It is very important to keep your web browser updated (Safari, Google Chrome, Mozilla Firefox, ...)
When you are using the app, deactivate the extensions or plugins that you have installed because they can interfere in the operation of some options (popup windows, appearance, calendars, etc.)
** In case of using Google Chrome, you may experience some kind of problem such as annoying toolbars, changes to the homepage, or ads that can not be closed.
These issues are easily solved with a Google tool, called "Chrome cleaner".Click here
Your browser has a folder in which certain items that have been downloaded are stored for future use. Graphic images (such as buttons and icons), photo's, and even entire web pages are examples of items which are saved or cached. When visiting a webpage your browser checks if a copy of the files on the page is in its cache already. If so, it will save the visitor some downloading and make webpages load faster. Some browsers refer to it's cach as Temporary Internet Files.
There are some situations when bypassing your browser's cache is prefered. Just clicking the refresh button (or hitting F5) won't be sufficient in this case, because this reloads the webpage while still using the old files from the cache. You need to refresh your cache first!
Click on the orange Firefox button in the top left corner
Move the mouse to Options and click on Options in the submenu.
Click on Advanced
Click on the Network tab
Click on Clear Now in the Cached Web Content section.
Click on the three dashes in the top right corner.
Click on settings in the menu.
Click on History in the menu on the left.
Click on Clear browsing data...
Select Empty the cache from the list.
Click on Clear browsing data on the bottom. Your browser cache is now empty.
WINDOWS: FORCE REFRESH CHROME: Uusally a "force refresh" is enough. You can achieve this by pressing the following key combination: Shift + Ctrl + F5
First click on Safari and then click on Empty cache...
Click on the Empty button
Click on the refresh icon
iOs: FORCE REFRESH SAFARI: Usually a "force refresh" is enough. You can force refresh your browser by using the following key combination: On Apple: CMD + R
We remind you that you should change your passwords frequently for security reasons.
Here we provide you information and tips about passwords, its security and strength. You may apply these recommendations to your Gespet login password:
1. For a secure password, you must use:
Numbers, letters and combine uppercase and lowercase.
The length must not be less than 8 characters. the longer the harder to guess.
It should not be formed with numbers and letters that are adjacent in the keyboard. (Examples of bad passwords are: 123456, 1q2w3e or 123QWEasd).
The password should not contain information that is easy to find our or personal information (birthdays, children's names, etc.).
It should not contain existing words in any language. Dictionary attacks test each of the words in the dictionary and commonly used words (combine several, do not use only one)
2. Good practices
Logout should always be done securely by clicking on the "Exit", "log out" or similar. Never close the browser without making the secure logout of the session or use the "never close session", "keep an open session" or similar.
If other people work in your business, we recommend that you configure a different user for each user, assign only the permissions that you consider necessary and limits the time zone of access to the system.
Use strong passwords: minimum 8 characters and use numbers, letters and special characters
Do not use the same password for all your accounts
Do not use passwords that can be easily discovered: date of birth, family name, etc.
Memorize your password, do not write on a computer file or paper; if so, you must protect it. Under no circumstances leave it to view the password or provide it to others.
Change your password periodically and do not use a password you already used previously
Never use options "remember password" of the browser, especially on laptops and mobile devices (in case of device loss, someone might access to your accounts and get your private information)
We use artificial intelligence systems to control access to detect inappropriate access to the application blocking suspiciously looking IPs, the main security protocols (SSL, TLS, HTTPS, SSH, SCP, SFTP); As well as a strong password control policy. 8 characters minimum interspersed with lowercase letters, capital letters and numbers.
And if the user decides to change the password we control that they can not put one they already used. (Same as Google)