Those Non-Design Technologies Web Designers Need to Know – Speckyboy

Those Non-Design Technologies Web Designers Need to Know – Speckyboy

We call ourselves web designers and developers. However, the job often goes beyond those narrow margins.

Freelancers and small agencies deal with a range of non-design and coding issues. We become the first person our clients contact when they have a question. It happens – even when we aren’t directly involved with the subject matter.

  • I just received this message from Google. What does it mean?
  • Why can’t I receive email from my website?
  • My website was hacked. Help!

Yes, we are the catch-all technical support representatives. No matter the problem, web designers are the solution. That’s what some clients think, at least.

We’re often the link between clients and technology. And perhaps we shouldn’t try to tackle every problem. But it wouldn’t hurt to brush up on a few non-design technologies.

With that in mind, here are a few areas that web designers should study. You know, just in case.


DNS settings. These settings ensure that the site directs users to the right place.

DNS is much more than that, though. There are also settings for configuring email as well. That has become a hot topic these days.

Email providers are increasingly requiring domain owners to verify their properties. Domains without DKIM, DMARC, or SPF records may have email delivery issues. For example, Gmail blocks email from unauthenticated domains.

What does this have to do with web design? Well, websites with contact forms can fall victim to these issues. The same goes for eCommerce websites. An unauthenticated domain means clients and users will miss these emails.

Now is the time to learn how DNS works. You’ll want to pay special attention to email. Clients without an IT department may need your help ensuring smooth email delivery.

DNS & Email Resources

Email deliverability issues can be prevented by adding domain verification records.

Security for Websites and Beyond

We live in an age of online insecurity. Malicious actors don’t take a minute off. Instead, they continue to wreak havoc.

Sure, we talk about web security quite a bit. And we try our best to build a virtual mote around websites. But websites are still being compromised.

We’re learning that security goes deeper than installing updates or tweaking .htaccess files. The fitness of a user’s device also plays a role.

Stolen session cookies are a prime example. Hackers can grab them off of a compromised device. A “bulletproof” website is no match for a phone with an info stealer installed. They can waltz right in and do whatever they want.

Understanding how device security impacts the web is crucial. It’s something that can benefit us and our clients. After all, a single weak link can break the chain.

Website Security Resources

Websites are under a constant threat from hackers.

Command Line Tools

Some of us cringe at the mere thought of using a command line tool. Hasn’t that stuff gone the way of the dinosaur?

Nothing could be further from the truth. Command line tools like WordPress CLI remain popular. Why is that? It’s all about power and efficiency.

The command line doesn’t have the overhead of a graphical user interface (GUI). Thus, it handles bulk operations faster. For example, you can perform a search-and-replace operation on a database more quickly.

You can also do a lot of behind-the-scenes work with your web server. The command line may be the only way to run specific tasks.

It’s worth brushing up on command-line operations. They are a huge time saver in the right circumstances.

Command Line Resources

Command line tools are still a popular way to perform tasks.

Become a More Well-Rounded Web Designer

The skills above are all adjacent to web design. And the need for this knowledge is growing.

Perhaps that has always been the case with SEO. Meanwhile, security and DNS seem to be just about mandatory these days.

Working with clients means you inevitably will face questions about these subjects. Freelancers and small agencies don’t always have an expert within reach. So, it’s up to us to find answers.

The command line is more about adding another tool to your toolbox. The improved efficiency will benefit you. And the result is better service for your clients.

Web designers tend to be specialists. We focus on the front-end or back-end. But the more we know, the more well-rounded we become.

It’s one way to stay on the cutting edge of the industry for years to come.

Related Topics


Top

Similar Posts

  • Good SEO Plus Lazy Marketing Won’t Cut It Anymore

    SEO is a playground for creative, scrappy problem-solvers. But today, it’s often reduced to a formula: plug keywords into an AI tool. Run a cookie-cutter checklist to create content. Build links. Hope traffic rolls in.  That used to work. But with AI-powered search on the rise, the era of SEOs as technicians is fading, and the…

  • 8 Autumn-Inspired CSS & JavaScript Effects

    Every season has a distinct vibe. People celebrate them by wearing seasonal colors and delighting in traditional flavors. Autumn appears to have taken over as a favorite time of year for many. Pumpkin spice, anyone? Yes, the fall season is being celebrated like never before – and for good reason. It’s when we embrace cooler…

  • LastPass Warns of Fake Repositories Infecting macOS with Atomic Infostealer

    Sep 20, 2025Ravie LakshmananSoftware Security / Malware LastPass is warning of an ongoing, widespread information stealer campaign targeting Apple macOS users through fake GitHub repositories that distribute malware-laced programs masquerading as legitimate tools. “In the case of LastPass, the fraudulent repositories redirected potential victims to a repository that downloads the Atomic infostealer malware,” researchers Alex…

  • How to Monitor Brand Mentions in ChatGPT

    Ask ChatGPT “What’s the best (your product category)?” right now. Does your brand come up?  If you don’t know, that’s a problem. ChatGPT influences millions of product decisions every day—and unlike Google, it gives you zero impressions data, no Search Console, and no built-in analytics. In this guide, I’ll show you how to monitor your brand…

  • Google Ties Suspected Russian Actor to CANFAIL Malware Attacks on Ukrainian Orgs

    Ravie LakshmananFeb 13, 2026Threat Intelligence / Malware A previously undocumented threat actor has been attributed to attacks targeting Ukrainian organizations with malware known as CANFAIL. Google Threat Intelligence Group (GTIG) described the hacking group as possibly affiliated with Russian intelligence services. The threat actor is assessed to have targeted defense, military, government, and energy organizations…

  • Deepfake Defense in the Age of AI

    May 13, 2025The Hacker NewsAI Security / Zero Trust The cybersecurity landscape has been dramatically reshaped by the advent of generative AI. Attackers now leverage large language models (LLMs) to impersonate trusted individuals and automate these social engineering tactics at scale. Let’s review the status of these rising attacks, what’s fueling them, and how to…