Protect your Lenovo Server
Search Results – Bison Knowledgebase

🔍 Results for “cloudflare dns hostinger”

Correct DNS Architecture When Using Cloudflare with Hostinger Hosting and Email Services (Hostinger / Google Workspace / Zoho / None)

This Knowledge Base article explains the correct DNS architecture, configuration, and operational best practices when: A domain is delegated to Cloudflare for DNS and security …

MX Record TTL Mismatch Between Cloudflare and Hostinger: Technical Impact, Behavior, and Resolution

This article explains why Cloudflare DNS does not provide a 14400-second (4-hour) TTL option while Hostinger recommends TTL 14400 for MX records, and whether this mismatch causes e…

How to Set Up Hostinger Email in Outlook for Windows (Hostinger Webmail)

Setting up your Hostinger email on Outlook for Windows ensures seamless and secure access to your messages across all devices. This guide walks you through both the automatic and m…

How to Redirect One Domain to Another in Hostinger: Complete 2025 Guide (With SEO-Safe Methods)

If you own two domains — say domain1.com and domain2.com — and want visitors from the second one to automatically redirect to the first, you’re in the right place! This is common w…

GST Reverse Charge Mechanism (RCM) for Hostinger Purchases and Resale in India – Accounting & Tally Prime Implementation Guide

Indian businesses frequently purchase hosting, cloud, and digital services from overseas providers such as Hostinger. When these services are imported into India and later resold t…

How to Take Backup of SQL Database in Hostinger – Complete Step-by-Step Guide (2025 Edition)

How to Take Backup of SQL Database in Hostinger – Complete Step-by-Step GuideBacking up your SQL database is one of the most important tasks for maintaining the security and stabil…

How to Set Up a Fully Branded SuperSite for Your Domain Reseller Business (OrderBox, ResellerClub, BigRock & GlobeHost)

Building a fully branded SuperSite for your domain reseller business gives your brand a professional edge. Whether you’re working with ResellerClub, BigRock, GlobeHost, or any othe…

DNS TXT Record Save Failure Due to Mismatched TTL Values

DNS management interfaces may reject changes to TXT records with an error stating that records of the same name and type must have the same TTL value. This issue commonly surfaces …

How to Fix DKIM TXT Record Truncation Issue in DNS: Complete Step-by-Step Guide for Google Workspace

What is DKIM?DKIM (DomainKeys Identified Mail) is an email authentication method that adds a digital signature to your outgoing emails. It prevents spoofing and ensures that receiv…

How to Set Up MX Records for Google Workspace (2026)

Email delivery for any domain depends on Mail Exchange (MX) records, a critical DNS configuration that tells the global internet where to deliver incoming email. When you deploy Go…

Ipconfig Command Made Simple: View, Troubleshoot and Manage Your Network Settings

The ipconfig command is a built-in Windows (and some related OS) command-line utility that displays and allows certain management of the TCP/IP network configuration of a computer.…

Google Chrome Not Showing Latest Website Content – Cache, DNS, and Browser Behavior Explained

This Knowledge Base article explains why Google Chrome displays outdated or old versions of a website instead of the latest deployed content. It covers browser caching, DNS resolu…

Do Paid Domain-Based Email Services Require SPF, DKIM & DMARC? A Technical Knowledge Base Guide for Google Workspace, Microsoft 365, Yahoo Business Mail & Rediffmail Pro

Modern email delivery is governed by strict anti-spam and anti-phishing standards. Merely purchasing a paid, domain-based email service does not guarantee inbox delivery.Whether yo…

Fixing HTTP Error 403 on IndusInd Bank Website: A Step-by-Step Guide

Encountering an HTTP Error 403 while accessing a website, especially critical ones like a bank, can be frustrating. This issue often arises due to DNS (Domain Name System) cache pr…

How to Use Google Admin Toolbox Dig Tool to Verify MX Records and other Records like A Record, NS Record, TXT Record etc.

