
Explains how to copy files from the server back to your computer when using FrontPage 2003.
Explains how to publish (upload) your website files using FrontPage.
Use your account management control panel to add your website to our public customer list or remove it. Including your site can make it more visible in search engines.
It's possible to pay an extra fee and extend the expiration date of a domain name.
Explains how you can ensure that search engines continue to find your website if you change to a new domain name.
Explains how to list your site with the major search engines.
Google and other search engines only update their site description and previews when they reindex your site.
Explains popular sites used to sell domain names.
Explains how to create a "sitemaps" file to improve how search engines such as Google "crawl" your pages.
AWStats is a powerful website statistics program preinstalled for all accounts.
Different statistics programs measure different things, which can show different results.
Explains how advanced users can access the "raw" Web server log files.
Spammers can insert fake "referring page" information into your statistics. You can block the entries.
It's normal for your website statistics to show requests for missing files named "robots.txt", "favicon.ico" or "sitemap.xml".
Explains what our statistics program means by "hits", "pages viewed", "unique visitors", "authenticated visitors", "entry pages", "exit pages", "spiders" and "robots".
You can use a script to make the AWStats reports available to other people.
We can host just a subdomain of a website, but you need to take special steps to make that work.
Explains how to block a certain IP address from viewing your site.
You can set a “Content-Disposition” header to force a web browser to download a file instead of displaying it.
Explains how to make any directory "execute" CGI files like the special cgi-bin directory.
Explains how to make a directory show a list of files without an index file.
You can use "SetHandler default-handler" to ensure that scripts can't be run from a directory, improving security.
This article describes how to temporarily “take down” or disable your site.
Explains how to protect individual files within a directory using a .htaccess file.
Our servers support Apache's mod_expires commands, allowing you to increase the amount of time that Web browsers cache your pages for.
Our Web servers support a variety of index file names by default. Advanced users can change the defaults.
We don't compress files by default, but you can optionally enable this feature.
We support the Apache web server mod_geoip feature. You can enable it in your site’s .htaccess file.
Our servers support Apache's mod_expires commands, allowing you to prevent Web browsers from caching your pages.
It's possible to redirect visitors from a "www" version of your website to a URL that doesn't display it (or vice versa).
Explains how to use a .htaccess file to use a different directory as the “top level” of your website.
Explains how to change your FrontPage software settings to upload your website files using the FTP method.
Custom scripts are programs that add interactive features to your website.
We unfortunately do not support Microsoft ASP or .NET scripts.
CGI scripts are automatically enabled for all accounts. You can install and use CGI scripts at any time without prior permission (except for email scripts).
We strongly recommend against using unmoderated guestbooks on your website.
Explains how to connect to MySQL databases from PHP and CGI scripts (and even from other computers, in some cases).
We support scripts written in the Perl and PHP programming languages, as well as some "compiled" scripts created for the Linux operating system.
The path to your cgi-bin directory is based on your domain name.
Before using scripts, you should be aware of our script policies, particularly regarding scripts that send email.
You can use precompiled programs with our Web hosting service, as long as they're compatible with our version of Linux.
Describes where font files are installed on our servers.
If you're using Front Page to publish a CGI script file, it should take care of most of the details (such as choosing the correct transfer mode) for you.
These instructions explain how to install your own local copy of the Go runtime.
Your home directory is a private directory that can only be accessed by your own scripts.
The path to your Web directory is based on your domain name.
How to use Perl CGI scripts with our Web hosting service.
You can use PHP scripts with our Web hosting service. This article explains how to install and configure PHP scripts.
How to use Python CGI scripts with our Web hosting service.
We support the Ruby scripting language.
Depending on the type of script, it may need to be placed in a special location on the server.
Scripts that run on the server should use the Sendmail program to send email.
Explains how to create a Web page that can be used to upload files to your website and how to protect it from hackers.
You don't need to create world-writable files or directories.
What to do if you're having trouble with custom CGI scripts.
Our servers set the sender address to an address based on your domain name with @tigertech-hosted-site.net added to the end, unless you specify a particular address in your web script or our control panel.
You need to make a CGI script file "executable" to tell the Web server that it's a program.
You may see an Internal Server Error message for a variety of reasons. The most common is that you've uploaded your script in the wrong "mode" in your FTP program.
The script checker checks CGI scripts you've uploaded for common problems. It can also make them "executable" from within your Web browser.
We're occasionally asked if it's possible to create additional MySQL usernames that have different permissions for the same database.
We make daily backups of all MySQL databases.
Advanced users can connect to a MySQL database using the “mysql” command-line tool.
You can easily create MySQL databases in your account management control panel.
You can easily delete your MySQL database in your account management control panel.
The phpMyAdmin tool can be used to export and then import a database, allowing you to create a duplicate database with a different name.
You can use phpMyAdmin to import a SQL dump file into your MySQL database.
You can avoid problems when adding more than a few thousand rows to a database table.
