Internet
Phone
Cable
Construction
Spyware
Spam
Email & Webmail
Bundled Services
Anonymous
DNS Block List
Online Security
Viruses
Abuse
Domain Email
Personal Web
Domain Web
Maillist
Grande Music
Phishing
Yes. The Grande web portal provides an alternative way to check email from any browser on any internet connected machine when you are away from home. You will use your standard Grande Username and Password to log into the Grande Web Portal. You will find that WebMail has all of the basic functionality of a standard email program. For your convenience, all email viewed in WebMail will remain on our email servers until you physically delete it. You can delete email from within WebMail, or simply retrieve it with your regular email program when you get back home. To connect to WebMail:
Click on your start menu, then click the Internet Explorer icon.
Type http://mygrande.net in the toolbar Address line and press Enter.
To log into the Grande Web Portal you click on the Log-in link and enter your Grande username and password.
Once you have logged into the Grande Web Portal you will be able to check your Grande email using the MyGrande Email link on the right side of the page.
It depends. Cable modems cannot be used to dial in to networks or dial fax machines. You may find that you need to keep your regular dial-up modem to perform certain functions, such as remote access, sending and receiving faxes, voice mail and electronic bulletin boards.
We recommend that you have a surge protector.
Just like giving someone directions to your home by using your home address, a Dynamic IP address tells other computers on the Internet how to find your computer. Grande will assign a Dynamic IP address that will change at regular intervals to maintain network security and optimize available IP space. In other words, you will have a Dynamic IP address but it will vary on a regular basis.
You will be assigned a Dynamic IP address.
Computers catch viruses in many ways, primarily by execution of a program containing a virus. Caution must be exercised on any online service and virus protection is always the responsibility of the computer owner.
Yes, Grande offers filtered content services that allow you to block unwanted Internet sites. Filtered Services are available for a small monthly fee.
Grande provides technical support 24 hours a day, 7 days a week to answer questions online or over the telephone. Please contact your local Grande Customer Care Center with any questions or problems.
http://mygrande.com/san-marcos/contactus
Security is a concern for many users on the Internet. At websites where you see the yellow lock symbol at the bottom right side of your browser--if the yellow lock is in the locked position, this indicates an encrypted session (at the installed strength of the browser on your computer). This makes any transaction conducted over the Grande network equally secure to those done over any ISP. As with any credit card transaction, we advise you to use the normal precautions.
The main difference between cable modem and DSL technology is the network underlying the service. DSL service uses the public telephone network for transmission while cable modems use a completely separate broadband, high-speed network. Telephone solutions tend to degrade and slow down the further away your home is from the telephone company's central office. Grande's high-speed Internet service is superior in this respect because Grande provides all users the same service regardless of their physical location.
While Grande's competition also uses cable modem technology to deliver high-speed Internet service, the underlying network is the main difference. Grande's high-speed network is designed with more fiber-optic cable going deeper into the neighborhood (fiber provides an advantage of having faster throughput and less interference). Fewer people share network capacity with Grande, which means service does not degrade as more people access the network.
The time required for installation varies depending on the type of equipment and operating system you have. Generally we allot approximately two hours. In addition to installing all necessary hardware and software, the Broadband Communications Technician allots 30 minutes for user training to help you make the most of your new Grande service.
The cable modem requires a Network Interface Card (NIC) to be installed in your computer. This card gives your computer an Ethernet connection that allows the computer and modem to communicate at high speeds.
The Grande connection is more similar to a network connection, in that a network card is inserted and connected directly to the cable modem. The modem itself is not connected directly to a serial port so both types of modems can reside in your computer. However, if your computer already resides on a network, there may be a conflict between your current Network Interface Card and the Network Interface Card that supports the Grande software.
Yes. You have the option of keeping your existing number or requesting a new number from Grande Communications. Grande may be able to offer you a better or easier number to remember, or we may even be able to provide you with "vanity" numbers such as ###-CATS or ###-HOME. Call your Grande Customer Care Center for more information.
Yes. You can keep your current long-distance carrier, but only if they have requested access to Grande's network. Not all long-distance carriers have requested access. Also, if you select Grande as your long-distance provider, you can select a call plan that is right for you - all on one bill.
Yes! You will save a significant amount of money when you sign up for more than one service.
Yes, unless you request to not be included in the local phone book.
Dial 1-4-1-1 for all Directory Assistance calls at $.50 per call. Assistance Call Launch is provided free of charge. Long-distance charges apply to calls outside your local calling area.
You can purchase Grande local phone service with your choice of long-distance carriers. However, in order to have Grande's long-distance service, you must subscribe to Grande's local phone service.
Flutter dial tone is a tone interrupted by brief periods of silence. If you have a voice mail, you are notified of new messages by the "flutter" dial tone when you pick up the phone.
Digital telephone service allows clearer and cleaner transmission of the voice signal delivering a much higher quality service than the standard copper wire networks.
No, you only pay when someone calls you. It is a small charge per minute from anywhere in the lower 48 states. If a call is placed from a pay phone, there is a $.35 charge per call.
You must be a business line customer to be listed in the business white pages.
As a result of business listing in the White Pages, a Yellow Pages representative will contact you about an advertisement in the Yellow Pages section. Contact the Yellow Pages directly if you do not hear from them soon. Grande Communications does not sell or promote Yellow Pages advertisement space.
Yes! You will save a significant amount of money with Grande Bundles and GrandePacks.
Grande provides high-speed Internet, local and long-distance telephone, and digital cable services at very competitive prices. And if you choose a Bundle or GrandePack, you will save significantly more.
The 300 Minute Call Plan is included and although you may find there are some months you don't use it, you have the advantage of using the minutes anytime you want. You can also select to upgrade to Unlimited Domestic Long-Distance for only $5.00 per month. Then you can select a less expensive cell phone plan.
