MICRO KLEAN OUT DASHBOARD

Your dashboard is designed specifically to make some important information about your website available at your finger tips. You can use the links below to quickly navigate to the most important areas of your website.

Designed By

GRANTNET LLC is a family business registered in Texas since 2016.
Phone: +1 682 268 1229
Email: support@grantnetllc.com

Client Portal

All info in one place

Support

Open a support ticket

Book an Appointment

Schedule a meeting

Send us a message

We are here to always help you.

Home Page

Click to edit the home page.

Services Page

Click to edit the service page.

Contact Page

Click to edit the contact page.

About Page

Click to edit the about page.

Portfolio Page

Click to edit the portfolio page.

Frequently Asked Questions

This knowledge base has been documented to answer frequently asked questions.

What does this means?

This support knowledge base has been documented to answer frequently asked questions, how-to guides, and troubleshooting instructions related to EFMC website support.

Email Client Setup: Apple iOS 11 and 13

Setting up your email on Apple iOS 11 and 13?

You will need your incoming mail server, outgoing mail server, full email address, and your email password. The default settings are listed below.

  1. Go to your phone Settings.
    phone settings
  2. Swipe up to Passwords & Accounts.
    Passwords & Accounts
  3. Tap Add Account.
    Add Account
  4. Select Other.
    Other
  5. Tap Add Mail Account.
    Add Mail Account
  6. Fill in the following information:
    • Name: How you want your name to appear in emails (example: Jane Test)
    • Email: Your full mailbox address (example: test@example.com)
    • Password: Your mailbox password
    • Description: Distinguishes this email connection from others you might have set up on your Apple device.
      Fill in account information
  7. Select Next.
  8. Choose POP or IMAP. IMAP synchronizes the email on your phone with the contents of your account on the server, while POP simply downloads the inbox.
  9. Fill in the following information depending on the protocol you chose in Step 9:
    1. POP
      • Name: The name to display on your email
      • Email: Your full mailbox address
      • Description: Distinguishes this email connection from others you might have set up on your Apple device.
      • Incoming Mail Server: POP
      • Host Name: pop.ipage.com
      • User Name: Your full email address
      • Password: Your email account password
      • Outgoing Mail Server (SMTP) Host Name: smtp.ipage.com
      • User Name: Your full email address
      • Password: Your email account password
        POP settings
    2. IMAP
      • Name: The name to display on your email
      • Email: Your full mailbox address
      • Description: Distinguishes this email connection from others you might have set up on your Apple device.
      • Incoming Mail Server: IMAP
      • Host Name: imap.ipage.com
      • User Name: Your full email address
      • Password: Your email account password
      • Outgoing Mail Server (SMTP) Host Name: smtp.ipage.com
      • User Name: Your full email address
      • Password: Your email account password
        IMAP settings
  10. Tap Save.
  11. Go back to Accounts and select the newly setup email to input the port numbers.
    select the newly created account
  12. Swipe up and tap Advanced.
    swipe up and tap Advanced
  13. Fill in the following information:
    • Use SSL: toggle the slide button to switch off SSL
    • Authentication: Password
    • IMAP Server Port: 993
    • POP Server Port: 995
    • S/MIME: Off
      Advanced Settings
  14. Go back to the previous page and tap SMTP.
    SMTP server settings
  15. Go to the Outgoing Primary Server.
    Outgoing Primary Server
  16. Fill in the following information:
    • Server: On
    • Host Name: smtp.ipage.com
    • User Name: Your full email address
    • Password: Your email account password
    • Use SSL: Off
    • Authentication: Password
    • Server Port: 587
      outgoing mail server settings
  17. On the top right corner hit Done.
  18. Go back to the email account settings page and tap Done.
    Done
  19. Select Continue if you get a message stating that the server identity could not be verified.
  20. The email setup for your Apple Device is now complete. You can view your messages through your device’s Mail app.

Consult Apple’s support page for adding an email account to your iPhone, iPad, or iPod touch.