If you get a MySQL error message saying “ Error 1709: The maximum column size is 767 bytes”, you can fix this by changing the ROW_FORMAT of your table to DYNAMIC.
If you get a MySQL error message saying “ Error 1104: The SELECT would examine more than MAX_JOIN_SIZE rows”, you probably have an error in your database query.
We automatically optimize small MySQL tables once a month.
You can change a database password in the account management control panel.
Explains the technical details of how we “hash” MySQL passwords.
If you wish, you can enable remote connections to your database so that you can connect directly to the database from your own computer.
This page explains our policies about MySQL database size and CPU load.
MySQL stored procedures are supported.
MySQL triggers are supported.
We currently use MariaDB version 10.11.6 for MySQL databases.
If you don't want to manage your MySQL database through the Unix shell, you can use the phpMyAdmin program we provide.
Explains how you can use SSH keys to access the files of one domain name from another on our servers.
Explains how to use SSH “keys” that allow multiple people to connect using their own passwords.
If you see this error message, you need to update your Perl script for compatibility.
We have many Perl modules already installed, but you can also add your own.
Explains how to debug Perl scripts, including getting the output of warn() and die() messages.
You can use SpeedyCGI (aka CGI::SpeedyCGI) to significantly speed up Perl scripts.
Experts can compile their own version of the PHP scripting language.
Our servers include Composer, a dependency management tool for PHP projects.
You can enable ionCube Loader to run encoded PHP scripts.
Our Web hosting service supports PEAR packages for use with PHP.
Describes rare issues some of our customers experienced when upgrading from PHP 5.2 to PHP 5.3, in case they're useful to others.
It’s possible to run filenames that don’t end with “.php” as if they were PHP scripts.
You have to enable a special option to use the “PHP_AUTH_USER” and “PHP_AUTH_PW” variables within PHP scripts.
Our version of PHP includes a feature that can help you troubleshoot slow outgoing connections from your scripts.
Explains how to properly send mail from PHP scripts.
Error messages saying that MySQL is not available for PHP are almost always caused by uploading an incorrect "php.ini" file.
PDFlib is not free software, so it's not installed on our servers by default. We recommend using php-fpdf instead.
Advanced users can configure their site to display highlighted PHP source code for ".phps" files.
Explains how to avoid PHP timeouts.
Our servers run PHP in CGI mode (not an Apache module), so you can't use "php_value" or "php_flag" commands in .htaccess files. However, you can modify your php.ini file to get the same effect.
We use PHP version 8.2.24 by default for new accounts. Other versions are also available.
You can enable SourceGuardian Loader on your account to run encoded PHP scripts.
You can enable Zend Guard (Zend Optimizer) support for your account to run encoded PHP scripts.
When your script sends messsages, it must use the correct "envelope sender", "bounce" or "Return-Path" address.
You need to explicitly set the bounce address when using sendmail to send email from scripts.
If you send mail from a script, but get a “bounce” saying “SMTPUTF8 is required, but was not offered by host”, you can fix this by changing your script.
The "dos2unix" utility can convert DOS (CR/LF) text files to Unix (LF) format.
Our script policies allow you to add interactive features to your website. Like most shared hosting companies, though, you won’t be able to run programs unrelated to your website or email service.
phpMyAdmin doesn’t currently support editing routines, functions and triggers.
Explains how to solve phpMyAdmin warnings saying “a form on this page has more than 5000 fields”.
Tips to help you pass a credit card PCI (Payment Card Industry) Data Security Standards scan, or similar security scan.
Explains how to get an SSL certificate for your site.
With modern SSL certificates, the domain names are listed in the “Subject Alternate Name” section of the certificate, not just the “common name”.
Explains how to make sure that all connections to your website are secure.
This message is common in the first day or two after you add an SSL certificate to your site, and can usually be ignored.
Explains how to add new hostnames to an SSL certificate.
Explains how to make browsers show the “secure padlock” for your site.
If you include URLs to non-secure images in a secure Web page, your browser may warn you that the page is only “partially secure” or “partially encrypted”, or that the page has “mixed content”.
If you buy an “AlphaSSL” certificate, you can add a graphic “seal” to your SSL page to indicate that it’s secure.
Search engines may give a slight ranking boost to SSL sites, but that probably shouldn’t be the main reason to do it.
Explains how to solve a "Cert Chain not trusted" error message with older versions of Eudora.
Explains how to use the "New Account Wizard" to add an email account to Eudora.
How to start the Eudora new account wizard that lets you create additional/new accounts.
How to configure Outlook Express to use IMAP connections.
Outlook Express lets you easily move messages between different IMAP accounts.
Describes a Microsoft page that explains how to fix some common Outlook Express problems that are unrelated to our servers.
Explains how to verify that the Outlook Express mail settings have been entered correctly.
You can change your Outlook Express settings to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
How to turn on SSL encryption for added security with Microsoft Outlook Express.
Screen shots and instructions explaining how to configure Outlook Express.
If the Outlook program on your Windows computer has saved a password you need, you can use view that password later.
