Ask a question, and we'll try and give you an instant answer.
Ask a question above or select a section to the left
TechnicalMost popular FAQs
A
The home location register (HLR) is a central database that contains details of each mobile phone subscriber that is authorized to use the GSM core network. There can be several logical, and physical, HLRs per public land mobile network (PLMN), though one international mobile subscriber identity (IMSI)/MSISDN pair can be associated with only one logical HLR (which can span several physical nodes) at a time.
The HLRs store details of every SIM card issued by the mobile phone operator. Each SIM has a unique identifier called an IMSI which is the primary key to each HLR record.
Another important item of data associated with the SIM are the MSISDNs, which are the telephone numbers used by mobile phones to make and receive calls. The primary MSISDN is the number used for making and receiving voice calls and SMS, but it is possible for a SIM to have other secondary MSISDNs associated with it for fax and data calls. Each MSISDN is also a primary key to the HLR record. The HLR data is stored for as long as a subscriber remains with the mobile phone operator.
A
A home location register (HLR) is an integral part of all GSM network architecture. The HLR allows third parties to query whether a subscriber is registered on the network and also information such as their endpoint or whereabouts.
This information allows third parties to set up calls or messaging to that party without using the host networks infrastructure (eg, in the case of SMS messaging, without using the destination networks' SMSC).
A
With the rise of the social internet and the ubiquity of e-commerce, spammers and phishers have a tremendous financial incentive to compromise user accounts, enabling theft of passwords, bank accounts, credit cards, and more. Email is easy to spoof and criminals have found spoofing to be a proven way to exploit user trust of well-known brands. Simply inserting the logo of a well known brand into an email gives it instant legitimacy with many users.
Users can't tell a real message from a fake one, and large mailbox providers have to make very difficult (and frequently incorrect) choices about which messages to deliver and which ones might harm users. Senders remain largely unaware of problems with their authentication practices because there's no scalable way for them to indicate they want feedback and where it should be sent. Those attempting new SPF and DKIM deployment proceed very slowly and cautiously because the lack of feedback also means they have no good way to monitor progress and debug problems.
DMARC addresses these issues, helping email senders and receivers work together to better secure emails, protecting users and brands from painfully costly abuse.
A
You can import your contacts by either uploading a .CSV file or simply copying and pasting from a spreadsheet. A web server is a number of large computers, known as servers, housed in an air-conditioned server house known as a data centre where they are connected to a highly efficient, fault-tolerance high-speed internet connection.
A tutorial video has been made to help show you how to add your contacts -
A
Web servers are able to handle hundreds of thousands of requests a second and can return back this information quickly, providing the visitor of a website with the information they were looking for in no time at all.
It is big business to keep servers online – this is called uptime and it is the measurement of how long as server is online and functional for during the period of a month, or year. A lot of hosting companies boast their servers have 99.9% uptime, which means 99.9% of the time (per month) their servers are online and functional, meaning all websites hosted on their servers will be working.
There are many different types of web server available, such as dedicated servers, load balancing servers, database servers and many more. If you’re just starting out on the web and need the basic type of web server, look out for fully managed shared hosting, which means the hosting company maintains the server you’re on, along with the other people that share it. Its often the cheapest solution if you’re a beginner.
Technical FAQs
DKIM: What is it, and why do we need it?
A
Electronic mail on the Internet has the unfortunate property of being easy to spoof — that is, anyone can send mail that pretends to be from someone else. This is a characteristic of the SMTP network protocol, itself. In the early days this wasn't a problem; in fact, it was quite useful, for a lot of reasons that I won't bore you with.
But things are different today. Phishing and spam are poxes on the Internet that vary from the "merely" annoying to the outright criminal. Many of the perpetrators of these scams attempt to hide their identity, either just to hide or with the intent to pretend to be a legitimate party. This is especially common with phishing, where the criminals will pretend to be banks or retailers in an attempt to trick you, the victim, into giving up information about yourself that can be used to clean out your account.
The Internet needs a way to fight this crime.
Submit Support Ticket
Fill out your details below >>
Thank you. Your ticket has been sent.
We will attempt to answer your question as soon as possible.
What is HLR?
Why is DMARC Important?
How do I important my contacts?
What is a web server?
What is HTML?
How Does DMARC Work?
How does DKIM work?
What is an API?
DKIM: What is it, and why do we need it?
What is DKIM?
DMARC - What is it?
How do I reset my password?
DKIM: What are the benefits?
What is SPF (Sender Policy Framework)
What is DomainKeys?
The SPF Relationship with DKIM
Can I update my account settings?