1&1 Online Success Center

The 1&1 blog is closed

Dear readers, There will be no more new posts published on the 1&1 blog. We have decided to offer you our expertise by reorganizing our content so that it’s easier to understand and tailored to your needs. The existing 1&1 know-how is by no means lost, instead all information will be targeted at relevant audiences on other social media platforms. We will continue to provide you with expert knowledge, news and support at the following addresses: Basic and advanced knowledge, trend reports, tutorials, tips and tricks featuring 1&1’s expertise (servers, websites, web hosting, domains, e-mail, online marketing, e-commerce and SMBs) will be available on the 1&1 Digital Guide: https://www.1and1.com/digitalguide/ 1&1 product updates will continue to be released from the 1&1 newsroom. Here you will find all current press releases: http://newsroom.1and1.com/ For additional hosting tips and general web information, visit us on Facebook, Twitter and YouTube: https://www.facebook.com/1and1 https://www.youtube.com/1and1 https://twitter.com/1and1 (@1and1)

New apps for your online store: how to optimize your customer loyalty

Continuously promoting new items and generating new customer leads for your online shop is time-consuming and cost-intensive. Therefore, it’s recommended that online merchants build long-term relationships with shop visitors and customers. A profound analysis of your visitor and buyer structure, as well as targeted e-mail marketing can bring you a lot closer to this goal. Here are two apps from our 1&1 Online Store that can help. E-mail marketing is one of the most important tools for online retailers. Through newsletters, you can reach customers quickly, effectively and personally. Therefore, be sure to keep in touch with regularly. This allows you to build trust and create a lasting relationship – if you follow some basic rules: Automated e-mails for special occasions Welcome mail, birthday wishes or season’s greetings – there are many occasions to make yourself relevant to customers. Combine mailings with vouchers or discount codes and show your customers that they matter to you. For customers who have not visited your website for a while, individual product recommendations or coupons can encourage them to return. Newsletter2Go: Be relevant Customers decide at first glance whether an e-mail in their mailbox is relevant to them, and only then will they open and read it. For this reason, formulate the subject in a way that the customers feel addressed personally. Also, be sure to meet the individual interests and needs of your recipients. You learn about these when you analyze the click or purchase behavior of your customers. Afterwards, you can tailor messages and recommendations to each customer. Important key figures such as the open and click-through rate are automatically measured by the tool at each shipment. This allows you to see at a glance how your newsletter attracts recipients and what you can do to optimize. Here’s how it works: With the new e-mail marketing integration, you can directly connect your 1&1 Online Store with e-mail marketing software from Newsletter2Go. Your recipients will be synchronized and existing groups and settings will be automatically carried over. The software from Newsletter2Go is specially tailored to the needs of e-commerce merchants, so you can focus on creating high-quality newsletters and improving your customer loyalty. Sales analytics: Keep track of and optimize your revenues Already using tracking tools like Google Analytics or etracker? These offer exciting insights about the number of visitors, their whereabouts, or the time they have spent in your shop. However, questions such as “Which products are sold most frequently?” “How often are they ordered?” and “Who are your most loyal customers?” remain unanswered. Dashboard widgets for your shop are available to help provide you with some of these statistics. In addition, you can also find the new free Sales Analytics app, which provides you with many other key sales figures for your shop. Here’s how it works: After installing the app, follow the instructions to link you automatically link your online shop. Then, log into the app-related website where you’ll see all sales statistics. There, you’ll see a dashboard including a summary of sales, number of orders and best-selling products, and filter by date and period of time. The left menu provides further insights, for example: days with highest turnover, products purchased together, and number of new or returning customers. Optimize your shop based on the results Using sales data can help plan special campaigns based on weekdays with the highest sales rates. Try marking frequently sold products as bestsellers, or promoting cross-sales of products often purchased together. In addition, you can directly address your most loyal customers with custom newsletters and reward them with special discount codes. Regardless of how large your online store is, it is important that you understand your customers and their behavior so that you can tailor the design of your online store as well as your email marketing. More information about 1&1 Online Store can be found here.

Domain transfer, owner change and IDN: The big domain glossary part 5

How can a domain be moved to another provider? How does a domain transfer to a new owner? And what does IDN stand for? Answers to these and other questions can be found in the fifth part of the 1&1 Domain Glossary. Domain Name Transfer Domain transfer is the process of moving a registered web address to a new provider like 1&1. In 2014, ICANN instituted binding rules of the transfer procedure for all registrants: Initially, the domain owner verifies himself to the future registrar. After that, he files a domain transfer application to the previous registrar and requests a corresponding authorization code, which is also called AuthInfo. The future registrar forwards the request to the superordinate registry. The registry then contacts the current registrar and requests approval (if no reply is received within five days, it’s rated as approval). The current registrar sends an e-mail to the domain owner or admin-C. The administrative contact now confirms the transfer (if the status remains unchanged, this is considered a rejection). The current registrar forwards the confirmation or rejection to the superordinate registry. As a last step, the registry completes the transfer to the new domain-provider in its database. The duration of the domain transfer depends on the selected domain transmission. As a rule, the actual domain relocation is completed within 14 days. For full instructions, find out how to move your domain at 1&1 in just 3 steps. Domain Ownership Transfer When a change of ownership occurs, the current domain owner assigns his rights to his domain to a new owner. The existing contract is terminated by the current domain owner and a new contract between the future owner and the registry or registrar is closed. Here you can find out how you can make the change step by step at 1&1 and what should be observed. Multi-Year Renewal If you have found the ideal web address for your project, you might want to keep it forever. But the domain name registries limit how many years you can register your domain name in advance. The registration period varies from one year to a maximum of ten years. At 1&1 you have the possibility to secure your perfect domain directly for up to five years. Private domain registration For many domain registrations, the domain name registries and registrars are obliged to announce the registration data via WHOIS databases. The “Private Domain Registration” service shields the confidential data of a domain owner and publishes the contact details of the trustee instead. This service protects the personal data from misuse by criminal third parties. The domain owner holds of course, all rights to his domain, even if the data of a trustee are published. In detail, our domain expert Thomas Keller explains in this article why the “Private domain registration” is a useful service. IDN IDN stands for international domain names (internationalized domain names). They are also referred to as special characters domains. Correspondingly, these are domain names that contain ligatures, diacritics, or letters from other alphabets than the Latin alphabet. Originally, special characters were not provided in the domain name system (DNS); they were first introduced by the Internet standard “Internationalizing Domain Names in Applications” (IDNA). In principle, almost all Unicode characters in IDNs are allowed. However, each domain name registry or NIC regulates which characters it allows for the registration of their domains. TMCH Trademark Clearinghouse, or TMCH, gives companies and brand owners the opportunity to have their trademark data entered into a centralized database. With the introduction of the new top level domains (nTLDs), the domain name system has been significantly expanded and brands and companies have accordingly a larger selection of web addresses available. On the other hand, the threat to the intellectual property of domain owners increases with the extension of the TLD spectrum. It offers more opportunities for cybersquatting and other activities that potentially violate copyright law. As an organization that monitors the domain name assignment on the Internet, ICANN has developed TMCH mechanisms with which domain owners can protect their trademark rights during DNS expansion. WDRP This abbreviation stands for “Whois Data Reminder Policy”. This is an ICANN guideline for registrations, which will stop them from keeping the Whois database up-to-date. Each registrar sends out a mailing to all domain owners once a year, where they are asked to check their current Whois data. The reason for this is that incorrect Whois data can be a reason for deleting a domain. Therefore, the sending of this mail is mandatory for all registrars once a year per domain. E-mail Verification A validation of the e-mail address registered for the domain owner is prescribed by the ICANN. In the case of registration, domain transfer or subsequent modification of the e-mail contact addresses of the domain owner, the domain owner can be requested to provide additional confirmation of the details. This e-mail verification is necessary if the registered contact address of the domain owner is not listed in the system; It is also the case, for example, for new customers. For the verification, an e-mail with a verification link will be sent to the domain owner’s address. Want to know more about the structure of domains, their technical background and institutions of the Domain sector? You’ll find a lot of information in the other parts of the domain glossary: Part 1 – Top Level Domain and Co Part 2 – How the Domain Name System works Part 3 – Registry, Registrar, Registrant Part 4 – The most important institutions in domain business The last part is about premium domains, domain parking and threats like domain grabbing and cybersquatting.