Email Client Setup: New Android Devices

Setting up your email on a new Android device?

You will need your incoming mail server, outgoing mail server, full email address, and your email password. The default settings are listed below.

  1. Open the Mail app on your phone.
  2. Tap the ‘Other’ option.
    Other option
  3. Enter the email address you wish to configure. In this example, the email address is test@example.com.
    Enter the email address
  4. Tap on the Manual Setup button.
  5. Choose POP or IMAP. IMAP synchronizes the email on your computer with the contents of your account on the server, while POP simply downloads the inbox.
    Choose POP or IMAP
  6. Type in your email password.
    Enter your password
  7. Enter the following ‘Incoming’ server settings:
    1. POP
      • Username – Your full email address
      • Password – Your email address password
      • SERVER – pop.ipage.com
    • IMAP
      • Username – Your full email address
      • Password – Your email address password
      • SERVER – imap.ipage.com
        Incoming Server Settings
  8. Click the NEXT button.
  9. Enter the following ‘Outgoing’ server settings:
    • Username – Your full email address
    • Authentication – Your email password
    • SMTP server – smtp.ipage.com
  10. Click the NEXT button.
  11. Choose your desired settings.
    Choose your desired settings
  12. Tap the NEXT button.
  13. Fill in the following two options:
    • Give this account a name (Optional) – You may leave this as your email address
    • Your name (Displayed on outgoing messages) – You can change this to your actual name if you like
  14. Tap the NEXT button to complete the email setup.
Setting up Outlook 365

You will need your incoming mail server, outgoing mail server, full email address, and your email password. The default settings are listed below.

Non-SSL Settings

Outbound Server SMTPsmtp.ipage.comPort 587
Inbound Server IMAPimap.ipage.comPort 143
Inbound Server POPpop.ipage.comPort 110

With SSL Settings

Outbound Server SMTPsmtp.ipage.comPort 465
Inbound Server IMAPimap.ipage.comPort 993
Inbound Server POPpop.ipage.comPort 995

The instructions below will guide you through configuring the Email Account with us on Microsoft Outlook 365.

Note: In the example below, we will be configuring the email account using SSL Hostnames for SMTP and IMAP protocols.

Step 1: Launch Microsoft Outlook 365 on your computer. If you are launching it for the first time, you will directly see the window as shown below. If you have some other email accounts configured on Outlook already, you can click on File Menu > Add Account to see the window as shown below.

a. Enter your Email Address.

b. Check the box that reads, “Let me set up my account manually.”

c. Click on Connect.
hosting tab
Step 2: 
Select POP or IMAP depending on the Incoming Protocol you prefer. In this article, we have selected IMAP.
hosting tab

Step 3: Refer to the Email Client Settings below, and based on your preferences, enter the respective hostnames, port numbers, and encryption methods for the Incoming Mail and Outgoing Mail servers.

Enter the following information

Click on Next.
hosting tab

Step 4: Enter the password for your email account with us and click on Connect.
hosting tab
hosting tab

Step 5: Your email account has been configured successfully!

Click on Done to conclude the process.
hosting tab

Step 6: You can now send and receive emails on your Email Client.

hosting tab

How does your contact form works?

Information to be provided.

Cookies explained

What is cookie?

Cookies are text files with small pieces of data — like a username and password — that are used to identify your computer as you use a computer network. Specific cookies known as HTTP cookies are used to identify specific users and improve your web browsing experience.

How does EFMC uses cookies?

EFMC uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.

==== Cookies Explained =====

content/en-global/images/repository/isc/43-cookies.jpg

HTTP cookies are essential to the modern Internet but a vulnerability to your privacy. As a necessary part of web browsing, HTTP cookies help web developers give you more personal, convenient website visits. Cookies let websites remember you, your website logins, shopping carts and more. But they can also be a treasure trove of private info for criminals to spy on.