Screen shots and instructions explaining how to manually configure Microsoft Outlook 2007 to send and receive email.
Screen shots and instructions explaining how to automatically configure Microsoft Outlook 2010 to send and receive email.
Screen shots and instructions explaining how to configure Outlook 2011 for Mac OS.
Screen shots and instructions explaining how to automatically configure Microsoft Outlook 2013 to send and receive email.
Screen shots and instructions explaining how to configure Microsoft Outlook 2016 or 2019 to send and receive email.
Screen shots and instructions explaining how to configure Outlook (2016 or later) for macOS.
Explains how to set up the “Outlook” app on an Android phone or tablet.
Explains how to fix a problem where Microsoft Outlook asks for a Google login when setting up an email account hosted with us.
This page discusses whether Outlook calendars can be synchronized with other devices.
Explains how to fix a problem where Outlook says a “message store”, “PST file”, or “OST file” is too large.
Explains how to set up the “Outlook” app on an iOS device.
Outlook for Mac has a bug that can cause duplicated images.
If there’s a folder on the mail server that isn’t visible in an Outlook IMAP connection, you can change the Outlook settings to make it show you all the folders.
If Outlook doesn’t show new messages as soon as they arrive, removing and re-adding the IMAP account may help.
Microsoft Outlook allows you to create custom filters to handle mail. You can use the filters to organize email and handle "spam" based on the SpamAssassin score.
If there’s a folder on the mail server that you don’t want to see in an Outlook IMAP connection, you can change the Outlook settings to hide that folder.
If the Thunderbird program on your computer has saved a password, you can view that password later if you need it.
Explains how to create custom filters to handle mail in Thunderbird.
Explains how to fix Thunderbird if the message preview pane shows blank subjects, incorrect dates, or other problems.
The Thunderbird mail program has several ways to detect "junk mail".
You can change your Mozilla Thunderbird settings to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
Mozilla Thunderbird allows you to create custom filters to handle mail. You can use the filters to organize email and handle "spam".
Screen shots and instructions explaining how to manually configure Mozilla Thunderbird.
You can press the “alt” or “F10” key to show the Mozilla Thunderbird menu bar.
Explains how to verify that the Mozilla Thunderbird mail settings have been entered correctly.
We don't display advertising on your Web pages.
You can view our public customer list, which has links to hundreds of sites.
A domain name is your own permanent, memorable address on the Internet.
To sign up for Web hosting account with us, you simply fill out a single signup form that doesn't ask for any technical information. We handle everything else.
You'll still need to maintain an account with the company that provides your Internet connection.
You can host additional domain names with your Tiger Technologies Web hosting account.
There are a small number of rarely used services we currently don't support.
We use brand-name servers housed in a secure data center to ensure hardware, network, power and cooling integrity.
We use Apache 2 Web server software running on reliable Linux servers.
We provide a hit counter script that you can add to your Web page.
We provide the FormMail script preinstalled for our customers, allowing you to collect information from your website visitors and have it sent to you by email.
If FileZilla gets stuck with a message saying “initializing TLS” or “Connection timed out”, you can often disable TLS to get it to work anyway.
Explains how to enable "passive mode" in the FileZilla FTP program.
Explains how to make FileZilla preserve the timestamps on uploaded files.
This topic explains how to disable “S/MIME” signing in the Apple Mail program if you’ve accidentally enabled it.
An account set up in Apple Mail will seem to completely disappear if you accidentally uncheck “Enable this account”.
This happens because of a bug in Apple Mail.
The Apple Mail program has a bug that won’t let you drag folders in a certain ways. This page explains how to work around that bug.
Explains how to make sure the Apple Mail “Sent” and “Trash” folders work correctly.
You can change the “From” name in the “Internet Accounts” preferences.
Screen shots and instructions explaining how to set up the Apple Mail program for Lion or Mountain Lion (obsolete older versions of Mac OS X).
Screen shots and instructions explaining how to set up the Apple Mail program for Mavericks (an obsolete older version of Mac OS X).
Screen shots and instructions explaining how to set up the Apple Mail program for Snow Leopard (an obsolete version of the Mac OS).
Explains how to verify that the macOS “Mail” program settings for IMAP have been entered correctly.
Explains how to verify that the Apple mail settings have been entered correctly.
If your Apple Mail mailbox gets too large, it may appear empty. You may also see the message "Message has not been downloaded from the server, take this account online to view".
Explains how to set up older versions of the Apple Mail program to use IMAP (instead of POP3).
You can change the settings in Apple Mail to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
Explains how to manually configure the Apple Mail program.
If Apple Mail doesn’t check your mailbox but doesn’t show any error messages, you probably need to “take the account online”.
Screen shots and instructions explaining how to set up the Apple Mail program for Yosemite (an obsolete older version of Mac OS X).
Recent versions of macOS and iOS enable a feature called “Follow Up” that can show unanswered messages as “new”.
When you change the password for your email account in our “My Account” control panel, you need to update it in two places in the Apple Mail app, then quit and reopen Mail.
