It is very important to keep your web browser updated (Safari, Google Chrome, Mozilla Firefox, ...)
When you are using the app, deactivate the extensions or plugins that you have installed because they can interfere in the operation of some options (popup windows, appearance, calendars, etc.)
** In case of using Google Chrome, you may experience some kind of problem such as annoying toolbars, changes to the homepage, or ads that can not be closed.
These issues are easily solved with a Google tool, called "Chrome cleaner".Click here
Your browser has a folder in which certain items that have been downloaded are stored for future use. Graphic images (such as buttons and icons), photo's, and even entire web pages are examples of items which are saved or cached. When visiting a webpage your browser checks if a copy of the files on the page is in its cache already. If so, it will save the visitor some downloading and make webpages load faster. Some browsers refer to it's cach as Temporary Internet Files.
There are some situations when bypassing your browser's cache is prefered. Just clicking the refresh button (or hitting F5) won't be sufficient in this case, because this reloads the webpage while still using the old files from the cache. You need to refresh your cache first!
Click on the orange Firefox button in the top left corner
Move the mouse to Options and click on Options in the submenu.
Click on Advanced
Click on the Network tab
Click on Clear Now in the Cached Web Content section.
Click on the three dashes in the top right corner.
Click on settings in the menu.
Click on History in the menu on the left.
Click on Clear browsing data...
Select Empty the cache from the list.
Click on Clear browsing data on the bottom. Your browser cache is now empty.
WINDOWS: FORCE REFRESH CHROME: Uusally a "force refresh" is enough. You can achieve this by pressing the following key combination: Shift + Ctrl + F5
First click on Safari and then click on Empty cache...
Click on the Empty button
Click on the refresh icon
iOs: FORCE REFRESH SAFARI: Usually a "force refresh" is enough. You can force refresh your browser by using the following key combination: On Apple: CMD + R
Haz clic en Herramientas.
Elije Limpiar historial reciente.
Cuando se te pregunte la hora y el rango para limpiar, selecciona todo, desde el menú desplegable.
Marca caché (desmarca cualquier cosa que no deseas eliminar).
Selecciona Limpiar Ahora.
Pulsa en el icono de llave inglesa en la parte superior derecha de tu navegador.
Selecciona Opciones (en Mac, selecciona Preferencias) y haz clic en el en la pestaña Avanzadas (under the hood).
Haz clic en Eliminar datos de navegación y luego desmarca todo, excepto Vaciar la memoria caché.
Cuando se te pregunte para "Eliminar de los siguientes elementos" elije "el principio del tiempo."
Haz clic en Eliminar datos de navegación.
Clic en Ctrl+Alt+E
Clic en Vaciar.
Haz clic en Safari en la parte superior izquierda de la pantalla.
Haz clic en Vaciar caché.
Haz clic en Vaciar.
It is possible that with some browser update, these options are now in another place, you just have to search in any search engine (for example Google) how to clear the cache in your web browser.
It is necessary that in your browser you allow the opening of pop-up windows, since the software uses them, for example to print the documents. Be sure to do it in your web browser:
In Firefox:Menu > Preferences > Uncheck the option Block pop-up.
In Safari: Preferences> Security> Uncheck the option Block pop-up windows
In Chrome: Settings > Advanced > Privacy and security > pop-ups and redirects > Allowed
It is possible that with some browser update, these options are now in another place, you just have to search in any search engine (for example Google) how to allow popups in your web browser.
It can happen that a customer does not receive an email that you send from the software. This may be because:
The customer's email address is misspelled or incomplete
The customer's email address does not exists
The customer's email box is full
Your email manager has marked the email as spam (or spam), promotions, etc.
In this case, the email will not be in the inbox, but in the folder Spam / promotions / etc. (and even if the customer has configured in his mail manager that those folders are automatically emptied, he may not see the email either in those folders because it has already been deleted)
In the first 3 cases, you can not do anything to avoid it. If the client does not enter a correct address or his mailbox is full, inevitably, that email will not reach its recipient. (Whether you send it from the software, or if you send it directly from your email manager).
note: when you add a client's email address in the software, check that it is complete and without errors
In the 4th case, to prevent an email manager from marking as Spam / Promotions, etc. emails that arrive from an email address, there is a very simple solution: add that address to your contacts.
For example, if you add the address of your friend Juan to your contacts, the email manager will interpret all the emails you receive from Juan, as desired messages and store them in your inbox.
However, it is very possible that you identify as spam or spam, the emails you receive from unknown users, especially if you send them an automatic system (like our online reservation confirmation system).
In order for your clients to always receive the emails that you send them from the software , they are recommended to add to their contact list, the email: firstname.lastname@example.org
It is recommended that you also add our addresses to your contacts, so that you receive all our emails and notifications: email@example.com and firstname.lastname@example.org
note: This recommendation is very useful, even for the emails you send directly from your email manager (not from the software) . If a user adds your email address to your contacts, the emails you send will appear in your inbox.
We remind you that you should change your passwords frequently for security reasons.
Here we provide you information and tips about passwords, its security and strength. You may apply these recommendations to your Gespet login password:
1. For a secure password, you must use:
Numbers, letters and combine uppercase and lowercase.
The length must not be less than 8 characters. the longer the harder to guess.
It should not be formed with numbers and letters that are adjacent in the keyboard. (Examples of bad passwords are: 123456, 1q2w3e or 123QWEasd).
The password should not contain information that is easy to find our or personal information (birthdays, children's names, etc.).
It should not contain existing words in any language. Dictionary attacks test each of the words in the dictionary and commonly used words (combine several, do not use only one)
2. Good practices
Logout should always be done securely by clicking on the "Exit", "log out" or similar. Never close the browser without making the secure logout of the session or use the "never close session", "keep an open session" or similar.
If other people work in your business, we recommend that you configure a different user for each user, assign only the permissions that you consider necessary and limits the time zone of access to the system.
Use strong passwords: minimum 8 characters and use numbers, letters and special characters
Do not use the same password for all your accounts
Do not use passwords that can be easily discovered: date of birth, family name, etc.
Memorize your password, do not write on a computer file or paper; if so, you must protect it. Under no circumstances leave it to view the password or provide it to others.
Change your password periodically and do not use a password you already used previously
Never use options "remember password" of the browser, especially on laptops and mobile devices (in case of device loss, someone might access to your accounts and get your private information)
We use artificial intelligence systems to control access to detect inappropriate access to the application blocking suspiciously looking IPs, the main security protocols (SSL, TLS, HTTPS, SSH, SCP, SFTP); As well as a strong password control policy. 8 characters minimum interspersed with lowercase letters, capital letters and numbers.
And if the user decides to change the password we control that they can not put one they already used. (Same as Google)