Digital cable offers digital quality picture and sound and provides more channels of programming which equals a better value for you. Other features Digital Cable offers are 24 hour, commercial free music; Pay-Per-View movie, event and sports channels and an Interactive Program Guide which gives you more control over your TV. Get all that cable has to offer with Digital Cable.
Grande Digital Cable offers more variety...everything from Home Theatre (Pay-Per-View) to 24-hours a day, commercial-free music. Plus, the on-screen interactive programming guide gives you control of your TV. With Digital Cable, you can set favorite channels, block channels and programs from the kids and control Pay-Per-View purchases through a PPV purchasing PIN.
HDTV stands for high-definition television. HDTV is a class of digital television that provides a very high-resolution picture with Dolby digital surround sound. The higher resolution picture, displaying up to ten times more image detail than standard TV, is the primary selling point for HDTV. HD signals also display in 16:9 aspect ratio as opposed to the standard 4:3 (a loss of up to 55% of the frame on movies filmed for the big screen), this allows viewers to see the whole screen.
Analog: Standard picture and sound quality with up to 80 channels. Digital: DVD picture and sound quality with more than 300 channels. HDTV: 10 times better resolution/image detail than analog with up to 28 channels currently available; more channels will be added in 2008.
Currently Grande offers up to 28 channels in HD format. Grande will continue to add more HD channels in 2008.
If you are a Grande customer, you need to subscribe to Digital Cable, have an HDTV TV set with either a built-in tuner or an add-on tuner and an HDTV receiver.
At this time, there is no additional cost to receive the broadcast channels in HD format. The broadcast signals are included in Digital Cable. Customers who subscribe to the HD Tier will receive 15 channels of HD programming for $9.95 per month. Customers who subscribe to the premium channels (HBO, Showtime, Cinemax and Starz) will receive the matching HD channel at no additional cost.
A DVR is a service that allows you to record and store television programming on a hard disk drive in your digital receiver so that you can access this programming at any time. The DVR functions like a VCR, without a videotape and with more sophisticated recording and playback options. Choose from live television or recorded content. A DVR will allow you to stop, pause, rewind, or fast-forward your program. For example, if you receive a call in the middle of a program, a DVR will allow you to pause the show, recording the content from the moment of the pause, and resume viewing where you left off.
DVRs store content in a compressed digital format onto a hard disk drive (like a computer), which alleviates storage limitations of VCR tapes. VCRs use VHS or Beta tapes to store information in an analog format. VCR tapes can only capture up to six hours of programming while a DVR can store between 30 and 50 hours. DVRs also provide more sophisticated recording options. For example, it can be programmed to record an entire season of your favorite show.
No, you do not have to purchase any additional equipment. There is a monthly subscription fee of $9.95 per DVR and your digital receiver will be replaced with a DVR enabled receiver.
Yes, however, you will need to upgrade to Grande Digital Cable to be able to receive the DVR service. This is because the DVR service will only function with the DVR receiver.
If you subscribe to any premium service, you will receive the multi-channel premium service on those TV sets connected to a digital receiver.
We consider how the channel will appeal to customers and how adding the channels will impact the cost of cable service. By choosing channels with a broad appeal and reasonable cost, we can continue to improve the channel lineup and minimize rate increases. Also, as we receive letters and telephone calls requesting different channels, we take these requests into account. We also rely on research on what customers across the country are watching and what new services are likely to be considered valuable additions.
Grande does not require a digital receiver for Expanded Cable. Those services are always available on all TV sets in the home connected to a cable outlet. Digital Cable does require a digital receiver for each TV set. One digital receiver is included in the Digital Cable package. Additional digital receivers may be leased from Grande for a small monthly fee. Only those TV sets equipped with a digital receiver will get the digital services. The other TV sets in the house will only receive Expanded Cable programming.
Cable-ready, or more accurately, cable-compatible TVs and VCRs are designed to receive non-scrambled cable channels without the need for a converter from the cable operator. However, not all "cable-ready" TV sets can receive some of the cable channels found on higher frequencies. You may need to buy a "channel extender" (also referred to as a basic converter) to ensure that you receive all of the channels available with the Grande Expanded Cable service. The channel extender is available for purchase from Grande Communications for a small fee.
There are three fees associated with Cable services:
Music Choice is a digital music service that is included at no additional cost in the Digital Cable package. Music Choice includes 48 different music formats, each playing a specific music type such as Jazz, Classic Rock, Rhythm and Blues, etc. Simply tune to the channel you like and enjoy!
The News 8 Channel is a subsidiary of Time Warner, and therefore unavailable to Grande cable customers.
Grande offers a wide variety of Spanish language programming, including sports, novellas, music and variety. The services that Grande typically offers on Expanded Cable include Galavision, Univision, Telemundo and mun2. HBO customers also receive HBO Latino at no additional cost. In most markets we also offer a package of over 15 Spanish language channels for a small monthly fee.
The Movie Channel is included at no additional cost in the "Showtime Unlimited" premium package. Also included in the "Showtime Unlimited" package, at no additional cost, is Flix.
Grande Communications is building a brand new broadband network. We are currently installing fiber-optic cable in your area and within a few months, we will begin delivering you a choice in high-speed Internet, local and long-distance telephone and digital cable television services.
Grande is building a brand new network from the ground up. We are not retrofitting or modifying existing network lines from other Internet, telephone and/or cable providers in this area. Instead, we are installing a state-of-the-art system that delivers our technologically advanced services clearly and easily. Our network will require the installation of a service box on approximately 5% of the residences that we pass. The service boxes are designed to be as unobtrusive as possible and are placed within the utility easement.
Public rights of way and utility easements often cross private property, sometimes where electric, telephone and cable service boxes already exist. Many times the easements cross back yards. Therefore, Grande's construction teams will need to enter the back yard to hang cable from existing utility poles or install the service box. Again, Grande's construction work generally occurs around existing utilities.