When you change the password for your email account in our “My Account” control panel, you need to update it in two places in the Apple Mail app, then quit and reopen Mail.
Explains how to set up the “Airmail” email app to make an IMAP connection on iOS devices.
Explains how to set up the “Airmail” email app to make a POP3 connection on iOS devices.
Instructions for setting up the Alpine command-line email program.
Screenshots and instructions showing how to set up an Android-based phone or tablet, including popular Samsung phones.
Explains how to read your email using a BlackBerry portable device.
Explains how to configure VersaMail on a Palm Treo.
Screen shots and instructions explaining how to configure Microsoft Entourage for Mac OS X.
Screen shots and instructions explaining how to configure the "Eudora" email program.
Instructions for setting up the Fetchmail program.
Explains the generic email settings you'll need if your mail program isn't listed.
Explains how to configure Gmail to read the mail from your mailbox, and to send mail from your address.
The Android Gmail app allows you to read mail from other addresses, too. This page explains how.
Screen shots and instructions explaining how to configure IncrediMail.
Screenshots and instructions showing how to set up email on the Apple iPhone, iPad, or iPod Touch.
Screen shots and instructions explaining how to set up the Apple Mail program.
Explains how to configure Netscape Communicator to send and receive email.
Screen shots and instructions explaining how to configure Microsoft Outlook.
Screen shots and instructions explaining how to configure Pegasus Mail.
Explains how to configure PowerMail software for Mac OS X.
Explains how to set up the Spark email program on macOS, with screenshots showing what goes where.
Screen shots and instructions explaining how to configure Mozilla Thunderbird version 6 and above.
Instructions on how to add a mail account to the standard Mail program in Windows 10.
Instructions on how to add a mail account to the standard Mail program in Windows 8.
Screen shots and instructions explaining how to configure Windows Live Mail.
Screen shots and instructions explaining how to configure the "Windows Mail" program included with Windows Vista.
Explains how you can use the Yahoo! Mail website to read email.
Screen shots and instructions explaining how to use Cyberduck, our recommended free SFTP / FTP program for Mac OS X and Windows.
Instructions and screen shots showing how to set up Dreamweaver for our Web hosting service.
Screen shots and instructions explaining how to publish using Microsoft Expression Web, a free web design program for Windows.
Screen shots and instructions explaining how to use FileZilla, a free FTP program for Windows and Mac OS X.
Screen shots and instructions explaining how to use Fetch, a Mac OS X FTP program.
Screen shots and instructions explaining how to use Fugu, a Mac OS X SFTP program.
If your FTP program isn’t listed separately, these instructions should work with any FTP program.
If you are using Windows XP or later, you can use a normal folder window as an FTP program to upload your Web files.
Screen shot and instructions explaining how to use iWeb '09 to publish your web site files.
Instructions explaining how to use Microsoft Publisher.
Screen shots showing how to configure RapidWeaver, a macOS web design program.
Explains how to use the Transmit FTP program to publish files to your website.
Screen shots and instructions explaining how to use WS_FTP.
You can change your Entourage settings to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
A "412 Precondition Failed" error message indicates that the visitor's request matched a server security rule.
Explains the causes of a “413 request entity too large” error.
HTTP 431 errors can usually be fixed by “clearing the cookies” in your web browser.
Explains the causes of a "503 Service Unavailable" error message.
We have a page showing all the articles available on this site.
We use the Apache Web server, version 2.4.62. This article lists Apache modules we have installed.
This topic shows art credits and copyright information.
Explains how to solve problems with runaway “autodiscover” lookups.
Describes how we attempt to block automated malicious “robots”.
An ssh connection is a bash “login shell”, so you need to put shell commands in a file named “.bash_profile” instead of “.bashrc”.
The HTML “bgsound” element is non-standard and only works in the Microsoft Internet Explorer browser, not in other browsers.
Here is the information that a BluDomain technician needs when installing one of their templates on our servers.
When people send you email or visit your website, the addresses are not case-sensitive. However, when you use your email address or domain name as a username, the case can matter.
If you're using old mail settings, you may not be able to send outgoing mail through our servers until you first read incoming mail.
Explains how to set up Cloudflare properly with a site that hosted on our servers.
You need to enable FastCGI to make "pretty URLs" work in the concrete5 CMS.
We’ve heard of several cases where the “Constant Contact” mailing list company doesn’t send any mail to addresses on their “Global Block List”.
This topic explains how to fix “cross-origin resource sharing” (CORS) errors on your web pages.
We use our own custom control panel software, rather than cPanel.
CPU resources are more abstract than disk space or email mailboxes. This page explains how we measure CPU usage.
You can access and test your website using a special "customers.tigertech.net" link.
We use Debian Linux 12.8 (“bookworm”) with current security “patches”.
You can use the command line shell to unzip or decompress any uploaded files.
Your site will usually use a "shared" IP address, but dedicated IP addresses are also available.
Explains one way to be notified when any files change on a website.
