Find out what it's all about

See for yourself.

or call

Calls charged at standard local rate.

Support How can we help you?

Ask a question, and we'll try and give you an instant answer.

Ask a question above or select a section to the left

TechnicalMost popular FAQs

A

The home location register (HLR) is a central database that contains details of each mobile phone subscriber that is authorized to use the GSM core network. There can be several logical, and physical, HLRs per public land mobile network (PLMN), though one international mobile subscriber identity (IMSI)/MSISDN pair can be associated with only one logical HLR (which can span several physical nodes) at a time.

The HLRs store details of every SIM card issued by the mobile phone operator. Each SIM has a unique identifier called an IMSI which is the primary key to each HLR record.

Another important item of data associated with the SIM are the MSISDNs, which are the telephone numbers used by mobile phones to make and receive calls. The primary MSISDN is the number used for making and receiving voice calls and SMS, but it is possible for a SIM to have other secondary MSISDNs associated with it for fax and data calls. Each MSISDN is also a primary key to the HLR record. The HLR data is stored for as long as a subscriber remains with the mobile phone operator.

A

A home location register (HLR) is an integral part of all GSM network architecture. The HLR allows third parties to query whether a subscriber is registered on the network and also information such as their endpoint or whereabouts.

This information allows third parties to set up calls or messaging to that party without using the host networks infrastructure (eg, in the case of SMS messaging, without using the destination networks' SMSC).

A

With the rise of the social internet and the ubiquity of e-commerce, spammers and phishers have a tremendous financial incentive to compromise user accounts, enabling theft of passwords, bank accounts, credit cards, and more. Email is easy to spoof and criminals have found spoofing to be a proven way to exploit user trust of well-known brands. Simply inserting the logo of a well known brand into an email gives it instant legitimacy with many users.

Users can't tell a real message from a fake one, and large mailbox providers have to make very difficult (and frequently incorrect) choices about which messages to deliver and which ones might harm users. Senders remain largely unaware of problems with their authentication practices because there's no scalable way for them to indicate they want feedback and where it should be sent. Those attempting new SPF and DKIM deployment proceed very slowly and cautiously because the lack of feedback also means they have no good way to monitor progress and debug problems.

DMARC addresses these issues, helping email senders and receivers work together to better secure emails, protecting users and brands from painfully costly abuse.

A

You can import your contacts by either uploading a .CSV file or simply copying and pasting from a spreadsheet.

A tutorial video has been made to help show you how to add your contacts -

A

A web server is a number of large computers, known as servers, housed in an air-conditioned server house known as a data centre where they are connected to a highly efficient, fault-tolerance high-speed internet connection.
Web servers are able to handle hundreds of thousands of requests a second and can return back this information quickly, providing the visitor of a website with the information they were looking for in no time at all.
It is big business to keep servers online – this is called uptime and it is the measurement of how long as server is online and functional for during the period of a month, or year. A lot of hosting companies boast their servers have 99.9% uptime, which means 99.9% of the time (per month) their servers are online and functional, meaning all websites hosted on their servers will be working.
There are many different types of web server available, such as dedicated servers, load balancing servers, database servers and many more. If you’re just starting out on the web and need the basic type of web server, look out for fully managed shared hosting, which means the hosting company maintains the server you’re on, along with the other people that share it. Its often the cheapest solution if you’re a beginner.

Technical FAQs

What is DKIM?

 

A

Domain Keys Identified Mail (DKIM) is a technology designed to make it difficult or impossible for criminals to steal the identities of legitimate organizations. This authentication technology allows good senders to "sign" a message to prove that it really did come from them.

DKIM works on the basis of the domain name, that is, the part of an email address after the "@" sign. For most normal email this is "good enough" — for example, I might need to know if a message really comes from my bank (the domain), but it is less important exactly who at the bank sent it (the part before the "@" sign). Partially because of this, most companies will probably decide to use DKIM on their main mail servers; users won't have to make any changes at all in order to get the benefits of DKIM.

DKIM is an IETF Draft Standard, and it is free (any company can use it without paying), easy to use (the software needed for DKIM is relatively simple, requiring no new network services), and compatible with most vendor’s email technology.

Submit Support Ticket

Fill out your details below >>

 
Name
E-Mail
Department
Subject
Your Question

Thank you. Your ticket has been sent.

We will attempt to answer your question as soon as possible.