How (and why) you should set up a VPN

In March, the United States House of Representatives voted to end FCC regulations that limited how internet service providers (ISPs) use their customers’ sensitive personal information, including geographic, health, and financial data, as well as web browsing and app usage history. Compared with the results of a recent Pew Research study, and it’s easy to see why 91% of adults believe that consumers have lost control of how personal information is collected and used by companies. So, what steps should a conspicuous consumer take to mask their digital footprints? Already, 86% of American internet users admit to taking precautions with their web usage, such as clearing cookies, encrypting their email, and avoiding using their real name. However, many consumers would like to do more to ensure their privacy and are unaware of tools that can help—like setting up a VPN. What is a VPN? A virtual private network (VPN) is a self-contained communication network, which only allows members logged in via VPN access to internal data. A publicly available infrastructure such as the internet is used as means of transportation. Therefore, access to a private network via VPN is possible from any location. For example, you can use a VPN connection to read business emails at home. In this case, your local internet connection acts as an “extension cable” to the internet connection at work. Using a VPN guarantees privacy and security since incoming and outgoing network addresses are scrambled and data is encoded from both senders and receivers. In summary, VPN sets up a secure, private connection between two systems. How to set up a VPN Note: To use the VPN, you have to install the OpenVPN software on the local PC. Attention: For technical reasons, you can only establish one connection to your cloud servers via VPN. If you want to establish multiple VPN connections at the same time, you must configure a VPN connection for every local PC. In the left menu, click Network > VPN. Click Create. Enter the name you want for the VPN. In the Advanced Options section, click Show. Select the desired data center. Click Create. The VPN is created.

Ransomware – this is how you beat blackmailers

These days, the definition of ransom isn’t limited to holding people hostage, but also computer data. The most recent example of ransomware is the “WannaCry” attack, which had a worldwide impact. So how should you deal with a digital hostage crisis? And what can you do to protect yourself from it? Recently, the WannaCry ransomware attack hit Windows PCs of currently over 200,000 users, in more than 150 countries.[1] Internet criminals use it to encrypt sensitive data on PCs demanding the payment of $300 in the crypto-currency Bitcoin. If victims did not pay the ransom within seven days, blackmailers threatened to delete the encrypted data. This affected both organizations and individuals, including logistics companies like FedEx and a number of British hospitals. In the meantime, the malware’s range of impact has been mitigated. Unfortunately, ransomware is the fastest growing trend in internet crime and the next wave is undoubtedly coming. So how should you react when your own data is suddenly taken hostage? How to deal with digital blackmail Do not pay the ransom You’re probably thinking, “But won’t I get the files back if I pay the ransom?” Unfortunately, there is no guarantee that you will get your data back. Even if you did pay the ransom, you are giving proof to attackers that you are susceptible to blackmail and may be asked to pay again and again. Do not surrender to such demands. Do not click on attachments in emails There are many ways for criminals to infect your system. One of the most common methods is through spam. If you receive an unexpected email and are asked to download a link or install a great screen saver, don’t do it. Do not click on the attachment. Keep your software up-to-date Criminals know all about your software and the potential vulnerabilities they can use to access your computer. Therefore, make sure that updates and patches are set to install automatically in order to close any known weaknesses in your system. Doing so will prevent missing any updates that keep your system safe. WannaCry exploited vulnerabilities found in the outdated XP version of Windows. Therefore, only use software that is still supported by the software provider. Up-to-date systems are not only important to fight against ransomware, but as a general precaution for the theft of personal data commonly transferred during online banking or when using cloud services such as iTunes. Use security software To protect your system from unauthorized access, we recommend a holistic security solution such as Norton by Symantec. Back up your data regularly A regular back up of your data on an external hard drive, DVD, USB stick or similar storage mediums will remove the leverage from blackmailers they otherwise would have on you. In addition, locally separated storage in the cloud can be an option, too. You then have the possibility to recover encrypted data from another source. Also, regularly check that you are able to restore your back up properly. Protection measures at 1&1 For systems managed by us, such as web hosting, email and e-commerce packages, 1&1 always offers the latest software versions, updates or patches and installs them. In case of self-managed servers that we do not have access to, customers themselves are responsible for updating their systems. However, when we provide our customers with these products, we always make sure that automatic updates are activated. The need for keeping systems up-to-date and backed up is more important than ever. Doing so will keep you prepared in case of future ransomware attacks. [1] For further information on WannaCry, please visit the blog of security expert Symantec: https://www.symantec.com/connect/blogs/what-you-need-know-about-wannacry-ransomware?linkId=37539318