When configuring Google Workspace email or troubleshooting delivery issues, verifying that your MX records are correctly set up in DNS is essential. Google provides an official and…

How to Configure Hostinger Nameservers: A Complete Guide with IP Addresses

How to Configure Hostinger Nameservers: A Complete Guide with IP Addresses Configuring nameservers is a crucial step in managing your domain and connecting it to your hosting provi…

How to Solve Common Internet Connection Problems – A Practical IT Troubleshooting Guide

Internet connectivity issues are among the most frequent problems faced by home users, small businesses, and enterprise IT teams. Symptoms such as slow speed, intermittent disconne…

DMARC, DKIM, and SPF for Email Authentication

Introduction Email authentication is critical for protecting against spam, phishing, and other malicious activities. DMARC (Domain-based Message Authentication, Reporting, and Conf…

Step-by-step: fix “email sent as another user” using Google Workspace SMTP Relay + PostMaster

A) Google Workspace (Admin Console) — set up SMTP Relay Open: Admin Console → Apps → Google Workspace → Gmail → Routing → SMTP relay service → Add Setting. Description: Pos…

How to Fix Email Issues When Internet is Working: A Step-by-Step Guide

Having an active internet connection but not receiving emails can be frustrating. This issue may arise from various factors, including DNS issues, corrupted network settings, or pr…

How to Check Domain Registration Details Online (WHOIS Lookup Guide)

Checking domain registration details is a fundamental task for IT administrators, system engineers, cybersecurity professionals, and business owners. Domain lookup helps verify own…

How to Fix Xbox Error 0x80070057 – Complete Guide, Causes & Step-by-Step Solutions

Xbox Error 0x80070057 is a common yet frustrating issue faced by Xbox users while downloading games, updating apps, accessing Xbox Game Pass, or signing in to their Microsoft accou…

What Is the Ping Command and Why Every User Should Know It

In the realm of networking and system administration, the humble ping command is one of the most frequently used tools for verifying connectivity, diagnosing issues, and measuring …

Web Hosting Explained: Types, Architecture, and Practical Examples

Web hosting is the service that allows individuals and organizations to publish websites or web applications on the internet. A web host provides the server infrastructure, storage…

What is a Domain Name? History, Working, Types & Registrars – Complete Guide

? What is a Domain?A domain name is the human-readable address of a website on the internet. Example: google.com, amazon.in, bison.co.inInstead of typing numeric IP addresses lik…

Understanding Name Servers and DNS Records: A Guide to Website Hosting and Domain Management

When setting up a website, understanding how name servers and DNS (Domain Name System) records work is essential for ensuring your site is accessible online. This article will expl…

MX Lookup

Introduction MX Lookup is a tool used to query and retrieve Mail Exchange (MX) records associated with a domain. MX records are DNS records that specify the mail servers responsibl…

Google Workspace vs Microsoft 365 vs Rediffmail Pro – Detailed Technical Comparison for Business Email & Productivity

Selecting the right business email and productivity platform is a strategic IT decision that affects communication reliability, data security, user productivity, and long-term scal…

Google Workspace Support Options in India (Admin, Billing, and Technical Help)

Google Workspace (formerly G Suite) provides multiple support paths for customers in India, but the exact options you see (chat, email, phone) depend on: Your Workspace edition …

Discovering Devices on Your Local Network Using Command-Line Tools

Introduction Identifying devices on your local network is essential for network administration, troubleshooting, or security monitoring. Command-line tools provide a quick and effi…

5 Apps to Use VPN on Your Mobile Phone (2026) – A Technical & Security Guide

Virtual Private Networks (VPNs) are a critical security tool for mobile users, especially when accessing the internet over public Wi-Fi or mobile data networks. In 2026, VPN usage …

How to Set Up MX Records in cPanel for Google Workspace Email

Setting up Google Workspace email requires configuring the Mail Exchange (MX) records in your hosting provider’s cPanel. This ensures that all email sent to your domain is routed t…

Cyber Security in India: Compliance & Threat-Defense Tools, Key Vendors, Registration Norms, and GST/Procurement Claim Process

Cyber security tooling for businesses in India generally falls into two buckets: Threat-defense tools (prevent/detect/respond): EDR/XDR, SIEM/SOAR, IAM/PAM, WAF, email security,…

