It is very important to keep your web browser updated (Safari, Google Chrome, Mozilla Firefox, ...)
When you are using the app, deactivate the extensions or plugins that you have installed because they can interfere in the operation of some options (popup windows, appearance, calendars, etc.)
** In case of using Google Chrome, you may experience some kind of problem such as annoying toolbars, changes to the homepage, or ads that can not be closed.
These issues are easily solved with a Google tool, called "Chrome cleaner".Click here
Your browser has a folder in which certain items that have been downloaded are stored for future use. Graphic images (such as buttons and icons), photo's, and even entire web pages are examples of items which are saved or cached. When visiting a webpage your browser checks if a copy of the files on the page is in its cache already. If so, it will save the visitor some downloading and make webpages load faster. Some browsers refer to it's cach as Temporary Internet Files.
There are some situations when bypassing your browser's cache is prefered. Just clicking the refresh button (or hitting F5) won't be sufficient in this case, because this reloads the webpage while still using the old files from the cache. You need to refresh your cache first!>> Chrome: how to clear cookies and cache
It is necessary that in your browser you allow the opening of pop-up windows, since the software uses them, for example to print the documents. Be sure to do it in your web browser:
In Firefox:Menu > Preferences > Uncheck the option Block pop-up.
In Safari: Preferences> Security> Uncheck the option Block pop-up windows
In Chrome: Settings > Advanced > Privacy and security > pop-ups and redirects > Allowed
It is possible that with some browser update, these options are now in another place, you just have to search in any search engine (for example Google) how to allow popups in your web browser.
It can happen that a customer does not receive an email that you send from the software. This may be because:
The customer's email address is misspelled or incomplete
The customer's email address does not exists
The customer's email box is full
Your email manager has marked the email as spam (or spam), promotions, etc.
In this case, the email will not be in the inbox, but in the folder Spam / promotions / etc. (and even if the customer has configured in his mail manager that those folders are automatically emptied, he may not see the email either in those folders because it has already been deleted)
In the first 3 cases, you can not do anything to avoid it. If the client does not enter a correct address or his mailbox is full, inevitably, that email will not reach its recipient. (Whether you send it from the software, or if you send it directly from your email manager).
note: when you add a client's email address in the software, check that it is complete and without errors
In the 4th case, to prevent an email manager from marking as Spam / Promotions, etc. emails that arrive from an email address, there is a very simple solution: add that address to your contacts.
For example, if you add the address of your friend Juan to your contacts, the email manager will interpret all the emails you receive from Juan, as desired messages and store them in your inbox.
However, it is very possible that you identify as spam or spam, the emails you receive from unknown users, especially if you send them an automatic system (like our online reservation confirmation system).
In order for your clients to always receive the emails that you send them from the software , they are recommended to add to their contact list, the email: firstname.lastname@example.org
It is recommended that you also add our addresses to your contacts, so that you receive all our emails and notifications: email@example.com and firstname.lastname@example.org
note: This recommendation is very useful, even for the emails you send directly from your email manager (not from the software) . If a user adds your email address to your contacts, the emails you send will appear in your inbox.
We remind you that you should change your passwords frequently for security reasons.
Here we provide you information and tips about passwords, its security and strength. You may apply these recommendations to your Gespet login password:
1. For a secure password, you must use:
Numbers, letters and combine uppercase and lowercase.
The length must not be less than 8 characters. the longer the harder to guess.
It should not be formed with numbers and letters that are adjacent in the keyboard. (Examples of bad passwords are: 123456, 1q2w3e or 123QWEasd).
The password should not contain information that is easy to find our or personal information (birthdays, children's names, etc.).
It should not contain existing words in any language. Dictionary attacks test each of the words in the dictionary and commonly used words (combine several, do not use only one)
2. Good practices
Logout should always be done securely by clicking on the "Exit", "log out" or similar. Never close the browser without making the secure logout of the session or use the "never close session", "keep an open session" or similar.
If other people work in your business, we recommend that you configure a different user for each user, assign only the permissions that you consider necessary and limits the time zone of access to the system.
Use strong passwords: minimum 8 characters and use numbers, letters and special characters
Do not use the same password for all your accounts
Do not use passwords that can be easily discovered: date of birth, family name, etc.
Memorize your password, do not write on a computer file or paper; if so, you must protect it. Under no circumstances leave it to view the password or provide it to others.
Change your password periodically and do not use a password you already used previously
Never use options "remember password" of the browser, especially on laptops and mobile devices (in case of device loss, someone might access to your accounts and get your private information)
We use artificial intelligence systems to control access to detect inappropriate access to the application blocking suspiciously looking IPs, the main security protocols (SSL, TLS, HTTPS, SSH, SCP, SFTP); As well as a strong password control policy. 8 characters minimum interspersed with lowercase letters, capital letters and numbers.
And if the user decides to change the password we control that they can not put one they already used. (Same as Google)