Grande's network is capable of delivering large amounts of data via a single line to the home. It is one of the most advanced networks currently being constructed and is designed to handle bandwidth demands well into the future. Grande customers will be able to take advantage of all the Internet and cable television has to offer - as well as dependable phone service - for many years to come. If it becomes necessary for Grande to upgrade its network or replace components, Grande will notify residents and work with the City to ensure that the upgrade is as unobtrusive as possible.
Grande's number one priority is resident safety. A Grande employee or contractor will fit each cabinet with a padlock and the cabinet will be partially blocked by landscaping.
The cabinets are constructed of galvanized steel, but will be painted to blend into the surrounding property. They are approximately seven and a half feet wide, six feet tall and four feet deep. Grande has built the cabinets to open on all four sides, where a four to five foot clearance exists, and plans to landscape the area around the cabinet.
The term spyware is generally used to describe any program installed on your PC that sends information (with or without your permission) to someone else for the purpose of monitoring your online (browsing, shopping, etc.) habits as well as your personal information. In addition to being an invasion of your privacy, spyware applications can also cause your computer and/or Internet connection to function slower than normal or sometimes in extreme cases it may fail to function at all.
The two most common ways that spyware gets placed on your computer is 1) by installing freeware/shareware/demoware software that installs spyware applications during installation of the main program or 2) by visiting websites which attempt to install applications on your PC using exploitable web technologies like Microsoft ActiveX.
We recommend the use of Ad-Aware SE Personal Edition from LavaSoft. This application will search your system for spyware and will inform you of any questionable programs or processes that it finds. It will also stay up to date like most virus scanners do by connecting to the developers site and downloading regular update so that it will always be able to identify the latest types of spyware applications and techniques. Another highly recommended removal tool is Spybot Search and DestroyThis application is also free of cost and has proven to be one of the most effective of it's kind.
We recommend the use of a web browser such as Mozilla or Firefox for general web browsing use. These browsers are less exploitable than Internet Explorer and may leave you less vulnerable to spyware when visiting websites. You may find that some sites you use frequently require Internet Explorer in order to function (Online Banking for example) and if this is the case you can still use Internet Explorer for these types of sites. For all other general browsing you will be less vulnerable to spyware if you stick to a browser like Mozilla or Firefox.
Open Internet Explorer, click the "Tools" menu and select "Options". Select the "Security" tab and make sure that it is set for at least "Medium" or higher security. Then click on the "Custom Level" button and adjust the following options to these indicated values: Download signed ActiveX controls: Prompt; Download unsigned ActiveX controls: Disable; Initialize and script ActiveX controls not marked as safe: Disable; Run ActiveX controls and plug-ins: Prompt; Script ActiveX controls marked safe for scripting: Prompt.
Microsoft has an article that describes many steps that can be taken to identify and fix this sort of problem, but it can be complicated and requires at least some level of expertise. There is also a third party software tool called LSP-Fix which will attempt to identify these problems and fix them for you. If neither of these resources seem to help your specific problem then it might be a good idea to contact your computer manufacturer or vendor for advanced support.
There is an advanced spyware removal tool called HiJackThis which has been reported to be extremely powerful and effective. This tool will aggressively search your system for web browser parasites and other spyware related applications. It shows you everything on your system that has any connection to your web browser and leaves it up to you to decide if it should be there or not. Extreme caution should be used with this tool because along with it's powerful capabilities comes the abiltiy to further damage your system.
It may be necessary to boot Windows into "safe mode" in order to install and run these applications if your computer cannot boot normally. Most versions of Windows can be strted in "safe mode" by pressing the F8 key during the initial stages of Windows startup. You will not have access to the Internet while in safe mode so it also might be necessary to place files needed for installation on floppy disks or recordable CD-Rs.
DoxDesk has a nice online spyware/parasite scanner that will perform a quick search for the most commonly found spyware applications.
This error message will always be followed by ONE of the following:
A common tactic of junk mailers is to specify one of the recipients in the To: field and then use what is called 'Blind Carbon Copy' to silently instruct the mail server as to which other addresses should receive the email, yours being one of them. This makes it appear as if you are receiving someone else's email, but due to the BCC, you were actually receiving an additional copy. Grande already takes a number of steps to reduce the amount of junk email that users receive, however you can enable more aggressive filtering on your account by using our Email Admin site at https://admin.mygrande.net. Please be sure to take a look at Spam Assassin FAQ first in order to find out which method of filtering works best for you!
Almost never! Here are some valuable tips:
Grande employs many aggressive tactics to prevent junk email. The following list of deployed weapons alone serve to block or discard tens of thousands of unwanted emails each day:
If you have ever been involved in any of the following, your email address has probably been 'harvested' and now some unscrupulous folks may be distributing or selling your email address:
NO! Spammers do not use real return addresses, so when you send the fake "User unknown" returned emails to them, they just bounce again. It is pointless to enable this feature on your email software because the junk mailer will never see nor heed the message (all legitimate mailing entities provide a proper unsubscribe link.) So either just delete your junk mail, or see our Spamcop FAQ on how to take punitive action against the sender.
Grande now provides optional filtering for your @grandecom.net email address. To use it, please choose a filtering type from the options listed here. Then log in with your email username and password at https://admin.mygrande.net and click Manage in the Filtering section in order to enable your selection.
Filtering does not prevent the mail from arriving, but rather just files it appropriately. Nor does it impose any punitive response on the junk emailer. If you religiously use SpamCop, you will be part of a larger cooperative to help eradicate spam on our Internet. Join us!
Phishing is the term used by Internet scammers who imitate legitimate companies in e-mails to entice people to share usernames, passwords, account information or credit card numbers.
The term Phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' private information. The most common ploy is to copy the look and feel of a web page from a major site and use that design to set up a nearly identical page that appears to be part of the company's site.
There are several steps you can take to make sure you never fall for one of these scams:For more information you can visit this website: http://onguardonline.gov
Yes. You will see a savings when you subscribe to more than one service, plus you will have the convenience of one bill, one company and one call for customer service.