PHP-Based Sitemap.xml Implementation for SEO-Optimized Websites

A sitemap is a critical component of modern website SEO. It provides search engines with a structured list of URLs that should be crawled and indexed. While static sitemap.xml file…

Complete Step-by-Step Guide to Restore an Old WordPress Website Backup on a New Hosting Server

Migrating your old WordPress website to a new hosting provider might seem challenging, but with the right steps, it’s easy and smooth. If you’ve already taken a full website backup…

Windows Web Hosting: Architecture, Features, Use Cases, and Implementation Guide

Windows Web Hosting is a web hosting model where websites and web applications run on Microsoft Windows Server using Microsoft’s web and application stack. It is commonly used for …

Seamless Email Data Migration from QLC PostMaster Enterprise to Google Workspace

Migrating from QLC PostMaster Enterprise to Google Workspace can feel overwhelming, but with the right approach, it’s a smooth, secure, and loss-free process. Whether you’re moving…

How to Manually Connect a Third-Party Domain to Shopify

If you're looking to integrate your third-party domain with Shopify, you'll need to handle the process yourself since Shopify Support cannot access your domain provider's settings…

Configuring Dual Network Cards on Windows Server and Windows 10/11

Introduction Configuring two network cards (NICs) on a server allows you to segregate traffic, improve performance, and enhance security. This setup is commonly used to have one NI…

Internet Bandwidth Capacity Planning: Evaluating 39,600 GB Monthly Data for a 40-System Office

This article explains how to analyze, calculate, and validate whether 39,600 GB (≈39.6 TB) of monthly internet data is sufficient for an office with 40 systems. It focuses on prac…

Ethical Hacking – Working Principles, Benefits, Career Scope, Skills, Institutes, Tools & Salary in India

Ethical Hacking is the authorized practice of identifying, testing, and fixing security vulnerabilities in computer systems, networks, applications, and digital infrastructure. Eth…

Zoho Business Software Suite – CRM, ERP & Collaboration Platforms (Knowledge Base) Overview of Zoho Products and Services

Zoho provides a comprehensive suite of cloud-native business applications designed for small, mid-sized, and growing enterprises. Its platforms cover customer management, accountin…

Remote Support Tools Comparison (TeamViewer, AnyDesk, UltraViewer & Alternatives): Pricing, Features, Performance, Pros/Cons, and Security Risks

Remote support tools let an IT technician view/control a user’s computer over the internet to troubleshoot issues, install software, transfer files, and provide real-time assistanc…

Printer Not Printing or Showing Offline – Troubleshooting Guide for Windows

Printer issues such as “not printing”, “printer offline”, or jobs stuck in queue are among the most common IT support problems in Windows environments. These issues can occur on Wi…

Network Routers: Features, Technologies, Connector Types, Manufacturers, Performance Impact, and Practical Usage

Routers are core networking devices that direct data traffic between networks, most commonly between local networks (LAN) and the internet (WAN). From home broadband to enterprise …

Enforcing Email-Client-Only Access in Google Workspace Using App Passwords (No User Passwords)

Some organizations want to strictly prevent users from accessing Google Workspace accounts via browsers (Gmail web, Google login, Drive, etc.) and force email usage only through de…

Antivirus Products in India: Types, Blacklist vs Whitelist (Allowlisting) Models, and Where CatchPulse Fits

Businesses in India commonly buy “antivirus,” but modern endpoint security is broader than classic virus scanning. Today’s products may include EPP (Endpoint Protection Platform), …

10 Tips to Improve and Ensure Your Internet Security – A Practical IT Security Guide

Internet security is no longer optional. With increasing use of cloud services, remote access, online banking, and digital communication, systems connected to the internet are cons…

Understanding “Component Installation” in Acronis Backup Panel: Meaning, Causes, and Complete Troubleshooting Guide

While managing backups in Acronis Cyber Protect, administrators often notice a status message called “Component Installation” in the Acronis Backup panel. This message can appear d…

Windows 11 Running Slow? Safe Windows Services You Can Stop Without Breaking Your System

Windows 11 comes with a wide range of background services designed to support system features, hardware compatibility, security, and user experience. However, many systems—especial…