A fitting name for your web project: How to find the perfect domain

Are you on the verge of starting a company or finally want to go online with your established company? The first thing you need is a domain for your web project – the first online impression of your company. Here are seven tips to help you find a domain name that will anchor in the minds of your customers. Short, easy to remember and unique Short, simple domains are easy to remember, which is especially important as mobile device usage gains in popularity. The perfect domain name should also be unique, and ensures that people find your website easily without a long, confusing search. In addition, an easy-to-remember web address increases the chance that visitors return to your site. Use a name that matches your business It’s natural to use your name or company name for your web presence. This is particularly appropriate if your company is already established, or if you have a personal brand as a freelancer or entrepreneur. On the other hand, a creative domain name can be a good option to help show off your originality: the trick is to find a unique name that also creates the desired connotation to your visitors. However, try not to include trending topics in your domain name since it makes it harder to separate yourself from the competition. A fad can be over as quickly as it comes – tying your name to it will eventually be seen as outdated. Use the benefits of keyword domains Search engines prefer domain names with keywords; therefore a keyword domain can be beneficial. If your domain contains a specific keyword, it will be highlighted in the search results and users will be able to see your website first. However, do not focus on the keyword only (for example, photo), because the competition over an established term is hard. Instead, try combining it with something unique, for example: PetersPhotography.com. Avoid special characters and numbers Domain names that contain numbers or special characters are internationally difficult to understand. This can easily lead to misunderstandings, especially from word-of-mouth conversations. The hyphen is an exception to this special-character rule: A domain name composed of more than two words and separated by a hyphen guarantees readability. For this reason, you should also consider whether the separation by a hyphen is useful in the case of two-word domains in order to avoid misunderstandings. Please make sure that your name is good for verbal sharing Word-of-mouth marketing should never be underestimated. Make sure your domain name is easy to pronounce and spell. Your web address should be able to be typed correctly after first listen. Check the trademark rights If you choose a domain that can cause conflicts in trademark law, don’t take the risk. There is always the danger of losing the brand dispute. Should you have already invested the work, the worst outcome would be to start all over again. Therefore, it is advisable in all respects to be informed about any existing trademark rights in your Patent and Trademark Office. In the United States, both private first and last names, trademarks, names of companies and individuals enjoy legal protection by naming law. In addition, work titles (titles of books, magazines, films, TV programs and software) as well as city names, license plates and designations of state institutions are protected by the Anticybersquatting Consumer Protection Act (ACPA). Domain with incorrect spelling Do your customers regularly misspell your company name? Then register this spelling as an additional domain for your website. This allows you to prevent potential and existing customers from finding the wrong website and/or ultimately ending up with your competition. In this case, it is also possible to register various Top Level Domain variants as well as domain names with special characters and numbers, which we have advocated for the main domain (See tip 4). Implement your idea now and register your perfect domain at 1&1. As an exclusive promotion offer, you’ll get a .online new Top Level Domain for free in the first year!

What to do if you have been hacked

You’re sitting in the office and you’ve just opened a weird attachment you thought was from your boss. It wasn’t – and now your computer is acting like it’s possessed, with strange pop-ups and unusual behavior. What do you do—panic? Pretend like nothing happened? Turn off your computer and hide until someone confronts you? Instead of the above, follow Norton’s checklist for what to do if you have been hacked. Stay calm: Your first instinct might be to panic, but take a couple of deep breaths. Disconnect from the network: Turn off your Wi-Fi or any other network connections. Remove the network cable if you have access to it. Contact an expert. No one is better equipped to deal with a hack. Quickly assess the risk level: Did the computer crash or are there any messages on the screen? Did you download and install software a hacker could be using to access your files? Scan your computer with security software: Check if you have a suite of security software installed like Norton™ Security Online. Remove any threats: Quarantine and delete anything the software detects as a threat. Shutdown the hard drive: If you think the threat might be serious, power your computer off. Ask an expert to remove your hard drive or bring it to a reputable computer repair shop to do it for you. Call your bank: Check for any unusual transactions; cancel your card, if necessary. Once it is safe, do a final check: Turn your computer back on and uninstall any recent software that you did not install or you were not aware of. Backup any important files: Save your files to the cloud or a hard drive. Recover any accounts: Reset your passwords. Yes, all of them! Set up 2FA: Two-factor authentication links your accounts to your phone. Check your sent box: Contact anyone the hacker may have messaged or spammed. Try to figure out what happened: Did you open a link or attachment in a strange unsolicited email? Did you connect to a public or unsafe Wi-Fi connection? Did you tell someone else your password? Did you click on a pop-up or strange ad? Did you illegally download media or use torrents? Have you recently downloaded or installed software? Is your antivirus software up-to-date? Breathe easy: Crisis averted! Remember: Always back up your files to a hard-drive or the cloud, and ensure your software is up to date. In addition, create strong passwords that are at least 12 characters long and a mix of numbers, symbols, and letters. A professional security package such as Norton™ Security Online is essential for small and medium-sized businesses in order to protect their equipment from online danger and misuse.

4 simple ways to automate your workflow

No matter what your business may be, we’ve all had moments when it feels like there’s just not enough hours in a day to get work done. Between administrative tasks and long-term projects, it can be difficult to find ways to make real progress at work. Luckily, advances in digitization have made it simple to squeeze some extra productivity from your schedule. From small business owners to freelancers, read on to find out a few of our favorite ways to automate your workflow and help you work smarter, not harder. 1. Choose a CRM First and foremost, whether you use social networks, email, phone or online support, self-service portals, live chats or smartphone apps – it’s important to create a central network for all your channels as they are valuable customer touch points. Planning and nurturing this complex network of relationships with the customer is the Customer Relationship Management’s (CRM) job. Check out a few of our recommendations here. 2. Create once, share often If you regularly post on a blog or on social media networks, creating an editorial calendar is an incredibly helpful way of staying on track. A simple way to really make an impact with your content is to schedule posts in advance using your CMS (for blog publishing) or with a tool like Hootsuite. In addition, there are many 1&1 MyWebsite Apps that you can utilize to help share content through social media. Read more about it here. 3. Use Google to keep up with the competition One of the simplest ways to monitor your brand’s reputation and gain insight into industry trends is by setting up a Google Alert. Whenever Google finds a new search result that matches a list of your defined search terms, you’re automatically sent an email with the result. We recommend adding terms such as your name, business name, specific products, topics or trends that pertain to your business. 4. DIY automation Since the rise of the Internet of Things, the possibilities for creating productive solutions using connected devices are nearly endless. IFTTT (short for “If This, Then That”) allows you to create “applets” using the devices and services you already use and develop new experiences. For example, you can track your work hours in Google Calendar, add new Square payments to a spreadsheet and more.