If you use McAfee security products and you have problems connecting to any of our servers, try disabling the McAfee software as a test to see if it's causing the issue.
If you use Norton security products and you have problems connecting to any of our servers, try disabling the Norton software as a test to see if it's causing the issue.
Explains how to file a DMCA copyright complaint with Tiger Technologies.
Explains that we do not have any special protections against “denial of service” attacks, and that you should instead choose a company that specializes in that.
This page explains why visitors to our customer websites are not able to directly view the contents of “/.git/” and similar directories.
This page explains why visitors to our customer websites are not able to view pages when using certain Web browser "user agents".
If you sent a message to one of our customers, and your mail server returned it as "undeliverable" with a link to this page, the "Outgoing SMTP Mail Server" you are using is not working properly.
This page explains why visitors to our customer websites are not able to submit guestbook entries when using "HTTP/1.0" software.
This page explains why visitors to our customer websites are not able to submit guestbook entries when using software that prevents the Web browser from sending the "referer" information.
Using ETags on our servers doesn’t hurt performance, and you should usually leave them enabled.
Entering a third-party address ensures we can contact you throughout the transfer process.
Lists the DNS settings of our web servers. This page is intended only for technically advanced customers in unusual circumstances.
Lists the DNS settings of our email servers. This page is intended only for technically advanced customers in unusual circumstances.
Tiger Technologies can make minor edits to your website content.
If Tiger Technologies directed you to this page, it's because you reported an email message to our abuse department as being "spam" sent by one of our users. However, in this case, the message wasn't actually sent by one of our users: it was sent by a spammer who forged the email address of that user.
If you are using Windows XP, you can use Internet Explorer as an FTP program to upload your Web files.
Some "Norton" security products show warnings about "Trojan horses" when you publish files using FTP. These messages are just a flaw in the Norton program, not a real security problem.
Our servers support the git version control software client.
Explains why you might get a “bounce” message from smtp.secureserver.net saying “This message has been rejected due to content judged to be spam by the internet community??IB212”.
Explains messages like “Googlebot encountered 1 errors while attempting to retrieve DNS information for your site”.
Like most hosting companies, Tiger Technologies is not certified for HIPAA requirements.
You can edit your computer’s “hosts” file to force your browser to contact our servers for your website, even if the DNS for your site points elsewhere.
Why do I see a charge from “IMTIGERTECH” on my bank, credit card or PayPal statement?
This page shows you the IP address of your computer in case our support staff ask for it.
Explains the LD_PRELOAD “tigertech_write_limiter.so” library we use for hosting accounts.
Explains how to make various mail programs leave messages on the server after reading them using a POP connection.
Explains the problems with Mac OS "Icon" files, which can be hard to delete.
Mac OS sound files in the "SND" format should be converted to another format before uploading.
If a subscriber to a Mailman list reports a message as “spam” to their ISP, and that ISP forwards the complaint to us and asks us to unsubscribe the recipient, we will do so.
Why am I blocked from subscribing to a Mailman list?
You can create a custom DNS record to avoid using "mail.tigertech.net" in your email program, although we don't recommend it.
Our Terms of Service prohibit “intentional misinformation”. This page explains what we mean by that.
The ImageMagick "convert" and "mogrify" programs can be useful, but they can also be resource-intensive.
Changing the target of a domain name alias for cosmetic reasons can cause problems, and is not recommended.
This page is used internally by our uptime monitoring system.
Our servers support Netpbm, GD and ImageMagick.
Tiger Technologies no longer creates, updates or sells software programs. Instead, we focus on our Web hosting services.
We don’t allow direct SMTP connections from scripts on our hosting servers to port 25 on remote servers.
Explains why our servers don't allow filenames like "image.php.jpeg".
If you were directed to this page by a message from Tiger Technologies, we have disabled one of your PHP scripts because a spammer has taken advantage of a programming error in your script to send spam.
Explains how to change the default placeholder page.
There are several different ways to point a domain name at another server or website.
Our Terms of Service prohibit “pornographic content”. This page explains what we mean by that.
This page explains rate limits we have in place to protect certain Web pages.
This page explains rate limits we have in place to protect certain Web pages.
Regular Expressions are a powerful and convenient way to search and test for content in a string. They can also be used in most programming languages.
Explains how you can allow Tiger Technologies staff to view and control your computer.
Explains how to take a screenshot and email it to Tiger Technologies for support.
Describes the symptoms when a website makes nested requests to itself.
Microsoft Silverlight content works on our servers.
Notes on how to get good performance when running SPIP.
Our servers support Subversion (svn) version control software.
Using VERP to track bounced messages.
Can you send me an IRS W-9 form for Tiger Technologies?
A domain name becomes available for registration between 35 and 80 days after it expires. We may be able to register it for you then.
If your computer is mysteriously blocking connections to our servers (especially FTP connections), the Windows Firewall may be the cause.
Describes how we attempt to block automated malicious PHP scripts in the “/wp-content/uploads” directory.
