WordPress Hosting from MacHighway

Written by MacHighway Team on April 4, 2019

You’ve built your own WordPress blog, which is awesome, but now you have to keep it going. It sounds like a lot and it doesn’t have to be.

WordPress hosting from MacHighway will make your life easier.

Read on to find out why.

WordPress Hosting from MacHighway

What is WordPress hosting?

Basically, it’s hosting that is specialized for WordPress. It makes your page run more smoothly and keeps it secure among other advantages.

Many hosting plans include a one-click WordPress installer. There are four types of WordPress hosting.

Shared

Continue Reading


Top 10 Best Email Clients for Mac OS X

Written by MacHighway Team on April 2, 2019

In 2018, there were 3.8 billion global email users.

On average 281 billion emails were sent and received every single day in 2018.

Think about those numbers… Can you say email overload?

Anyone who has more than one email account knows this headache.

Your inbox is spilling over with spam and you’re in desperate need to find your missing emails.

If you want to have peace of mind while emailing you have to explore the best email clients for Mac computers.

There are tons of options to access your email accounts. However, it can be overwhelming choosing the

Continue Reading


The Troubles with Yosemite Email

Written by Chris Graves on April 2, 2015

Has your Yosemite Mail.app been misbehaving? After upgrading to Yosemite have you had trouble sending and receiving email?

We’ve had reports of trouble with email from customers after upgrading to Mac OS X Yosemite (10.10).  We here at MacHighway do believe that Apple gets a lot of things right, far more often then those other guys, and that’s why I’ve been Mac fanatic for 30 years (and an Apple user for 35). However, Apple does get some things wrong, in this case

Continue Reading


Heart Bleed Bug

Written by Chris Graves on April 10, 2014

Perhaps many of you have heard about the so-called “Heart Bleed” bug, a recently discovered fundamental flaw found in OpenSSL, the software used by most web sites and servers to encrypt information exchanges on the Internet.

The Heartbleed bug could enable an attacker to directly read parts of the memory of a server, assuming it’s running a vulnerable version of OpenSSL and is configured in a certain way. Security researchers have shown that the bug can be exploited to reveal usernames and passwords,

Continue Reading


Alert! Wordfence has detected an active attack on WordPress sites

Written by Tyler Jacobson on February 10, 2014

What’s happening?

Wordfence sent out an email this morning, warning WordPress users of a detected distributed brute force attack on WordPress sites.

What do you need to do?

Make sure that you have added your site to CloudFlare. You can do this right now and for free by logging into your cPanel, clicking on the CloudFlare icon and activating it for each site that you have with MacHighway, especially WordPress sites. (Note: If you have a dedicated SSL on your site, you will

Continue Reading


A message for WordPress users on carl.machighway.com

Written by Tyler Jacobson on January 16, 2014

Customers affected:
Customers that have WordPress powered sites on carl.machighway.com

What’s going on?
There have been frequent Distributed Denial of Service (DDoS) attacks on carl.machighway.com. These attacks are directed against WordPress sites and they have been overwhelming the server, causing it to crash.

What has MacHighway done to stop these attacks?
We have placed an additional layer of authentication in front of your WordPress admin page. This stops the attackers from using common WordPress hacks against your WorpdPress powered site, and keeps the server load

Continue Reading


Global Attack on WordPress Sites

Written by Chris Graves on April 12, 2013

There is an on going and highly distributed, global attack on WordPress installations at every known web host to crack open admin accounts and inject various malicious scripts.

In a detailed analysis of the attack pattern it was found out that most of the attack was originating from CMSs (mostly wordpress). Further analysis revealed that the “admin” accounts had been compromised (in one form or the other) and malicious scripts were uploaded into the directories.

Today, this attack is happening at a

Continue Reading