A network interface device is required and will be installed on the side of your home where your other utility devices are located. Grande Communications does not need to do any wiring or installation inside your home, as long as your home has been pre-wired when it was constructed.
Yes, all of your Grande services will be on one convenient bill.
Yes. You have the option of keeping your existing number or requesting a new number from Grande Communications. Grande may be able to offer you a better or easier number to remember, or we may even be able to provide you with "vanity" numbers such as ###-CATS or ###-HOME. Call your Grande Customer Care Center for more information.
Yes. You can keep your current long-distance carrier, but only if they have requested access to Grande's network. Not all long-distance carriers have requested access. Also, if you select Grande as your long-distance provider, you can select a call plan that is right for you - all on one bill.
You have the options available to use at any time. You may feel that you don't want to use all of them, but as your needs change or as you try the different features, you may find them useful. Many of our customers try them and find them very easy to use and helpful. There is, however, no further discount on the GrandePacks if you choose not to use some of the Custom Call features.
Yes. You will see a savings when you subscribe to more than one service, plus you will have the convenience of one bill, one company and one call for customer service.
A network interface device is required and will be installed on the side of your home where your other utility devices are located. Grande Communications does not need to do any wiring or installation inside your home, as long as your home has been pre-wired when it was constructed.
Yes, all of your Grande services will be on one convenient bill.
Yes. You have the option of keeping your existing number or requesting a new number from Grande Communications. Grande may be able to offer you a better or easier number to remember, or we may even be able to provide you with "vanity" numbers such as ###-CATS or ###-HOME. Call your Grande Customer Care Center for more information.
Yes. You can keep your current long-distance carrier, but only if they have requested access to Grande's network. Not all long-distance carriers have requested access. Also, if you select Grande as your long-distance provider, you can select a call plan that is right for you - all on one bill.
You have the options available to use at any time. You may feel that you don't want to use all of them, but as your needs change or as you try the different features, you may find them useful. Many of our customers try them and find them very easy to use and helpful. There is, however, no further discount on the GrandePacks if you choose not to use some of the Custom Call features.
The email server has a limit since the SMTP protocol was designed for light transfers. In addition, every single byte is scanned in order to filter for known viruses, spam, and other undesirables. FTP is by far the faster and recommended method of transferring files.
Yes! The address is ftp.grandecom.com
The directory is called 'incoming'. In your FTP program, there is a setting for 'Initial Remote Directory' or 'Remote Folder'. Set this to '/incoming'. Any file that you want to upload, simply drag and drop into /incoming from your local machine.
It is there. The directory is write/retrieve only. In order to protect the privacy of the files that you are transferring to your correspondents, we have intentionally set it up in this manner. This way nobody will EVER be able to see any private material that you wish to pass on to your friends/family.
You will have to give your correspondent the exact filename that you used. If you upload a file into /incoming called 'myphotos.zip', then simply send an email to your recipient containing the following address: ftp://ftp.grandecom.com/incoming/myphotos.zip Then all he/she will need to do is click the link to download the file you have uploaded.
Make sure that the filename portion of the link you sent matches the case exactly. 'MyPhotos.zip' and 'myphotos.zip' are two different files!
It is possible that your friend did not receive it quickly enough. Although most items remain in the /incoming directory for a few weeks before deletion, the extremely large ones may be erased in as little as 48 hours depending on usage. Please try to coordinate the time frame as closely as possible when sharing files if they are larger than 50MB.
For security purposes, only standard filenames are permitted. No spaces or extended ASCII characters can be used in file or directory names. Simply replace your spaces with underscores (usually shift-minus on your keyboard) and use standard alpha characters. It is highly recommended that you use all lower-case to simplify matching on filenames when passing on the links to your correspondent.
A DNS Block List is a database of IP addresses which have been flagged for Internet misuse. This may include origination of junk email (spam), a virus propagation source, an open relay or an open proxy. Email administrators program their servers to consult these IP databases before permitting delivery to their users.
An open relay is a mail server that permits anybody on the Internet to send email through it. Optimally, relaying should only go through one's own Internet Service Provider which would ensure that misuse would be trackable. An open proxy allows users to connect to a remote SMTP server and send mail fully disguising their source of origin, thus promoting abuse without accountability.
I get one of the following errors when mailing any Grande user:
You do not have permission to send to this recipient. For assistance, contact your system administrator.
The IP address of the Email server that you are using to send mail (this may include your own computer if you are running a local mail daemon on it for sending purposes) is listed in a DNS Block List.
No, we cannot because this is not 'our' block list and Grande did not add you to it. These lists are administrated by 3rd party organizations whom Grande has no affiliation with other than as an end-user of the service.
If you are an Internet Service Provider or Systems/Network Administrator for an IP network, and manage the IP space which is blocked, simply follow the hyperlink in the error message (as shown above) which will take you to the reason for the listing. Each site contains clearly marked directions for removal. If you are a customer of an ISP, school, office, etc. please copy the full error message, and pass it on to whomever supplies your Internet access.
Perhaps this analogy will work. The clerk at the grocery store hands back your corporate credit card, saying it is "declined". This is because the 3rd party entity, the credit card company, has denied the transaction. Your only course of action is to have your company now contact the credit card company to settle the probable mixup. There is nothing that you or the store clerk can do about it.
Consider Grande to be the clerk. We want to accept your email and we have no reason in the world not to. However the company that we use to validate your credentials tells us that we must refuse the transaction! Like the example above, you must now have your ISP contact the DNS block list maintainer to fix the problem. Once they "clear" your ISP, your email will once again be able to reach us. Neither you nor Grande need make any changes for this to happen!
The ports used by Windows NetBIOS over TCP/IP (137,138,139, & 445) are among the most vulnerable to hackers. Disabling NetBIOS over TCP/IP is easy:
There are a few simple steps you can take to keep your computer safe.