Scripts or browsers may complain that XML output cannot be properly parsed. This can be caused by extra blank lines in the XML.
Explains the recommended “robots.txt” file to use with the OpenCart shopping cart software.
Explains how you can update "DNS nameservers" when you transfer your Web hosting service to Tiger Technologies. (Most customers do not need to do this themselves.)
It should be possible to transfer a domain name that’s expiring or expired, but we don’t recommend it.
You can transfer your website to Tiger Technologies without transferring the domain name if you prefer.
You can sign up for an account with us on our website at www.tigertech.net.
You should check a few things to make sure your domain name transfer goes smoothly.
Explains how to transfer a domain name and/or website from another company to Tiger Technologies.
Explains how to transfer a domain name from DirectNIC to Tiger Technologies.
Explains how to transfer a domain name from GoDaddy.com to Tiger Technologies.
Explains how to transfer a domain name from iPower.com to Tiger Technologies.
Explains how to transfer a domain name from Network Solutions to Tiger Technologies.
Explains how to transfer a domain name from Melbourne IT to Tiger Technologies.
Explains how to transfer a domain name from Register.com to Tiger Technologies.
Explains how to transfer a domain name from "Domain Registry of America" to Tiger Technologies.
Explains how to transfer a domain name from Yahoo! Domains to Tiger Technologies.
If you use Dreamweaver to manage your website, and you somehow lose the copy of the files on your own computer, you can copy them from the server.
Explains how to view and modify the FTP settings for an existing "site" in Dreamweaver.
Explains how to set up a new "site" in Dreamweaver. Setting up a site allows you to easily publish your files to our servers.
Explains how to turn on "passive FTP mode" in Dreamweaver.
Explains how to publish files using the Dreamweaver program.
If you've accidentally enabled Dreamweaver's "testing server", this article explains how to turn it off.
The “full headers” of an email message are like Internet postmarks. They show where a message really came from even if the sender’s address was forged.
A common scam is to send you a fake offer to buy your domain name for an inflated price, then say you have to have it “appraised” for a fee.
A company named "DNS Services" is sending misleading statements to domain name owners via postal (paper) mail.
A company named “Domain Listings” or “Domain Networks” is sending misleading invoices to domain name owners via postal (paper) mail.
A company calling itself "Domain Renewal Online" is sending misleading renewal notices.
A company named “Domain Registry of America” or “United States Domain Authority” is sending misleading "expiration notices" to domain name owners via postal (paper) mail. This company has been cited by the FTC for misleading consumers.
A company named "Internet Listing Service" is sending misleading subscription invoices to domain name owners via postal (paper) mail.
A common scam message sent to domain name owners claims to be from a domain name registration company saying that someone has tried to register a similar domain name, and asking if you want to block it (for a fee).
The Dada Mail mailing list software (also known as Mojo Mail) works with our servers.
Explains how to install Drupal, a popular free content management system that includes a blog.
Screen shots and instructions explaining how to install the Joomla Content Management System.
Screen shots and instructions explaining how to install MediaWiki, a free wiki.
Our servers are compatible with the latest version of Moodle.
Explains how to install the free phpBB discussion forum software to create forums on your website.
Instructions for the configuration of phpList.
You can use WordPress to create a website or blog in minutes, without needing any additional software.
An error with an orange border usually means the Contact Form 7 plugin thinks a message is spam.
Explains how to fix an infected site by reinstalling it from scratch (without losing the existing data).
Explains how to avoid “DMARC” delivery errors when using the WordPress “Contact Form 7” plugin.
Explains how to transfer/duplicate/copy an existing WordPress site to our servers.
If you become unable to login to WordPress, you can manually edit the associated database to fix the problem.
This topic explains how to move a WordPress installation to a new location (URL) on our servers.
If your WordPress multisite setup redirects to “wp-signup.php”, it indicates that there’s something wrong with your multisite setup.
How to create a test or staging site with WordPress.
You must not copy infected sites to over servers. This page explains why it’s not possible to be sure you’ve cleaned every infection, and has a link to instructions explaining how to install a clean site.
This page describes how to configure the W3 Total Cache plugin to avoid poor performance.
If you see error messages saying "412 Precondition Failed" while using WordPress, these are usually caused by the "Bad Behavior" plugin.
If you delete a WordPress “user”, the posts, pages and images created by that user will disappear unless you assign them to another user.
You can use an FTP program or the command-line shell to deactivate a WordPress plugin, even if you can't login to the WordPress dashboard.
Explains how to remove WordPress.
You can use WordPress plugins to delete comments or posts that spammers have added to your site.
You easily can change the WordPress settings to allow comments and/or trackbacks and pingbacks.
Describes three simple things you can do to eliminate almost all WordPress security problems.
To login to the dashboard a WordPress site, add /wp-admin/ to the end of the site address.
If you don’t want to install WordPress with our “one-click-install”, these instructions explain how to install it manually.
WordPress allow you to change the target of a link to media you upload.
We offer WordPress migration services for moving to our company from another web host. The service is free for most customers.