1&1 rankingCoach starts: Take your website success into your own hands

The new company website, the new web shop is finally online and shines in a mobile-optimized, modern design. But something essential is missing – the website visitors! In order to get prospective customers to the website, it is important that your site is found through search engines. With 1&1 rankingCoach basic, small and medium-sized companies are able to start using professional search engine optimization (SEO) without any previous knowledge. Step by step, increase online visibility Which measures are necessary to increase the online visibility of your website? 1&1 rankingCoach basic shows you step-by-step how to optimize your website or online shop through SEO. The intuitive SEO tool stands by your side throughout the optimization process, from analysis to implementation to reporting and control. Each step is accompanied by numerous video tutorials. These videos navigate through individual “tasks” that explain how each step works and includes tips for improvement. Step-by-step, you can use an easy to follow task list to implement the recommendations for optimization via OnpageSEO, link building, local SEO and social media links. You can see the progress made and changes in ranking transparently and check its success at any time. Based on these results, 1&1 rankingCoach adapts to the current state of the search engine visibility and updates the upcoming tasks accordingly. This way, you can improve your ranking easily within a short time. See directly how your website is positioned through SEO With the 1&1 SEO website checker, you can get a first SEO review of your website without logging in. Simply enter your website URL into the search box and you will receive information on the optimization potential of individual SEO criteria such as search engine visibility, on-page optimization, backlinks, visitor numbers, keywords, mobile usage and social media. The 1&1 SEO Website Checker can be found here: https://www.1and1.com/improve-website-ranking Comprehensive analysis of your own website Watch the search engine ranking of your keywords daily through the many analytics possibilities. You will also receive a detailed report, where the measured data of SEO indicators such as link texts, backlink types and geographical origin are recorded and evaluated. In addition, you have your biggest competitors at your fingertips, as the intelligent monitoring system analyzes their websites. These analytics features help you to continually optimize your site for search engine optimization. This increases your visibility on the web and increases your traffic. Anyone can use 1&1 rankingCoach, because the tool automatically adapts to your CMS. All popular website systems are supported, including CMS like WordPress, Joomla! and 1&1 MyWebsite or shop systems such as Prestashop, Magento and 1&1 E-Shop. 1&1 rankingCoach basic is now available for $9.99 per month. More information can be found here: https://www.1and1.com/improve-website-ranking RankingCoach partnership Technology partner of the new offer for small and medium-sized companies is rankingCoach, a leading provider of cloud-based online marketing solutions. In the long term, we offer our customers a state-of-the-art product to improve their online visibility.

“A Shakespeare quote is not yet a play” – opportunities and developments in content marketing

Content marketing is currently on everyone’s mind. But what exactly does it mean and how does good content help in terms of search engine optimization (SEO)? 1&1 SEO expert Torben Henke discusses what makes a difference with good content and why a Shakespeare quote is not yet a play. Torben, you work in the field of search engine optimization. Why is SEO also important for you internally at 1&1? Torben Henke is Techical SEO Manager at 1&1 Torben Henke: “Many colleagues have touch points in their work with SEO, consciously or unconsciously. Especially for the hosting area of 1&1, we want to help our customers be successful with their own websites. SEO is a crucial tool for this and therefore plays an important role in product management. The SEO team supports their colleagues with their knowledge and promotes an active exchange.” Which role does “content marketing” have in this context? Torben Henke: “Content marketing is currently a trending topic. Therefore, the following question arises: Is there really something to it, or is it just hype? How do we deal with the topic and what do we actually do in content marketing? The fact is, almost everyone produces content, whether it is product texts for the website, news reports or specialist articles. All these content “snippets” influence search engine optimization. That is why this topic is so exciting for us. Since 2016, we are also active in content marketing. Our ‘Digital Guide’ offers numerous tips and tricks, background information and instructions for private users and small businesses about the topic of ‘being successful online’. This includes, among others, topics such as websites, hosting and IT security, but also domains, e-mail and online marketing. Of course, we also explain how to properly achieve search engine optimization.” How do you define content marketing? Torben Henke: “In short, content marketing is the support of customers with meaningful content. For example, gyms help to support their customers’ fitness goals by providing them with content around exercise regiments and healthy eating and lifestyle tips. This is a very good example. But the subject of content is broad: from magazine content to product descriptions, from image videos to blogs – everything we communicate to the outside is content.” How are content marketing and search engine optimization related? Torben Henke: “I see it this way: When I stand alone in the forest and recite Shakespeare, it is not yet a play. To be a play, a stage and spectators are needed. In this example, the stage is the technology in which our content is presented optimally, and the spectators are the traffic on our websites. We ‘SEOs’ take care of both: we pay attention to technical solutions that make our content available and, above all, easy to find. Through good visibility, we bring readers to the content so that the fire that has been put into the creation does not burn out. If no one is aware of the content, it does not help anyone. Also from a sales point of view, good content is becoming increasingly important for SEO. Take a look at Google’s quality approach: If you are a strong brand and offer high quality products, this must also be reflected in the quality of the content. Doing so, you clearly differentiate from spammers and improve your Google ranking.” Speaking of Google: What developments are currently being discussed in the SEO scene? Torben Henke: “Google is increasingly focused on good content. Recently these have been highlighted on the search results pages. Matches that respond well to a search request will be displayed significantly larger and higher than the other search hits. You can also see a longer text excerpt and often a picture. Google calls these highlighted results ‘featured snippets’. In the SEO scene, the term ‘place 0’ has also been established because the hit is displayed above the first regular search result. This development is being highly discussed and is controversial. On the one hand, the opportunity to receive a lot of attention is offered due to the large representation. On the other hand, some questions are answered directly in the text excerpt so that a visit to the website becomes unnecessary.” What do you have to keep in mind if you want to get started with content marketing? Torben Henke: “Many people and companies are now well versed in content, yet some experts are already talking about saturation. Only very few, however, make properly good content. Content works when its quality and the technology behind it are both good. To stand out of the crowd, you should make something extraordinary – an original idea or an unconventional implementation. The goal should be “10X content”, which means that the content must be ten times better than anything else on the subject. In addition, the content must match the seeker’s intention. If the search request is a question, for example “What is webhosting?”, it makes no sense to direct the searcher directly to hard-hitting sales offers. Instead, a neutral and detailed explanation can provide a positive first contact with the brand. At the other extreme, a customer who is looking for “cheap” does not want to read 2,000 words on the history of the internet. In this case, a list of savings makes significantly more sense. In short: create good content that is to the readers’ liking and spread it!”

