All About DNS Settings

You can see your domain’s (or any domain’s) DNS settings from many online resources, one commonly used is:
https://viewdns.info/dnsrecord/

Select the DNS record whose propagation status you would like to check.
Click on the drop-down menu right next to the search bar, and choose any of the following records:

  • A record: contains the IPv4 address info of the hostname.
  • AAAA record: contains the IPv6 address info of the hostname.
  • CNAME record: also known as alias record. It points the subdomain to its domain, like pointing www.dnschecker.org to
    dnschecker.org. Get comprehensive insights about the domain’s
  • CNAME records with CNAME record lookup.
  • MX record: contains the info where the domain’s email should be routed to and mail servers priority.
  • NS record: contains information about the authoritative nameservers of a domain. NS Checker will provide you with all the
    name servers associated with a domain.
  • PTR record: used in reverse IP lookup to map an IP address to a domain name, allowing the identification of the host associated with a particular IP address.
  • SRV record: specifies the location and configuration of a particular service, such as email or voice over IP (VoIP), allowing clients to discover and connect to the appropriate server.
  • SOA record: the start of authority is responsible for holding and specifying information about the DNS zone.
  • TXT record: is commonly used for other DNS records configurations like SPF, DKIM, or DMARC records. CAA record: used to assist in SSL validation by highlighting which authorities can issue certificates for a domain.
  • DS record: acts as a delegation signer, maintaining a chain of trust between the parent zone and child zone. Use the DS record Lookup tool to dig deeper.
  • DNSKEY record: contains the public signing keys like Zone Signing Key (ZSK) and Key Signing Key (KSK). Check the DNSKEY record for more info.

What is Gzip/Brotli Compression, and do I need it?

What does Gzip and Brotli Compression do?

Gzip is a compression algorithm that reduces the size of web files (mainly HTML, CSS, and JavaScript files) to a tinier version, sometimes up to 70%-80% smaller. This much smaller compressed version of a file is then sent to the browser of the user requesting it, instead of the larger original file. The browser of the user will then automatically decompress the compressed file, and display the uncompressed original file.

Brotli is an open source data compression algorithm. In the majority of cases, Brotli can compress files to a smaller size than Gzip can, it is therefore generally a better compression method compared to Gzip. Brotli also decompresses files faster in comparison with Gzip.

To test your site to see which compression method is being used (and the compression savings) click HERE. Should I use Brotli instead of Gzip? At the moment Brotli is supported by all the major browsers, but not all browsers support Brotli yet. Older technology or smaller, specialized browsers may have difficulty with Brotli.

How do I enable Gzip or Brotli?
All hosted sites with AmeriWeb Hosting include either Gzip or Brotli automatically enabled. This helps load your web site faster. While a few sites have compression disabled, this is not the norm. We select which to use (use only one!) based upon many factors; including your server, site coding, even your DNS. You need to do nothing, we’ve got it done for you!

Want To Have The Maximum Page Speed Possible For Your Website?
We can help with that! We have professionally optimized the speed of multiple websites. Because of this we know how to get the best results quickly while keeping our prices low. Contact us for a price quote for our services.

The Most Effective Emails Share a Simple Format

In a world of short attention spans and crowded inboxes, the most effective emails share a simple formula:

One picture, about 20 lines of text, and one clear call to action

  1. One Picture:
    Visuals draw the eye instantly. A single, relevant image captures
    attention, sets the tone, and supports your message without
    overwhelming the reader. Whether it’s a product shot, a happy customer, or an on-brand graphic, keep it clean and focused.
  2. About 20 Lines of Text:
    Less is more. Instead of long paragraphs, limit your message to about ten lines. This encourages quick reading, keeps the focus on your key
    message, and respects your readers’ time. Use clear language, short
    sentences, and formatting (like bold or bullets) to improve  scannability.
  3. One Call to Action (CTA):
    Your email should guide the reader to take a single next step—whether that’s clicking to learn more, scheduling a call, or making a purchase. Don’t distract with multiple links or asks. Make your CTA stand out, and ensure it aligns with your goal.

When you stick to this format, the most effective emails become easier to digest—and much more likely to drive results.

Hey, email marketers. How’s it going?

Would you respond to an email marketer greeting you like that? Well, 64
percent of consumers did so, finds research highlighted yesterday in Inc.
Magazine.

So your parents were right, “hay” may be for horses — but smart B2B
marketers do use the greeting ‘hey’ once they talk to prospects. So
perhaps the key to remember here is the research shows “hey” greetings
see the best email response rates — 64 percent — after there’s an
accepted informal situation.

The original research points out that it’s far better for emailers to include a greeting than not:

  • Hey: 64 percent
  • Hello: 63.6 percent
  • Hi: 62.7 percent
  • Greetings: 57.2 percent
  • Dear: 56.5 percent
  • All emails: 47.5 percent

NOTE: This information was taken from Target Marketing Magazine

My own favorite (and not the top choice) is Greetings. I often have a
subject line of ‘Greetings from AmeriWeb Hosting’, adding my business
name to help differentiate my email from the abundance of spam out
there.

As always, use the greeting that makes the most sense for your
business.

Viruses, Trojans and Worms, OH MY!

Viruses, Trojans and Worms on your computer are bad. The terms are
often used interchangeably, but each is distinctly different.