Error messages saying “Your PHP installation appears to be missing the MySQL extension which is required by WordPress” are usually caused by uploading an incorrect “php.ini” file, or by trying to use an old WordPress version with PHP 7.0.
Explains how to configure the WordPress Multisite “Network of Sites” feature, as well as the “Domain Mapping” plugin.
The WordPress login page allows you to reset a WordPress password.
Explains how to “tweak” WordPress to run more quickly, allowing it to handle many times more visitors.
The “Tiger Technologies WordPress Plugin” is automatically installed when you use our WordPress installer.
Phishing warnings in the Chrome Web browser can be inadvertently triggered by the WordPress plugins page.
Explains how to remove “customers.tigertech.net” from the end of WordPress blog links after a transfer.
Explains how to remove some common WordPress "exploits" or "hacks".
Explains why we don’t recommend using some WordPress “security plugins”.
Explains how we can make a WordPress site show as “secure” using SSL security.
Explains why WordPress might show a message saying it’s “Briefly unavailable for scheduled maintenance. Check back in a minute.”
This page discusses the importance of keeping WordPress up to date, and has tips for how to do so.
This error message is usually caused by an incorrect WordPress setting that you can easily change.
It’s likely that you don’t actually need to increase WP_MEMORY_LIMIT, even if you see a message telling you to do so.
The “WP Super Cache” WordPress plugin can dramatically improve the performance of your WordPress site.
The presence of a file named “.extended-spelling-corrections” used to make our web servers handle missing files differently, but no longer has any effect.
If you use our control panel "wizard" to create a Mailman list, it sets certain Mailman options. This page explains those options, for advanced users.
Explains how to create private directory listings, where you can view and possibly download the files in a directory, even though other visitors can't see the listing.
If you are using Ruby on Rails and want to ensure maximum stability, you should "freeze" the version of Rails you use.
We no longer support Ruby on Rails.
Explains how to install a local copy of a Ruby gem.
You’ll need to contact us to update the IPS tag of a .uk domain name.
Domain name registration agreement for all domain names for which we act as the direct registrar.
Domain name registration agreement for certain domain names handled by third-party company Tucows.
This privacy policy describes how we collect and use personal information.
Explains our spam policy, which all customers are required to follow when sending mail.
This page lists our Terms of Service Agreement. Each of our customers must agree to these terms.
Many sites on the Internet offer tips that can help explain how you can avoid having your mail labeled as "spam".
You're the only person who can prove that people asked to be on your list. It protects you.
The CAN-SPAM Act allows service providers to set their own strict anti-spam policies.
We're not a general bulk mail company, but we do allow mailing lists if you follow some strict requirements.
Spam is not "free speech".
You can't create a list of addresses from people's Web pages or public postings (except for publicly posted addresses that ask for press releases).
You can't hire other people to send messages that would violate our spam policy if you sent them yourself.
Even if you include unsubscribe instructions, you still need to verify addresses added to your mailing list.
Charitable, political, informational, or other non-commercial messages are subject to the same rules.
Our spam policy applies to messages sent through any servers.
Unfortunately, paper forms do not count as address verification.
If you're following our spam policy, we'll provide you with the address of anyone who complains so you can remove them from your list.
You can't post promotional messages in places not intended for that purpose.
If you run your own mailing list, there are a few rules you need to follow so you can defend yourself against any allegations of spamming.
You can't obtain a list of addresses from someone else and send messages to those addresses (unless you get further permission from the recipients).
Verifying each address is an easy step that fully protects you against false spam allegations.
Statistics show that the verification system works well if you verify addresses promptly.
Our spam policy makes sure your messages get reliably delivered.
Provides legal details regarding our company.
We recommend using an escrow company when purchasing a domain name.
We support adding “CAA records” to specify which companies are allowed to issue SSL certificates for your domain name.
We’ll automatically import some DNS records that always make sense to keep.
We support adding “DS records” at the central registry.
Our DNS editing and nameserver host pages allow you to enter IPv6 addresses.
You can access Mailman "scrubbed digest attachment" links for 90 days.
If the your computer or device has saved an email password, you may be able to view that password later if you need it.
If you need to view an email password on a Mac computer that has saved it, you can use the “Keychain Access” program.
Explains how you can use the Python “Django” framework with FastCGI on our servers.
Explains how you can use the Python “Flask” framework with FastCGI on our servers.
Explains why setting up a new website as Add-On Hosting accounts is better than as a subdirectory of another site.
Screen shots and instructions explaining how to configure Microsoft Outlook 2007 using AutoDiscover.
How to configure Outlook 2007 to use IMAP connections.
You can change your Outlook 2007 settings to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
How to turn on SSL / TLS encryption for added security with Microsoft Outlook 2007.
Explains how to verify that the Outlook 2010 mail settings have been entered correctly.
You can change your Windows Mail for Vista settings to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
How to turn on SSL encryption for added security with Windows Mail.
Explains how to verify that the "Windows Mail" settings have been entered correctly.