The most important institutions in the domain business: The big domain glossary part 4

What are the most important organizations in the domain business? What other organizations play a no role in domains? To answer these questions, we introduce you to the most important institutions around domains in part 4 of our blog series. ICANN The largest organization in the domain business is the Internet Corporation for Assigned Names and Numbers or ICANN. The California-based non-profit organization manages the allocation of top-level domains and organizes and coordinates the domain name system. IANA Responsible for assigning the IP addresses is the Internet Assigned Numbers Authority (IANA), a division of ICANN. It acts as a type of accounting department and transmits local IP registrations to Regional Internet Registries (RIR). They are responsible for assigning the IP addresses for a specific part of the world. RIR A Regional Internet Registry (RIR) is an organization that is responsible for administering and allocating Internet resources in a particular part of the world. The scope of responsibility covers the administration of IP addresses and AS numbers. There are currently five active regional registries worldwide. Réseaux IP Européens Network Coordination Center (RIPE NCC), headquartered in Amsterdam, supervises the IP address range in Europe, the Middle East and Central Asia. American Registry for Internet Numbers (ARIN) is responsible for North America, Asia-Pacific Network Information Center (APNIC) for the Asia and Pacific region and the Latin America & Caribbean Network Information Center (LACNIC) for Latin America and the Caribbean. The African Network Information Center manages the IP allocation for Africa. VeriSign The US company, headquartered in Reston, Virginia, is one of the most important domain name registries in the world, as it manages the top-level domains .com and .net and operates two of the global root name servers. Radix Radix is ​​the largest domain registry for new domain broadcasts in Asia. The portfolio includes well-known generic nTLDs such as .website, .space, .site, .home, .online, as well as specialized nTLDs such as .tech, .insurance, .bank, .doctor and .music. Neustar The US domain name registry is one of the largest and most important naming services in the world and includes big name clients such as Canon or Taco Bell. Neustar specializes mainly in the offer of so-called “.brand” Top Level Domains, with which companies can secure their own brand name as a domain ending. Nominent Nominent is the UK’s largest registry and in the world’s top 10. Its portfolio includes, for example, the well-known domains .uk and its extensions, as well as the Welsh TLD .wales. Afilias The Irish domain registry service successfully launched the world-famous domain ending .info in 2001 and is the European counterpart to Neustar with its “.brand” service. DENIC The abbreviation stands for Deutsches Network Information Center and refers to the central domain name registry, which runs and manages the .de domain transmission and all related activities. The registered cooperative, based in Frankfurt am Main, ensures that every domain exists only once. Public Interest Registry Also known under the abbreviation PIR, this non-profit registry is solely responsible for the marketing of the domain .org. If you would like to know more about the structure of domains, their technical background or the parties involved in a domain registration, please take a look at the other parts of the blog series: Part 1 – Top Level Domain and Co Part 2 – How the Domain Name System works Part 3 – Registry, Registrar, Registrant In the next part, we provide information on private domain registration, domain name transfer and change of ownership.

Chatbots: Blessing or a Curse?

Chatbots play an important role in the discussion about artificial intelligence. With this article, we are dealing with questions regarding the strategic aspect of the integration of chatbots and an expert opinion on the phenomenon. How do you implement a chatbot? If you are thinking about integrating a chatbot into your business processes, the first and most important question to ask is: how should the user interface be designed? What do you want to use the chatbot for and what does the customer need? How will the customer use the chatbot later and what information should the chatbot be fed to meet the needs of the customer? Consider how integrating a chatbot creates added value before moving on to the next step. Sometimes it is wiser to integrate a chatbot in a frequently used app rather than a corporate website that has hardly any visitors. What are the pitfalls of implementing a chatbot? Think carefully about on which channels (social networks, instant messaging, company website, etc.) you want to integrate the chatbot. Try testing the chatbot first in a confined environment. Unfortunately, due to their novelty, there are no best practices for implementing a chatbot. Instead, each company has to evaluate the users’ experience and adjust as necessary. Embracing this new process requires courage, since mistakes are inevitable at the beginning of such a project. But it’s essential to gain insights from the learning process and examine the dialogue between customers and employees who monitor the chatbot. Chatbots – Blessing or a curse? Skeptics view artificial intelligence as a threat to jobs, noting the risk of being replaced by a machine. Supporters, however, argue that human beings aren’t becoming expendable, but are increasingly involved in the quality assurance process. Experts predict that artificial intelligence will have a great impact on the business world in two to three years, and are convinced that the continuous development of AI technology will make human vs. computer communication indistinguishable. The consequences remain to be seen, but even when considering the elaborate learning skills, artificial intelligence has clear limits: creativity and empathy. Both are unique traits of humans. The decision to use chatbots or not and whether they are useful is up for companies to decide and test for themselves. One thing is certain: thorough preparation and dedication is extremely important.   Image: 1&1/Shutterstock

Analytics 101: Turning Data into Insights

Whether you’re running a company website or a personal blog, it’s important to find out how the content you create is performing, and how you can improve upon it. Tools such as Google Analytics and 1&1 SiteAnalytics are easy to “set and forget,” and can be incredibly useful for turning large amounts of data into actionable insights. 1&1 SiteAnalytics is a great tool for novice users, as no additional installation is required to use the on-page solution. Small and medium-sized businesses can also rest assured that their data is secure, since all data is encrypted and doesn’t use cookies to store user data. In addition, 1&1 SiteAnalytics lets customers see all key performance statistics at a glance, including the number of visitors as well as their behaviors. From this, you can see which pages are most popular and how you can optimize your website accordingly. 1&1 SiteAnalytics is included with all 1&1 MyWebsite, shared hosting, and managed Hosting products. In addition, 1&1 SiteAnalytics is also available as a mobile-friendly app so that you can check stats on the go. Here are a few key items to look out for when reviewing your dashboard: Visitors A person who visits a website more than once within a specified period of time. Sessions The session of activity that a user with a unique IP address and browser tuple spends on a website during a specified period of time. Sessions help determine how much traffic a site receives. Site admins can determine the length of an average user session, and if a visitor returns within that length of time, they are considered a returning visitor. If a visitor returns to the site after the allotted time period has expired, then it is counted as a separate user session. Page impressions The number of times a site has been viewed by a user, also referred to as hits. Bounce rate The measurement (in percentage) of how many visitors view only one page on your site before leaving. High bounce rates typically indicate that visitors don’t find your landing page relevant or useful enough to explore other areas of your website. It might also be an indicator that you are attracting the wrong kind of customers by keywords not matching your content or because the relevancy is not clear enough on first sight. Landing page The section of a website accessed after clicking a link from another web page, typically a website’s home page or a dedicated landing page for an online campaign. Exit page The last page accessed during a visit. Direct traffic The visitors who type the address directly in the browser, entering via a bookmark or similar. Referring sites Websites that link to your website. With a basic understanding of how SiteAnalytics works, you can use your results to optimize your homepage accordingly. With this knowledge, you can rework and optimize the pages, structure and navigation of your homepage.