To start, you will want to install a firewall. The best solution is a hardware based firewall/router such as the Linksys BEFSR41. You can pick one up for around $50 and it comes with a 4 port switch to connect your computers to. By using a hardware based router between your cable or DSL modem and your network, you are able to provide NAT IP addresses on your LAN so that it appears all of your computers are coming from a single IP and it makes it harder to get to those computers. Be sure to change the default password on your router once installed.
The other option is to install a software based firewall such as ZoneAlarm or BlackIce. These firewalls start out basically blocking everything and allow you to choose as needed inbound and outbound activity.
Remember that firewalls are not a substitute for taking the other necessary steps.
Install and keep your antivirus software up to date by using the automated update feature. Check it fairly often to make sure that your updates are occuring. Some commercial antivirus programs require a subscription for you to receive updates. Also, don't blindly click on attachments such as .pif, .exe, .zip. If you weren't expecting a file from someone, don't open it. We recommend AVG as a good free antivirus program that keeps itself updated.
It is important to keep your Windows installation secure by updating it frequently at http://windowsupdate.microsoft.com.
Install a Pop-Up blocker such as the Google Toolbar. Besides allowing easy searching of Google, it also stops those annoying Pop Up adds that some websites use.
Sometimes pop-up spam is sent via the Windows Messenger Service (not MSN Messenger which is instant messaging software similar to AIM or ICQ). To get rid of that spam, you will need to disable Windows Messenger. Please follow the simple directions here.
In addition to using antivirus software, you will want to run a periodic scan to confirm your computer is not infected with Spyware. Spyware is software that gathers information about your browsing without you necessarily knowing. It is usually installed when programs like Comet Cursor and various other websharing clients are installed. A couple of good free ones are Ad-aware from Lavasoft and Spybot Search & Destroy. Both programs do an excellent job of cleaning spyware from your computer.
Disable Windows File and Print sharing. Leaving them open only opens up your computer to a number of possible attacks. You can find out how here for XP and for Vista.
As a final precaution, if your cable modem has a stand-by button (If its a Motorola it probably has it on the top or front, Com21's do not have them), you might want to use it. Turning it on will stop all communication between the Computer side and the Internet side of the cable modem. Just remember to turn it back off when you want to use your computer again. Alternatively, you can just power down your computer when its not in use.
Frequently these programs are very sensitive to packets that are required for you to use the internet. A common example is firewall software reporting an attack on port 53, the port used for DNS. DNS is the translation mechanism that the Internet uses to allow you to access web pages by typing in their names rather than their numerical IP addresses. Sometimes a firewall package will report the response we provide back to your computer as an attack. Most alerts concerning port 53 can be safely ignored and/or disabled.
The largest threat when using a wireless LAN is a failure to use any security measures at all.
Our first recommendation would be a hardware based NAT router such as the Linksys BEFSR41. With it, you can share your internet connection between all of your computers.
Or, if you do not with to install a router, install something like BlackICE or Zone Alarm. As always, we request that you install a good antivirus package such as AVG on every computer.
Traffic on port 53 is DNS. Unless you are running a DNS server, you are receiving responses back from your requests. You can safely ignore those alerts.
Traffic on port 67 and 68 is DHCP. That is normal traffic as your computer must request an IP address and frequently request to continue using it. What is reported as an attack is actually just Grande's servers allowing you to continue to use that IP address.
Please visit Internet Storm Center and input the port you want to know more about. They also have a map available showing the top kinds of attacks currently happening.
You can run a scan of your computer at Symantec. If you are running a firewall, be forwarned you will get alerts generated by this.
You will need to install a good antivirus package such as AVG or update the definitions of your existing software and run a full scan. Also, you might want to visit http://windowsupdate.microsoft.com. just to make sure that your computer is fully updated with the latest security patches.
The easiest way to report abuse if you are using BlackICE, ZoneAlarm, or a Linksys firewall is to install the agent from myNetWatchman and have it do the reporting for you. It will compile reports from all of their users and sends a summary to the ISP. That way all the legwork is automated, making it easier for you and the ISP.
Or you can look up the abuse contact for an IP address and submit the report to them. For a given IP, you can find the owner by using the whois tool located at http://www.geektools.com/whois.php. Just input the IP, fill in the code, and click submit. You will want to find the abuse email address listed to send email to.
Please do not send your logs for attacks that did not originate from Grande IPs to us.
When reporting an attack, most providers will want the data in the same format: IP Address of the attack, Date/Time stamp of the attack including offset from GMT, Protocol/Port used, and the number of instances of each packet type received. A good example follows:
Mar 15 19:33:03 -0600 192.168.30.150:3510 -> 10.60.87.1:9898 SYN ******S*
Mar 15 19:33:03 -0600 192.168.30.150:3511 -> 10.60.87.2:9898 SYN ******S
Phishing is the term used by Internet scammers who imitate legitimate companies in e-mails to entice people to share user names, passwords, account information or credit card numbers.
The term Phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' private information. The most common ploy is to copy the look and feel of a web page from a major site and use that design to set up a nearly identical page that appears to be part of the company's site.
There are several steps you can take to make sure you never fall for one of these scams:
For more information you can visit this website: http://onguardonline.gov
Computers catch viruses in many ways, primarily by execution of a program containing a virus. Caution must be exercised on any online service and virus protection is always the responsibility of the computer owner.
Most viruses that generate email have forged their "From" field -- in other words, the email appears to come from someone who in fact is not actually not the originator of the email. If your name is forged as the sender of the virus this does not mean that your account has been compromised. The email has not been sent from your account -- instead it has been sent forged in your name.
If someone reports an Email that you did not send you should instruct them to view the email headers and use the senders IP address to report the message to the abuse department of the provider from which it was sent.
You probably have nothing to worry about. A lot of recent viruses will randomly pick a return address from the victim's address book to use when automatically propagating itself. So most likely one of your email correspondents has picked up a a virus which is forging your address. Still, it is recommended that you keep your AntiVirus software current and running! As far as the actual bounces, you can safely delete them - they will stop coming when the person with the virus disinfects his/her computer.