Guarding your privacy online can be overwhelming. Fortunately, even a basic understanding of cookies can help you keep unwanted eyes off your internet activity.

While most cookies are perfectly safe, some can be used to track you without your consent. Worse, legitimate cookies can sometimes be spied upon if a criminal gets access.

In this article, we will guide you through how cookies work and how you can stay safe online. We’ll answer key questions like:

  • What are cookies?
  • What are cookies on a computer?
  • What are cookies on a website?
  • Can cookies contain viruses?
  • How can I remove cookies?

What Are Cookies?

Cookies are text files with small pieces of data — like a username and password — that are used to identify your computer as you use a computer network. Specific cookies known as HTTP cookies are used to identify specific users and improve your web browsing experience.

Data stored in a cookie is created by the server upon your connection. This data is labeled with an ID unique to you and your computer.

When the cookie is exchanged between your computer and the network server, the server reads the ID and knows what information to specifically serve to you.

Different types of cookies – Magic Cookies and HTTP Cookies

  • Magic Cookies
  • HTTP Cookies

Cookies generally function the same but have been applied to different use cases:

“Magic cookies” are an old computing term that refers to packets of information that are sent and received without changes. Commonly, this would be used for a login to computer database systems, such as a business internal network. This concept predates the modern “cookie” we use today.

HTTP cookies are a repurposed version of the “magic cookie” built for internet browsing. Web browser programmer Lou Montulli used the “magic cookie” as inspiration in 1994. He recreated this concept for browsers when he helped an online shopping store fix their overloaded servers.

The HTTP cookie is what we currently use to manage our online experiences. It is also what some malicious people can use to spy on your online activity and steal your personal info.

To explain, you’ll want to understand exactly what are internet cookies and why do they matter?

What are HTTP Cookies?

HTTP cookies, or internet cookies, are built specifically for Internet web browsers to track, personalize, and save information about each user’s session. A “session” just refers to the time you spend on a site.

Cookies are created to identify you when you visit a new website. The web server — which stores the website’s data — sends a short stream of identifying info to your web browser.

Browser cookies are identified and read by “name-value” pairs. These tell cookies where to be sent and what data to recall.

The server only sends the cookie when it wants the web browser to save it. If you’re wondering “where are cookies stored,” it’s simple: your web browser will store it locally to remember the “name-value pair” that identifies you.

If a user returns to that site in the future, the web browser returns that data to the web server in the form of a cookie. This is when your browser will send it back to the server to recall data from your previous sessions.

To put it simply, cookies are a bit like getting a ticket for a coat check:

  • You hand over your “coat” to the cloak desk. In this case, a pocket of data is linked to you on the website server when you connect. This data can be your personal account, your shopping cart, or even just what pages you’ve visited.
  • You get a “ticket” to identify you as the “coat” owner. The cookie for the website is given to you and stored in your web browser. It has a unique ID especially for you.
  • If you leave and return, you can get the “coat” with your “ticket”. Your browser gives the website your cookie. It reads the unique ID in the cookie to assemble your activity data and recall your visit just as you left it.

What Are Cookies Used For?

Websites use HTTP cookies to streamline your web experiences. Without cookies, you’d have to login again after you leave a site or rebuild your shopping cart if you accidentally close the page. Making cookies an important a part of the internet experience.

Based on this, you’ll want to understand why they’re worth keeping — and when they’re not.

Here’s how cookie are intended to be used:

  1. Session management. For example, cookies let websites recognize users and recall their individual login information and preferences, such as sports news versus politics.
  2. Personalization. Customized advertising is the main way cookies are used to personalize your sessions. You may view certain items or parts of a site, and cookies use this data to help build targeted ads that you might enjoy.
  3. Tracking. Shopping sites use cookies to track items users previously viewed, allowing the sites to suggest other goods they might like and keep items in shopping carts while they continue shopping.

While this is mostly for your benefit, web developers get a lot out of this set-up as well.