Registry, registrar, registrant: The big domain glossary part 3

Which institutions, services and people are involved in domain registration and who is responsible for each task? At which point can a new domain be officially bought? These questions are answered in part 3 of the big domain glossary. Domain name registry The domain name registry manages one or more top-level domains within the domain name system. Its functions include operating name servers, managing name spaces and providing WHOIS servers with domain owner contact information. The domain allocation under a top-level domain is made by registrars like 1&1 and not directly by registries. A synonym for domain name registry is network information center (NIC). Registrar Registrars such as 1&1 work as a mediator between the registry and end user and are responsible for the billing of the domain. Because registrars are often companies that also offer webhosting, users interested in a domain can also find an accompanying webhosting solution. Whois A domain name registry must run a server that saves the whois information of a registered domain. This publicly open database contains registrant, administrative and technical contact information. An entry in the whois database is obligatory for every registered domain. In order to protect sensible data from spam and misuse, many domain registrars also offer private domain registration. Registrant Every company and individual who purchases a domain from a registrar and registers it at a registry is called a registrant (or reg-c). These domain owners can be identified via the whois database which is available at the respective registry. Admin-c The administrative contact (admin-c) is responsible for managing the domain. When registering private domains, the admin-c and registrant are often the same person, but this is not obligatory. The admin-c holds the same rights as the domain owner and can make changes to the domain on their own. It is necessary that the admin-c is an actual person, since they must to be registered in the whois database. The admin-c is also partly considered as the legal contact and can be held responsible under certain circumstances. Tech-c This person is responsible for the technical aspects of the domain administration and servers. They have no rights and can only act on behalf of the owner. Sunrise phase The period of time when new domains can only be registered by owners of registered trademarks. This helps to prevent cybersquatting. Pre-registration This allows a user to reserve a specific domain before it is available to the public. Those who reserve a domain have the opportunity to preregister it once the terms and conditions are clear. 1&1 offers the possibility to pre-order top level domains non-binding and for free. If you are not the first one to reserve a domain name, you have the option to be placed on a waiting list. Once a competitor refuses to register the name, it is your turn. General availability From this moment on, the domain is available to the public and can be registered directly. Want to know more about domains? Refer to Part 1 to find out how a domain is built, and Part 2 to understand how calling a domain works and the technology behind it. Stay tuned for part 4 in which we describe the most important domain institutions.

1&1 Debuts CaaS Beta at DockerCon 2017

It’s DockerCon time! This year, the fourth annual event will be held in Austin, TX from April 17-20. After a series of successful events year after year, this conference is shaping up to be the largest DockerCon to date, with three days of talks, hands-on labs, an expo hall of Docker ecosystem innovators and more. The success of DockerCon reflects the growth of the Docker community, and the enthusiasm for growing the whole ecosystem. During the event, StackPointCloud Inc. CEO Matt Baldwin will discuss how by working with 1&1, it is possible to provide a turn-key container orchestration solution. This will enable developers and operators to focus on their core projects instead of building and maintaining multi-node clusters and containers. As a sponsor of the event, we are also excited to introduce 1&1 Cloud Containers, a container-based solution in which container engines, orchestration and the underlying compute resources are delivered to users as a service from a cloud provider like 1&1. This Container-as-a-Service (CaaS) solution is a highly scalable, high performance container management service that not only supports containers but also allows customers to easily run applications on a managed cluster of 1&1 instances. Can’t wait to try it out for yourself? Attendees of DockerCon will get an opportunity to participate in the 1&1 Cloud Containers Beta Phase and enter for a chance to win a LEGO Star Wars Death Star at 1&1 booth G20! For more information, check out http://2017.dockercon.com/.   Image: Docker Facebook

Microsoft Office 365: A carefree package for the digital workplace

Many self-employed and small-sized business owners nowadays do their business correspondence remote and from different devices. Are you one of them? The 1&1 Microsoft Office 365 packages offer everything you need for a productive day: from Word, PowerPoint and Excel, to professional e-mail and domain, to Skype for Business and virus protection. By request, our experts can also help to set up your Office package and transfer existing data. More time for your core business With our new packages customers have access to all common Office applications like Word, Excel and PowerPoint. In addition, features such as e-mail and Skype for Business are possible. Depending on the plan chosen, applications are available as a web app or for download as software or as Office Mobile Apps for up to five devices each per user. This makes an efficient communication possible from the road, office, computer or smartphone. The more comprehensive Office 365 packages offer an additional terabyte in OneDrive for Business online storage. This allows all your employees to access and internally edit files in a central location. You will no longer need to worry about updates yourself, because with the Office Suite included in Office 365, you are always working with the latest version. Those who chose OfficePremium Plus will additionally receive Norton Security Online Virus Protection. With Norton Security Online, up to five user devices are protected against a variety of online threats for the duration of their contract term. We would like you to be able to work directly with your Office 365 package. For this reason, we offer a special service for the first time: if desired, our experts can do the initial set-up of your office solution, e-mail mailbox and/or domain for you and also transfer existing data. Office 365 solutions at a glance Office 365 is available at 1&1 in different packages at attractive starting rates: OfficeBusiness: In addition to the web app, customers who choose this package receive a 50 GB mailbox and an e-mail address matching your domain. included is Skype for Business, one terabyte of online storage in OneDrive for Business and a free top-level domain for the first year, such as companyname.com. OfficeBusiness is available from $4.99 per license/month. OfficePremium Plus: In addition to OfficeBusiness services, this plan contains the software installation of the Office applications including Outlook and the Office Mobile Apps for up to five devices each per user. On request, you will also receive Norton Security Online antivirus protection for the duration of the contract period. OfficePremium Plus is available from $9.99 per license/month. OfficePremium: This plan is suitable for anyone who does not need an e-mail solution. It comes with all popular office applications as an online version, software installation or Office Mobile App. You also get one terabyte in OneDrive for Business online storage. This plan is available from $6.99 per license/month. Further information on Office 365 at 1&1 can be found here, additional information on the 1&1 professional e-mail packages is available here.