Yes, McAfee makes a program called AVERT Stinger. It can be found here: http://vil.nai.com/vil/stinger/.
Your computer might be infected with the 'CoolWebSearch' which is a browser hijacker/spybot. Ad-aware and Spybot Search & Destroy do not currently catch this, nor do most antivirus programs.
Yes. We highly recommend that you install antivirus software and also keep the definitions up to date. Most modern antivirus software will permit you to periodically download updated definitions automatically. Each software package is different, so be sure to check the documentation and keep those definitions current!
For Windows, either McAfee. A reasonably good free package for Windows is available at Grisoft. For Macintosh, Norton makes a version that you can purchase online at http://www.symantec.com/purchase/
Delete them. They probably contain a virus. We recommend installing a good antivirus package like McAfee or Norton and keeping the definitions up to date.
These actions require the use of port 135 which is now blocked on the Grande network for the protection of our customers. The block is due in part to a security vulnerability in several Microsoft operating systems that may allow unauthorized access to computers on the Internet via this port. A port filter is the optimal response as recommended by the US Department of Homeland Security.
This worm forges emails to (and from!) everyone in your address list and includes a dangerous payload that when executed will infect them and send itself to everyone they have in their address book. On February 1, 2004 all infected hosts will perform a Denial of Service attack aimed at http://www.sco.com/ and on February 12, 2004 the worm will stop spreading itself. To remove it from your computer, update the virus definitions in your existing antivirus program or install the free version of AVG. Once your definitions are updated or AVG is installed, run a full scan on your computer. Once thats done you should be clean.
Please follow the instructions at Symantec to download and use the Welchia removal tool. You will also want to update your operating system by using the instructions from Microsoft to prevent further infections using this exploit. We also recommend that you install and keep the definitions updated on a good antivirus package such as McAfee, Norton, or AVG.
Please visit the Symantec website and download the removal tool and follow the instructions with it.
This worm only affects Windows NT, Windows 2000, Windows XP, and Windows Server 2003. You must download a patch to update your operating system from the Microsoft website. Also, you will want to install antivirus software or update the definitions on your existing software.
Please visit the sobig.b removal page for a tool to remove the current infection from your computer. You will also want to install antivirus software or update the definitions for your existing software. The tool above cannot prevent reinfection, only remove whats already there.
Klez is a worm that searches your computer for any email address and then hides itself in one of your files and sends itself out along with one of your files. You can find a tool to remove it here: klez removal tool.
Sircam is a worm that collects email addresses from various places on your computer. It then sends itself along with randomly chosen .doc or .txt files that are on your computer to the addresses it has collected. To get a fix for it, please visit the sircam removal tool.
CodeRed is spread through unpatched Microsoft IIS web servers. If you don't need to run a webserver, disable it. If you do, please patch it. You can find a cumulative patch here to prevent you from being reinfected. To clean off your current infection, please visit this link for a tool that will remove it for you.
Nimda is a worm that spreads itself via email and attaches to infected Windows IIS Servers. If you don't need to run a webserver, disable it. There are two variants of nimda, each with their own tool. Please see w32.nimda.e@mm.removal.tool and w32.nimda.a@mm.removal.tool for each of them. You will have to run both to determine which you are infected with.
This worm is spread through unprotected or easily guessed passwords on shares on port 445 on Windows 2000 and Windows XP systems. Once its in it installs itself and starts to spread to other users. Please visit this link for information on how to remove it. To protect yourself, turn off any unneccesary shares and configure better passwords on shares that do exists to include numbers and special characters.
Symantec has provided a number of removal tools. If you know the name of the virus, you can download the removal tool for it and follow the instructions to remove it. However, to prevent infection from the same virus or other viruses in the future, you will need a good antivirus software package installed.
Please submit the email you received including the full email headers to abuse at grandecom dot com. Please make sure that your report meets the following conditions so that we will be able to process it:
- Please include the full email headers or message source so that we will be able to identify the true source of the email. Without the full email headers we will not be able to process the report.
- Only one unsolicited bulk email message at a time should be submitted to the Abuse Department. This allows the individual incident to be processed and tracked with the highest level of efficiency.
- Grande users should not report unsolicited bulk email to our Abuse Department unless of course the UBE originated from another Grande user. For unsolicted bulk email originating from another network or ISP Grande users should utilize the SpamCop service so that the UBE can be reported to the Abuse Department of the network from which it originated. For help with SpamCop please see SpamCop FAQ
This type of traffic is almost always originated from a computer that has been infected with a virus. Please submit the following information to abuse@mygrande.com and we will identify the cause of the traffic and take steps to help the situation:
- Submit any firewall logs that will indicate the nature of the activity being reported. Firewall logs should be submitted in a text-only format. Logs that are submitted in the format of spreadsheets, images, or other specialized formats may not be processed as efficiently as if they were received in a text-only format.
- The IP of the host where the activity is originating (source ip) must be included.
- Timestamp of the activity including the Timezone. Without the Timezone included the report may not be processed.
- Source port (if available) and the Destination port (required) of the activity.
In addition please make sure that you report meets the following requirements:
- Some software firewall products for consumers do not do a very good job of providing all the required information above. Unfortunately without all this information we are unable to process a report so please be sure that your firewall software is providing all of this information.
- Only one host at a time should be submitted to the Abuse Department. If a complaint needs to be filed against multiple hosts it is desirable for this to be done with separate emails to the Abuse Department. This allows the individual incident to be processed and tracked with the highest level of efficiency.
- Grande users should not report port scans to our Abuse Department unless the port scan is originating from a Grande ip address. For port scans originating from another network or ISP please use the form located at http://www.abuse.net/lookup.phtml. Enter the offending ip address into the form to display the abuse contact information for the owners of the ip address.