You can use Tortoise SVN as a graphical front end to Subversion.
Including a leading “www” in your URL links gives you more flexibility to manage your site.
If you’ve previously used our webmail pages from your iPhone or iPad, you may be able to view that password in the Settings app later.
If you’ve accidentally clicked the mail filtering icon, your device may wrongly say “No Mail”.
When you change the password for your email account in our “My Account” control panel, you need to update it in two places in the iPhone or iPad mail app.
This page discusses whether an iPhone or Mac can synchronize with other calendars, including Outlook calendars.
Explains how to set up folders on your iPhone, iPad, or iPod Touch.
Explains why messages can show out of order on iOS after moving mail between folders.
Explains how to manually configure an iPhone, iPad, or iPod Touch.
You can change the settings on your iPhone to ensure it will automatically fetch mail every few minutes.
Explains how to fix an iPhone or iPad error saying a message “was rejected by the server because it does not allow relaying”.
Explains how to verify that the mail settings are correct on an iPhone, iPad or iPod Touch.
This page explains how to configure your domain name when your website is hosted with Adobe Portfolio.
How to display your Blogger website using a custom domain name.
How to configure your Tiger Technologies domain name for use with Google Workspace (formerly known as “G Suite” and “Google Apps”).
Explains how to verify your site with a “DNS TXT record” if asked by Google Webmaster Tools.
This page explains how to keep email with Tiger Technologies when your website is hosted at Kajabi.
Explains how to configure your domain name for use with the “Microsoft 365 Business” Exchange mail server plan.
This page explains how to configure your domain name when your website is hosted at Squarespace.com.
This page explains how to configure your domain name when your website is hosted at tumblr.com.
How to access your TypePad blog via your domain name.
How to display your Weebly site using a custom domain name.
This page explains how to configure your domain name when your website is hosted at Wix.com.
Explains how to verify that the Apple mail settings have been entered correctly if you’re using the older Mac OS X “El Capitan” operating system (or earlier).
How to configure important IMAP folders in Windows Live Mail.
You can change your Windows Live Mail settings to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
How to turn on SSL encryption for added security with Windows Live Mail.
Explains how to verify that the Windows Live mail settings have been entered correctly.
Describes the “ranges” of IP addresses that we use for incoming and outgoing connections.
You can change the settings in Apple Mail to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
Explains what PHP is, and why you should update it.
Explains how to verify that the Android mail settings have been entered correctly.
Explains what to check if your Android phone doesn’t download mail, or doesn’t download attachments, on cellular networks.
You can use a different shell by updating your ".bash_profile" file.
You can change your Outlook 2010 settings to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
Screen shots and instructions explaining how to manually configure Microsoft Outlook 2010 to send and receive email using an IMAP connection.
Screen shots and instructions explaining how to manually configure Microsoft Outlook 2010 to send and receive email using a POP connection.
Explains how to verify that the Outlook 2010 mail settings have been entered correctly.
You can use phpMyAdmin to import a text file into your MySQL database.
Explains how to verify that the Outlook 2011 mail settings have been entered correctly.
Some of our customers use the company “Wix” to host their website, but use our email service. If so, you need to set it up a certain way at Wix.
Explains how to verify that the Apple mail settings for IMAP have been entered correctly if you’re using the older Mac OS X “El Capitan” operating system (or earlier).
Explains how you can allow Tiger Technologies staff to view and control your computer (obsolete method).
Explains how to use the WordPress “Duplicator” plugin to copy a WordPress site.
Explains how to use the WordPress “WP Clone” plugin to make a copy of a WordPress site.
If you use POP3 with Outlook 2013, you can change your Outlook settings to leave a copy of each message on our mail servers, allowing you to also read the messages in another program.
Screen shots and instructions explaining how to manually configure Microsoft Outlook 2013 to send and receive email using an IMAP connection.
Screen shots and instructions explaining how to manually configure Microsoft Outlook 2013 to send and receive email using a POP connection.
Explains how to verify that the Outlook 2013 mail settings have been entered correctly.
Explains how to make sure the Apple Mail “Sent” and “Trash” folders work correctly if you’re using the older Mac OS X “El Capitan” operating system (or earlier).
Explains optimal settings to use for the Wordfence WordPress plugin.
Explains how to verify that the Outlook iOS app mail settings have been entered correctly.
Screen shots and instructions explaining how to manually configure Microsoft Outlook 2016 to send and receive email using an IMAP connection.
Screen shots and instructions explaining how to manually configure Microsoft Outlook 2016 to send and receive email using a POP connection.
Explains how to set up two different Outlook accounts for the same address so you can copy mail between different servers.
Explains how to verify that the Outlook 2016 or 2019 mail settings have been entered correctly for an IMAP account.
Explains how to verify that the Outlook 2016 or 2019 mail settings have been entered correctly for a POP3 account.
This problem happens if you use an outdated tool or web browser that does not support “Server Name Indication” (SNI).
Explains how to verify that the Outlook 2016 or later mail settings have been entered correctly.