Five security tips for business devices

In the digital business world, desktop PCs, laptops, tablets and smartphones are particularly valuable work items. Not only because they facilitate everyday work, but also because they store important company data. Without security, these devices are vulnerable to malware, viruses, and unauthorized access by criminals. However, comprehensive protection is neither expensive nor time-consuming: follow these five tips to be on the safe side. 1. Select a strong password Passwords are still the biggest risk factor because many internet users continue to rely on unsafe passwords such as “123456,” “password,” or “hello.” Because of this, internet criminals can easily access accounts. Therefore, ensure that your password is composed of uppercase and lowercase letters, digits, punctuation marks, and special characters. Real words found in dictionaries should be avoided in general, since these can be cracked by dictionary attacks. Also, each account should have its own password and old, already used passwords should not be re-used. In addition, regular password changes are recommended to maintain security. 2. Added security through two-factor authentication Nowadays, a good password isn’t enough. Two-factor authentication provides extra protection by using two separate devices for verification. For example, if you sign in with your password for your online banking account, a randomly generated code is sent to your smartphone, which must then be entered in addition to the password. This allows you to securely access accounts from different devices (i.e. business and personal), review duplicate transactions, or restore an account. The result: it’s twice as hard for hackers to steal your online identity. 3. Always use the latest software version Obsolete versions of software make your device vulnerable to hacker attacks and data theft. Therefore always ensure that your devices are equipped with the latest security and software updates. In addition, check your operating system settings to ensure that it is up-to-date. If you receive a notification that a new software update is available, run it directly. If you already rely on professional security software, you can link all your business-based devices. With Norton™ Security Online, you can include up to eight devices in one subscription, whether you’re on a desktop, notebook, tablet or smartphone. 4. Format your old device If you replace your business laptop or smartphone, the old device will most likely end up in a drawer somewhere and sooner or later fall into oblivion. But don’t forget the information stored it, including email, contact details, social media accounts, pictures, passwords and more. Do you want to risk this information getting in the wrong hands? Ensure that all personal account data stored on the terminal is completely erased. You should also make sure that you have removed all memory cards in case someone should be tempted to recover your deleted data using recovery software.  5. Protect your terminal professionally Especially for the self-employed or small and medium-sized enterprises, a professional security package is important to protect business equipment from online danger and misuse. Norton™ Security Online provides real-time protection, including security and software updates. The security package can be used across devices for up to eight user terminals. A two-way firewall secures your IT infrastructure and integrates identity protection for professional use. With this password management for websites and online accounts, your sign-up procedures are faster and safer. The “Business Plus” package also includes an integrated backup function for business documents and customer projects. Click here for more information about the security products of Norton™ Security Online at 1&1.   Picture: 1&1 / Shutterstock

How the domain name system works: the big domain glossary part 2

Why does a website appear after entering the domain? Where are domain and website information saved and how are they connected? In this article, our big domain glossary tells you everything you need to know about the domain name system (DNS), root server and IP address. Domain name system (DNS): The DNS is a an internet registry that works similarly to the Yellow Pages. For one name, there may be one or more telephone numbers (IP addresses) on file. This is necessary to access services in the internet. The DNS enables calls to a website by following an internet address (URL) or sending an e-mail to a certain receiver. For example, if you send a request to the internet via the domain www.1and1.com, the URL is converted into the respective IP address (e.g.: via the DNS and and is lead to the corresponding computer. Furthermore, the DNS is a register for additional information about services connected to a domain. With this, it can be determined if a computer works as an e-mail server for the domain or if the domain’s respective name servers should be called. Root server: The root name server (root server) is like the brain of the domain name system. Every device that is connected to the internet receives a specific server name which is translated to a domain names such as “blog.1and1.de” into an IP address. If a name server has no information about the queried TLD, it forwards the request to a superordinate root server. Here, the name server responsible for the TLD is determined. This root zone, a kind of global domain registry, includes domain names and IP addresses of all TLD name servers and is the centerpiece of the net communication infrastructure. In total, there are 13 root servers with different operators centrally coordinated by ICANN. Root zone: This zone defines the address of the domain tree in the domain name system for which a name server (NS) is responsible. The root zone contains more than 1500 gTLDs, ccTLDs and IDNs, which are transmitted to the root server database. URL: The “uniform resource locator” is the standard for calling content. URLs are mainly used to access websites. By typing in a URL, the browser knows what site to open or search for. In addition to websites (http), a URL can also call a data server (ftp), an e-mail address (mailto) or a file (file). IP address: When accessing the internet, every computer receives a unique, global IP address. This 32-bit number is built in a certain pattern and has a value between 0 and 255. An IP address that is fixed to a domain is called a static IP address. When a computer receives a new IP address each time it accesses the internet, it is called a dynamic IP address. Domains receive unique IP addresses because as well as a domain name, IP addresses can’t be repeated. In order to avoid repetitions and conflicts, IP addresses are assigned by ICANN. DNS entries: For a domain to be available, many DNS entries are needed. Entries are divided into four sections: domain name first, protocol type (e.g. IN = internet) second, entry type third, and entry value fourth (e.g. IP address). Moving forward, we’ll show you types of single-entry DNS records. A record: The A entry deposits the IPv4 address under which the domain is located. They are the most important forms of DNS entries and are used for assigning a webserver to a domain in order for a web browser to call the domain. AAAA record: Similar to the A record, but the domain is assigned to an IPv6 address. CNAME record: With a CNAME record (Canonical Name Resource Records), a domain can refer to another domain by containing an alias if other names are assigned. MX record: MX stands for “mail exchange,” which defines the mail server responsible for the domain. Usually two mail serves are entered for one domain. If the first server is not reachable it automatically attempts to deliver the e-mail to the second server. The mail servers aren’t required to be identical to the server where the respective web space is located, but MX entries must directly refer to A or AAAA entries since CNAME entries aren’t reliable. NS record: NS records (Name Server Resource Record) are a DNS server’s data set. On the one hand, it defines which name server is responsible for specific zones. On the other hand, it connects single zones to the zone tree (delegation). PTR record: Pointer Resource Records assign one or more host names to a certain IP address in the DNS. Host names are precise terms for a computer in a network. SRV record: With Service Resource Records, the DNS can define which IP-based services are offered under the domain or subdomain. They are often used for XMPP, SIP or LDAP protocols and Microsoft Office 365. TXT record: Text Resource Records enable files to include freely definable text in a DNS zone. TTL: The TTL (Time To Live) section is part of a DNS entry type and displays how long (in seconds) information is valid. If the time is up, a fresh query is needed. With this, providers’ DNS servers can decide how long their data sets are kept in the cache.   Take a look at this article to learn more about Top Level Domain, Second Level Domain and more. In part 3, you’ll get to know what’s behind the terms Domain Name Registry, Registrar and Whois.