Cookies are stored on your device locally to free up storage space on a website’s servers. In turn, websites can personalize while saving money on server maintenance and storage costs.

What are the different types of HTTP Cookies?

With a few variations, cookies in the cyber world come in two types: session and persistent.

Session cookies are used only while navigating a website. They are stored in random access memory and are never written to the hard drive.

When the session ends, session cookies are automatically deleted. They also help the “back” button or third-party anonymizer plugins work. These plugins are designed for specific browsers to work and help maintain user privacy.

Persistent cookies remain on a computer indefinitely, although many include an expiration date and are automatically removed when that date is reached.

Persistent cookies are used for two primary purposes:

  1. Authentication. These cookies track whether a user is logged in and under what name. They also streamline login information, so users don’t have to remember site passwords.
  2. Tracking. These cookies track multiple visits to the same site over time. Some online merchants, for example, use cookies to track visits from particular users, including the pages and products viewed. The information they gain allows them to suggest other items that might interest visitors. Gradually, a profile is built based on a user’s browsing history on that site.

Why Cookies Can Be Dangerous

Since the data in cookies doesn’t change, cookies themselves aren’t harmful.

They can’t infect computers with viruses or other malware. However, some cyberattacks can hijack cookies and enable access to your browsing sessions.

The danger lies in their ability to track individuals’ browsing histories. To explain, let’s discuss what cookies to watch out for.

First-Party vs. Third-Party Cookies

Some cookies may pack more of a threat than others depending on where they come from.

First-party cookies are directly created by the website you are using. These are generally safer, as long as you are browsing reputable websites or ones that have not been compromised.

Third-party cookies are more troubling. They are generated by websites that are different from the web pages users are currently surfing, usually because they’re linked to ads on that page.

Visiting a site with 10 ads may generate 10 cookies, even if users never click on those ads.

Third-party cookies let advertisers or analytics companies track an individual’s browsing history across the web on any sites that contain their ads.

Consequently, the advertiser could determine that a user first searched for running apparel at a specific outdoor store before checking a particular sporting goods site and then a certain online sportswear boutique.

Zombie cookies are from a third-party and permanently installed on users’ computers, even when they opt not to install cookies. They also reappear after they’ve been deleted. When zombie cookies first appeared, they were created from data stored in the Adobe Flash storage bin. They are sometimes called “flash cookies” and are extremely difficult to remove.

Like other third-party cookies, zombie cookies can be used by web analytics companies to track unique individuals’ browsing histories. Websites may also use zombies to ban specific users.

Allowing or Removing Cookies

Cookies can be an optional part of your internet experience. If you so choose, you can limit what cookies end up on your computer or mobile device.

If you allow cookies, it will streamline your surfing. For some users, no cookies security risk is more important than a convenient internet experience.

Here’s how to allow cookies:

  • Find the cookie section — typically under Settings > Privacy.
  • Click the boxes to allow cookies. Sometimes the option says, “Allow local data.”
  • If you don’t want cookies, you can simply uncheck these boxes.

Removing cookies can help you mitigate your risks of privacy breaches. It can also reset your browser tracking and personalization. To help, Kaspersky offers step-by-step instructions for removing cookies from the most popular web browsers.

Removing normal cookies is easy, but it could make certain web sites harder to navigate. Without cookies internet, users may have to re-enter their data for each visit. Different browsers store cookies in different places, but usually, you can:

  • Find the Settings, Privacy section — sometimes listed under Tools, Internet Options, or Advanced.
  • Follow the prompts on the available options to manage or remove cookies.

To remove tracking cookie infestations and more malicious types, you’ll want to enlist the help of some internet securitysoftware.

Before removing cookies, evaluate the ease of use expected from a website that uses cookies. In most cases, cookies improve the web experience, but they should be handled carefully.

In the future, you can anonymize your web use by using a virtual private network (VPN). These services tunnel your web connection to a remote server that poses as you. Cookies will be labeled for that remote server in another country, instead of your local computer.