50MB. NOTE: Email programs use MIME encoding to convert your attachments into a format suitable for emailing. Typically, this will take as much room as 33% of the original file size (it is called "overhead" So an attached file that is only 15MB in size can result in a 20MB email! If you run into limitations as a result of this overhead, you might try using ftp instead to transfer large files.
Your administrative (global) account is 'postmaster@yourdomain.com'. To individually manage accounts, log in with the email address of the account you are managing, ie. 'johndoe@yourdomain.com'
Your username will be in the format 'username-domain'. So if your address is 'jdoe@mydomain.com', your POP3 username will simply be 'jdoe-mydomain.com'.
The address will be in the format 'mail.domain'. Thus, if your domain name is 'mydomain.com', both your SMTP and POP3 server addresses will be 'mail.mydomain.com'. If you are in the process of modifying the DNS servers for your domain to Grande from another service provider, you will be provided an IP address to use until the DNS change occurs.
Yes, both are. Please use all lower-case on usernames and be sure that if you have set a password with mixed-case in the Management Interface, that you match it when configuring your email program.
Each email account has a quota of 500MB
No! Our servers have dynamic relay authorization control (often referred to as 'POP before SMTP'.) Simply check your email before sending a message, and your current IP will be authorized to relay for 12 hours. If you accidentally allow this time to expire while using Outlook Express and get an error sending, simply drag & drop the email that you are composing into another folder temporarily. Then after you check your email, move the message back into Outbox, and then it will go out normally on the next Send/Receive.
Your quota is 20MB.
http://home.grandecom.net/~[username]
Where, [username] is your primary email username (without the @grandecom.net)
Your web space is not enabled by default. Click here to email a request. In most cases it should be active within a few hours.
If you never uploaded any content to replace the default page, it is likely that your site was automatically removed by an audit. Please see the question above on how to request it re-enabling.
At this time personal web pages do not support FP2K. You can publish your site using FTP (FAQs are available for most popular FTP programs). In order to use FP2K you will need to purchase our Domain/Virtual Web product.
Set your FTP program to use 'home.grandecom.net' as the remote host. Leave the port set to the default - it should be '21'. Your username and password will be those supplied to you at the time of provisioning, in most cases identical to your email username/password. The Remote Directory will be '/public_html'.
You should be able to consult the documentation that came with your software, however we have provided some graphical HOWTOs for WSFTP, Cute FTP, and DOS FTP client on this site. You can find these on the main FAQ HOW_TO's menu.
Your browser probably has the old pages cached. Usually just clicking "Refresh" ("Reload" in some browsers) will load the new version of the page. In some instances you may need to delete your temporary internet files (or "clear cache" in some web browsers.)
This will be "public_html".
Simply rename your main page to "index.html" (index.htm will work too).
It is possible you uploaded them to the "/" directory instead of "/public_html".
It is possible that the file you are attempting to upload will cause your quota to be exceeded. Check if you have disk space available!
All of your files are stored on a redundant (RAID) array comprised of multiple hot-swappable disk drives. Thus you can be sure your data is always safe, HOWEVER if you yourself delete anything, it is gone forever! Thus, you should always keep a recent backup of your site to protect against mistakes!
http://www.yourdomain.com
Set your FTP program to use 'www.yourdomain.com' as the remote host. Leave the port set to the default - it should be '21'. Your username and password will be those supplied to you at the time of provisioning. These will exactly match your FrontPage 2000 login/password. The Remote Directory will be '/html'. If your connection 'hangs' try toggling the setting for passive transfers in your FTP program to the opposite of its current value.
Make sure the following are all true:
- If FTP, you are connecting to 'www.yourdomain.com'
- You are using all lower-case for your username and password
- If FP2K, you are connectiong to 'http://www.yourdomain.com'
- You do NOT have '@yourdomain.com' appended to your username
- Your Grande account is currently in good, paid standing
Make sure that you published/uploaded to the /html directory. If you put them in '/', they will not be visible via a web browser.
These are called 'stubs' and used by the Microsoft FrontPage client for site publishing. You need not worry about these - they are very small and they will not detract from your quota in any noticable way.
Yes, you may, but if you change your mind later and would like them re-added, you will have to send us an email request to do so. It is safe to delete all the '_vti*' directories, and also '_private'.
You have 150mb with the basic package, 250mb with the enhanced package.
We provide a "communal" mailer program to allow the sending of email messages from your site form submissions. Please click here for usage instructions.
You can connect to your site via MS FrontPage and add a counter component or simply insert the following code into your page, substituting
You are visitor number < img src=http://< mysitename>/cgi/counts.phtml>
If you have the Premium hosting package, simply visit the URL http://www.yourdomain.com/stats/
http://www.webalizer.com/webalizer_help.html gives a nice description of each of the main headings.
Logs are analyzed every Sunday at 2:30AM CST. We save a history file, so all stats are cumulative, and will always date back to the inception of your site unless you choose to delete these yourself from the /stats directory.
You still have access to your server logs, however you will need to download the raw log file yourself and use one of the freely available statistics processing programs to analyze the log file. You will find it in /logs/access_log when logged in via FTP. The format of the file is called "Combined" (you may need this for your log processing software)
If you have the Basic hosting package, these will frequently be rotated and compressed to save disk space. In /logs you will find several access_log_DATE.gz files - these can be deflated with a standard utility such as WinZip. If your log processing software does not support multiple logs, you may have to concatenate them all together using editor software such as WordPad.
The PHP scripting language is made available for all websites. Please see the PHP Documentation for help with usage.
From the Tools menu, select 'Address Book'. In this new window, select 'New Entry' from the File menu. Next, select New Distribution List and click OK.
Label this list by putting a name in the 'Name' field. (ie list1, list2), then click Select Members. Select addresses from the left column and click Add to add this address to your list.
From the Tools menu, select 'Address Book'. Next, select New Group from the File menu. Give this group a name in the Group Name field.
Click Select Members and select addresses from the left window. Click Select-> to add address to group. Click OK to save this list.