A computer virus attaches itself to a program or file, enabling it to spread
from one computer to another, leaving infections as it travels. Like a
human virus, a computer virus can range in severity: some may cause
only mildly annoying effects, while others can damage your hardware,
software or files. Almost all viruses are attached to an executable file,
which means the virus may exist on your computer, but it actually cannot
infect your computer, unless you run or open the malicious program.

A VIRUS cannot be spread without a human action, (such as running an
infected program) to keep it going. Because a virus is spread by human
action, people will unknowingly continue the spread of a computer virus
by sharing infecting files, or sending emails with viruses as attachments
in the email.

A WORM is similar to a virus by design, and is considered to be a subclass of a virus. Worms spread from computer to computer, but unlike a
virus, it has the capability to travel without any human action. A worm
takes advantage of file or information transport features on your system,
which is what allows it to travel unaided. The biggest danger with a worm
is its capability to replicate itself on your system, so rather than your
computer sending out a single worm, it could send out hundreds or
thousands of copies of itself, creating a huge devastating effect. One
example would be for a worm to send a copy of itself to everyone listed in
your e-mail address book. Then, the worm replicates and sends itself out
to everyone listed in each of the receiver’s address book, and the
manifest continues on down the line. Due to the copying nature of a worm
and its capability to travel across networks, the end result in most cases
is that the worm consumes too much system memory (or network
bandwidth), causing Web servers, network servers and individual
computers to stop responding. In recent worm attacks such as the much talked-about Blaster Worm, the worm has been designed to tunnel into
your system, and allow malicious users to control your computer
remotely.

A TROJAN HORSE is full of as much trickery as the mythological Trojan
Horse it was named after. The Trojan Horse, at first glance will appear to
be useful software, but will actually do damage once installed or run on
your computer. Those on the receiving end of a Trojan Horse are usually
tricked into opening them because they appear to be receiving legitimate
software or files from a legitimate source. When a Trojan is activated on
your computer, the results can vary. Some Trojans are designed to be
more annoying than malicious (like changing your desktop, adding silly
active desktop icons), or they can cause serious damage by deleting files
and destroying information on your system. Trojans are also known to
create a backdoor on your computer that gives malicious users access to your system, possibly allowing confidential or personal information to be
compromised. Unlike viruses and worms, Trojans do not reproduce by
infecting other files, nor do they self-replicate.

Use good virus protection software. We like Avast (CZ), AVG (NL),
TotalAV (UK), Norton (US), PC-Matic (US). All have free versions! but
there are many others out there. McAfee (US) tends to use a lot of
system resources, so it noticeably slows some systems, especially older
machines.

Install a good firewall. Most virus protection software suites include a
firewall built in.

Keep your operating system updated. Windows can easily be set to
update in the middle of the night for you. Windows will patch any exploits
it finds for free, there is no logical reason not to stay updated. While
updating Windows, also periodically update other software running on
your computer.

Use caution when opening files received by email, or clicking on links. If
you don’t know who sent you some files, better to leave them unopened,
until you can verify who sent them to you. Note, a good virus program will
always check incoming email for infections, yet another reason to have
one!

According to the FBI, slightly over 80% of all infections occur when
someone opened a file that arrived by email.

Think about it!

History of Plainfield, IL

History of Plainfield, IL

Plainfield, Illinois

has a rich history that dates back to the early 19th century. Here’s a brief overview of its development:

Early Settlement

  • Before 1830: The area that would become Plainfield was originally inhabited by Native American tribes, including the Potawatomi, who used the land for hunting and agriculture.
  • 1830s: European settlers began to arrive in the area around the 1830s, with the first official land surveys occurring in 1834. These settlers were largely of New England, Dutch, and German descent, and they established farms in the fertile soil near the DuPage River.

Formation and Growth

  • 1834: The settlement was originally named “Walker’s Grove” after one of the area’s early settlers, Nathaniel Walker. It was a small farming community located near the river.
  • 1837: The town was officially platted and renamed “Plainfield.” The name was likely inspired by the flat landscape around the area, which was favorable for agriculture.
  • Railroad Era (1850s): The arrival of the railroad in the 1850s played a crucial role in the town’s growth. The railroads brought new opportunities for trade, agriculture, and transportation, and Plainfield’s strategic location made it a key hub for goods being moved throughout the region.

20th Century Expansion

  • Early 1900s: Plainfield was still primarily an agricultural community throughout the early 20th century. However, as Chicago grew, people began to move out to suburban areas like Plainfield.
  • Post-WWII Growth: The town’s population began to grow significantly after World War II. As suburbs developed around Chicago, Plainfield’s proximity to the city made it an appealing place for people seeking a more rural lifestyle while still being close to urban amenities.

Modern Era

  • 1990s-Present: The town saw explosive growth in the 1990s and 2000s. The development of new housing, schools, and infrastructure was driven by the expanding population. Plainfield’s population has surged from around 14,000 in the 1990 census to over 44,000 today.
  • Education and Community: Over the years, the local school district and various community organizations have worked to foster a sense of community. Plainfield has grown into a thriving suburban community, attracting families due to its small-town charm, schools, and parks.

Today

Plainfield is a vibrant and rapidly growing suburb of Chicago, balancing its rich historical roots with modern development. It remains known for its picturesque downtown, historical buildings, and the preservation of its past while embracing the future.