Regardless of how you handle cookies, it’s best to remain on guard and clean up your cookies often.

Source from: Kaspersky

Email Client Setup: Windows 8 Phone

Step by Step Walkthrough (IMAP)

  1. Open Settings.
  2. Select Email + Accounts.
  3. Select Add an account.
  4. Select Advanced setup.
  5. Enter the following information:
    • Email address: Your full mailbox address (example: john@your-domain.com)
    • Password: Your email password
  6. Select Next.
  7. Select Internet email.
  8. Enter the following information:
    • Account name: Whatever you want (example: IMAP Email)
    • Your name: The name to display on your email.Incoming email server: imap.ipage.com
    • Account type: IMAP4 (Same as IMAP)
    • User name: Your full mailbox address (example: john@your-domain.com)
    • Password: Your mailbox password
    • Outgoing (SMTP) email server: smtp.ipage.com
  9. Select Advanced Settings.
  10. Enter the following information:
    • Outgoing Server Requires Authentication: Checked
    • Use the Same Username and Password for Sending Email: Checked
    • Require SSL for Incoming Email: Optional
    • Require SSL for Outgoing Email: Optional
  11. Select Sign-in to finish your email set-up.

Step by Step Walkthrough (POP)

Screenshots (click to enlarge)
Step 2
Step 2
Step 3
Step 3
Step 4
Step 4
Step 5
Step 5
Step 7
Step 7
Step 8.1
Step 8.1
Step 8.2
Step 8.2
Step 8.3
Step 8.3
Step 8.4
Step 8.4
Step 8.5
Step 8.5
Step 10
Step 10
 
  1. Open Settings.
  2. Select Email + Accounts.
  3. Select Add an account.
  4. Select Advanced setup.
  5. Enter the following information:
    • Email address: Your full mailbox address (example: john@your-domain.com)
    • Password: Your mailbox password
  6. Select Next.
  7. Select Internet email.
  8. Enter the following information:
    • Account name: Whatever you want (example: POP email)
    • Your name: How you want your name to appear in emails (example: John Smith)
    • Incoming email server: pop.ipage.com
    • Account type: POP3 (Same as POP)
    • User name: Your full mailbox address (example: john@your-domain.com)
    • Password: Your mailbox password
    • Outgoing (SMTP) email server: smtp.ipage.com
  9. Select Advanced Settings.
  10. Enter the following information:
    • Outgoing server requires authentication: Checked
    • Use the same username and password for sending email: Checked
    • Require SSL for incoming email: Optional
    • Require SSL for otgoing email: Optional
  11. Select Sign-in to finish your email set-up.
 
Email Client Setup: Mac OS X Mail

The manual walkthrough and default settings are listed below.

You will need your incoming mail server, outgoing mail server, full email address, and your email password.

  1. Open Mac OS X Mail.
  2. Click Mail.
  3. Click on Add Account.
    Mail, Add account
  4. Select Other Mail Account and click Continue.
    Other Mail account, Continue
  5. Fill in the following information:
    • Name: How you want your name to appear in emails (in this example: test)
    • Email Address: Your full email address (in this example: test@example.com)
    • Password: Your email password
      Add a mail account window
  6. Click Sign In.
  7. Decide if you want to use POP or IMAP. IMAP synchronizes the email on your computer with the contents of your account on the server, while POP simply downloads the inbox.
  8. Fill in the following information:
    • Account Type: POP
      Username – 
      Your full mailbox address (in this example: test@example.com)
      Incoming Mail Server – pop.ipage.com
      Outgoing Mail Server – smtp.ipage.com 
    • Account Type: IMAP
      Username – 
      Your full mailbox address (in this example: test@example.com)
      Incoming Mail Server – imap.ipage.com
      Outgoing Mail Server – smtp.ipage.com 
      Account type information
  9. Click Sign In.
  10. Choose the Mac apps you want to use with this email account.
  11. Click Done.
Still have questions?