How to Create Your Own Social Media Graphics

Whether you’re running a business or working as a solo entrepreneur, it’s important to use social media to your full marketing advantage. After developing an overall content strategy, you’ll need to create a library of visual assets that are highly shareable and can get you noticed. From photos, banners, infographics and more, there are plenty of options for creating social media content. Read on for a few tips to get you started. 1. Choose a platform. Each social media network has a different standard for image sizes. We’ve listed the most recent specifications below, but best practice is to check the platform guidelines or perform a quick Google search to verify that you have the most up-to-date sizing. Instagram Profile Photo: 110×110 Square Photo: 1080×1080 Vertical Photo: 1080×1350 Twitter Profile Photo: 400×400 Cover Photo: 1500×500 Share Image: 1200×628 Facebook Profile Photo: 160×160 Cover Photo: 851×315 Share Image: 1200×628 Pinterest Profile Photo: 165×165 Pin Share Image: 800×1200 Board Thumbnail: 217×147 Tumblr Profile Photo: 128×128 Cover Photo: 2048×1152 Post Image: 500×750 LinkedIn Profile Photo: 400×400 Cover Photo: 974×300 Share Image: 700×400 Google+ Profile Photo: 270×270 Cover Photo: 1080×608 Share Image: 1200×900 YouTube Profile Photo: 800×800 Cover Photo: 2560×1440 Video Size: 1920×1080 2. Use high-quality images. Whether you’re creating your own original images or using stock photography, it’s important to use high-resolution images to create your graphics. Check out our tips for stock vs. self-made photos, and review best practices for product photography here. 3. Use a template. To keep things consistent, it can be helpful to create templates for your social media graphics. Software like Adobe Photoshop (paid) and Gimpshop (free) will be helpful in designing template files so that you can adjust images and text later. If you prefer not to start from scratch, you can also find pre-designed templates online to use as a starting point. Check out resources like Lucidpress or Canva. 4. SEO is for images, too. It may seem like an unnecessary step, but make sure to save images so that they are optimized for web. Be sure to create images that are 72dpi (standard web resolution) in either a .JPG or .PNG (for transparent backgrounds) file format. This can also be done in Photoshop by choosing “Save for Web.” Then save the file with an SEO-friendly name, such as png or websitename_productname.jpg.   That’s all! Have fun creating your graphics, and make sure your posts work for you by posting at optimum times.

This is how the domain name system works: the big domain glossary part 2

Why does a website appear after entering the domain? Where is the information about the domain and website saved and how are they connected? Regarding our big domain glossary we will tell you in this article everything you need to know about the domain name system (DNS), root server or IP address. Domain name system (DNS) The DNS is a register service in the internet that works kind of like the yellow pages. For one name, there are one or more telephone numbers (IP addresses) on file. This is necessary to access services in the internet. The DNS enables to call a website via typing in its internet address (URL) or send an e-mail to a certain receiver. For example, if you send a request to the internet via the domain http://www.1and1.com/, the URL is converted into the respective IP address (e.g.: via the DNS and so leads to the right computer. Furthermore, the DNS is a register for further information about services that are connected to a domain. With this it can be determined if a computer works as an e-mail server for the domain or how the domain´s respective name servers are called. Root server The root name server (root server) can be imagined as the brain of the domain name system. Every device that is connected to the internet gets a certain name server which translated domain names like “blog.1and1.de” into IP addresses. If a name server has no information about queried TLD, it forwards its request to a superordinate root server. Here the responsible name server for the TLD is determined. This root zone, a kind of global domain cadaster, includes domain names and IP addresses of all name servers of the TLD´s and is the centerpiece of the net communication infrastructure. In total, there are 13 root servers with different operators, which are centrally coordinated by the ICANN. Root zone This zone defines the address area of the domain tree in the domain name system for which a name server (NS) is responsible. The root zone contains more than 1500 gTLDs, ccTLDs and IDNs, that are transmitted to the root server database. URL The “uniform resource locator” is a standard for calling certain contents. URL´s are mainly used to access websites. Via typing in the URL, the browser knows which site to open or to search for. Next to websites (http) a URL can also call data server (ftp), mails (mailto) or files (file). IP address When accessing the internet every computer gets an IP address that is unique worldwide. This 32-bit number is built in a certain pattern and can have a value only between 0 and 255. An IP address that is fixed to a domain is called a static IP address. When a computer gets a new IP address every time it enters the internet, it is called dynamic IP address. Every domain gets a unique IP, because as well as a domain name, one IP must not occur two times. In order to avoid repetitions and conflicts the IP addresses assignment is coordinated by the ICANN. DNS entries For a domain to be always reachable a lot of DNS entries are needed. The entries are divided into four sections. The first one contains the domain name and the second one the protocol type (e.g. IN = internet). In the third section the entry type is defined and the last section contains the value of the entry, e.g. the IP address. Hereafter we will show you the single-entry types (records). A record The A entry deposits the IPv4 address under which the domain is located. They are the most important forms of DNS entries and are used for assigning a webserver to a domain in order for the domain to be callable via a web browser. AAAA record It is similar to the A record. The only difference is that the domain is assigned to an IPv6 address. CNAME record With a CNAME record (Canonical Name Resource Records) a domain can refer to another domain. It so contains an alias name for a domain if other names are assigned. MX record MX stands for “mail exchange” which means the MX entries define the mail server that is responsible for the domain. Usually two mail serves are entered for one domain. If the first server is not reachable it is automatically tried to deliver the e-mail to the second server. The mail serves don´t have to be identical to the server where the respective web space is located. But MX entries have to directly refer to A or AAAA entries because CNAME entries aren´t reliable. NS record A NS record (Name Server Resource Record) is a DNS server´s data set. On the one hand, it defines which name server is responsible for which zone. On the other hand, it connects the single zones to the zone tree (delegation). PTR record Pointer Resource Records assign one or more host names to a certain IP address in the DNS. Host names are explicit terms for a computer in a network. SRV record With Service Resource Records, it can be defined via the DNS which IP-based services can be offered under the domain or subdomain. They are often used for XMPP, SIP or LDAP protocols and for the usage of Microsoft Office 365. TXT record The Text Resource Record enables to file freely definable text in a DNS zone. TTL The section TTL (Time to Live) is part of the DNS entry types and shows how long (in seconds) this information is valid. If the time is up, a fresh query is needed. With this the providers´ DNS servers decide how long their data sets are kept in the cache.   Take a look at this article to find out more about Top Level Domain, Second Level Domain and more. In part 3 you will get to know what is behind the terms Domain Name Registry, Registrar and Whois.


Recommended Content