You'll need to send separate emails for each list. Send the first one, go to your Sent folder and forward to list #2, etc.
Right click on the message and select Edit as New, change the recipient to list #2.
Minimum System Requirements
Yes. The Music Service player can play many popular digital music formats. To import your other music, click the Tools menu and select Import Media You can tell the player exactly where to look for your other music, or leave the default set to Entire Computer to find music anywhere on your hard drive. If you have a large music collection, it may take several minutes to find and import all your music.
Streams allow you to play music over the Internet without downloading a big file to your computer's hard drive. To stream a song, select a song and click the Play button. You can stream full songs as many times as you wish as part of your monthly subscription.
Downloading a song to your computer lets you to play the song whether you are connected to the Internet or not. The song file stays on your computer until you delete it. There are two kinds of downloads: subscription downloads, and purchased downloads.
A subscription download is a song file that you can play as many times as you want, as long as you have a current subscription. You can download most songs as subscription downloads. Subscription downloads are included in the monthly price of your service. The computer containing your subscription downloads must periodically update licenses by going online at least once a month.
A portable download is a subscription download that you can play and transfer to a maximum of two supported portable music players, visit http://www.playsforsure.com to see if your player is supported. You must have a current portable subscription to transfer songs to your supported portable music player.
No. The Apple iPod and older MP3 players don't support our music copyright protection format.
Permanent downloads can be burned to CD for playback on your home, car or portable CD players. They can also be transferred to supported portable music players and burned to a CD. Permanent downloads are not included in your subscription service; they must be purchased separately. You do not need a subscription to play permanent downloads.
To Burn means to copying a permanent download to a CD so you can play it on your home, car, or portable CD players. Permanent download customers can burn single songs, entire albums, or customized song lists to CD. In addition to meeting the minimum system requirements, you will need a CD recorder and software to make CDs.
Each unique list of purchased songs can be burned to CD 7 times. Each song can be on any number of unique burn lists. Add or remove songs from your burn list to burn more CDs.
To find music, use the search tool at the top right of The Music Service, type an artist name, song title, or album name in the search box at the top right then click the Go button. For a more specific search, or to search for videos and radio stations, Advanced Search link near the bottom right of the Home page. You can also browse music by genre. Click on the Browse Artists A-Z link near the top left of the Home page button and choose a genre. You will see a list of artists in that genre in order of popularity. Choose a letter on that page to see an alphabetical list of artists whose name starts with that letter.
If an artist or song is not in our catalog, it is usually for one of two reasons. The Music label does not yet have legal approval from the song's owners to distribute it online or the artist might be signed to a music label that has not yet partnered with us. There are currently more than 2 million songs in our catalog. The depth and breadth of the catalog will continually expand, and new music is added every week. Check back often to see if your favorite artist has been added.
Search for an artist or song you want to play, then click the Play All button near the top of the search results, or click the play button (a little right arrow) for a particular song. You can stop, pause, or resume your song from the player if you want. The Play column indicates if you can play a full-length subscription version of the song. Sometimes the play icon has the number on it indicating the song is not available for subscription streaming
If you are a current subscriber, but are only getting 30-second samples, Sign In before playing songs. All users can access 30-second samples, and signed in subscribers can stream most songs full length. A very few artists have not made their content available in our subscription service. You will hear 30-second samples of those few songs even when you are signed in.
By default, The Music Service stores your downloaded songs in the desktop folder My Documents\My Music. You can change this location by selecting the menu, then clicking Options, and selecting File Locations from the list on the left of the window that appears. In the Output File Location section, click the button next to the Base Path text box. Select the directory where you would like your downloads saved and click the OK button. Future downloads will be saved to the directory you selected.
You can play a song after you download it by clicking the Audio section in the SOURCE area on the left side of the player. Once you locate the song in the list, double click it to play it.
No. Simply double click a song in the Audio section in the SOURCE area on the left side of the player. You can collect downloaded songs and play them while offline or online. Your license for subscription downloads must be updated every month, so you can download a song and play it without reconnecting to the Internet for 30 days. You don't need to be connected to play permanent downloads.
Yes, you can download subscription songs as many times as you need to on up to 3 computers. You can download purchased songs up to 5 times each. To move songs to another computer, first install the Music Service player on the other computer. Then Sign In and go to the My Account Download History page. Find the songs you want to download to the new computer and click the Download link.
If you delete a song from your computer you can re-download it from the My Account Download History page. You can download subscription songs as many times as you need to on up to 3 computers. You can re-download purchased songs up to 5 times each.
There are several possible reasons a download might fail. There may have been a system or connection failure that interrupted your download; the Music file may become corrupted; or your computer may not have received the license allowing you to play, burn or perform other tasks with your legal music file.
Here is a summary of the errors you might encounter, and how to fix them:
The Music Service displays the industry standard, voluntary Parental Advisory sticker for songs with explicit lyrics. The advisory is displayed as the word Explicit at the end of album or song names. The Music Service videos carry standard TV parental guideline ratings.
Yes. Select Parental Advisory on the My Account Update Settings page and create a password. You will need to re-enter that same password if you ever wish to turn Parental Advisory protection off. To set parental controls for videos, select the maximum rating you wish to be allowed and create a password. You will need to re-enter that same password if you ever wish to allow more mature video content.
Phishing is the term used by Internet scammers who imitate legitimate companies in e-mails to entice people to share user names, passwords, account information or credit card numbers.
The term Phishing comes from the fact that Internet scammers are using increasingly sophisticated lures as they "fish" for users' private information. The most common ploy is to copy the look and feel of a web page from a major site and use that design to set up a nearly identical page that appears to be part of the company's site.
There are several steps you can take to make sure you never fall for one of these scams:
For more information you can visit this website: http://onguardonline.gov
Our award-winning customer care representatives and technical support team are 100% US-based and here for you 24/7.
Monday-Friday: 7am-10:45pm CST
Saturday: 8am-9:45pm CST
Sunday: 9am-8:45pm CST