To use DSPBR Online, all you need is a basic computer with minimum 500MHz processor, 64 MB RAM or higher and an internet connection of 28.8 kbps or higher. You desktop should have commonly used operating system like Windows 98, NT, 2000, XP and browser like Microsoft® Internet Explorer 6.XX and above.
You can also use a laptop as long as it meets the recommended system requirement.
While our website is compatible with all common browsers Internet explorer, NetScape, Mozilla Firefox, Chrome etc, the site is best viewed with Internet Explorer Version 6 and above with a screen resolution of 1024 x 768.
There are two general indications of a secured web page:
Normally, when browsing the web, the URLs (web page addresses) begin with the letters "http". However, over a secure connection the address displayed should begin with "https" - note the "s" at the end.
Visit our website www.dspblackrock.com. Note the URL begins with the "http" meaning this page is not secure for online.
Now, click the link "Log in". Notice the change in the URL? It now begins with "https", meaning the user name and password typed in will be encrypted before sent to our server.
There is standard among web browsers to display a "lock" icon somewhere in the window of the browser (NOT in the web page display area!).
For example, Microsoft Internet Explorer displays the lock icon in the lower-right of the browser window. Refer the image below.
Click (or double-click) on it in your Web Browser to see details of the site's security especially the following:
This is important to know because some fraudulent web sites are built with a bar at the bottom of the web page to imitate the lock icon of your browser!
If you encounter problems while accessing DSPBR Online Services using Internet Explorer, you may need to upgrade your browser or update it with the most recent fixes from Microsoft to keep it running smoothly. Keeping your browser updated is also likely to protect your computer better as the latest fixes and patches will also address known security weaknesses.
This is commonly known as GPF (General Protection Fault). You'll have to restart your browser. If the problem persists, please consult your desktop vendor.
To clear your browser cache:
SSL stands for "Secure Sockets Layer". It is a protocol designed to enable applications to transmit information back and forth securely. Applications that use this protocol inherently know how to give and receive encryption keys with other applications, as well as how to encrypt and decrypt data sent between the two. SSL has been universally accepted on the World Wide Web for authenticated and encrypted communication between the customer's computer and servers.
Some applications that are configured to run SSL include web browsers like Internet Explorer and Netscape, email programs like GroupWise, Outlook, and Outlook Express, FTP (file transfer protocol) programs, etc. These programs are automatically able to receive SSL connections.
To send an SSL connection, however, or to open a secure connection, your application must first have an encryption key assigned to it by a Certification Authority. Once it has a unique key of its own, you can establish a secure connection with every other application that can "speak" the SSL protocol.
40-bit and 128-bit refer to the size of the key used to encrypt information. To use the lock and key analogy, the greater the number of keys, the more difficult it is to find the correct key to fit into the lock that protects the information. Therefore, the larger the size of the encryption level, the more difficult it is to find the right key to unlock the information.
As an investor, you should
Web browsers use standard security protocols like SSL, and S-HTTP to enable private information to be transmitted safely over the Internet. When you visit a Web site with the SSL protocol, a secure connection is created between your computer and the Web site server you are visiting. Once this connection is established, you can transmit information to the Web server safely. S-HTTP is designed to transmit individual messages.
Digital certificates are issued by certification authorities to authenticate a Web site or elements of Web sites. The certificate identifies the originator of the site, or element, and verifies that it has not been tampered with. When your Web browser is presented with a certificate, it will check to see if a legitimate certification authority issued the certificate. If there is a match, your session will continue. Otherwise, your browser will issue a warning and your safest action is to cancel your activity.
One of the security mechanisms we use to protect our systems and your information is called a firewall. Our firewalls use a combination of industrial strength computer hardware and software that is designed to securely separate the Internet from our Internal Web servers, computer systems, networks and databases. During your secure online sessions with RBC Web sites, firewalls prevent unauthorized Internet traffic from entering our Web servers, systems and network.
If a secure session is established and the information is encrypted during transmission, then others will not be able to view your information. However, you should be aware that some Web browsers will store information on your computer even after you are finished conducting your online activities, this is called caching.
Therefore, you should close your browser once you are finished using the Internet, particularly if you visit secure sites to conduct financial transactions, check account balances or view any other information that you regard as private and confidential.
This usually happens when a transaction is attempted before the Java applet is completely loaded into your computer. To reload the applet, click on the toolbar, re-select the transaction and wait for the loading to be completed before you proceed. If this does not help, please try clearing the browser's cache before you log in again.
The slow response are experiencing could be due to the following:
Email sent over the Internet is generally not secure unless it is encrypted. In reality, most email programs currently do not have this capability.
A worm is a virus that does not infect other programs. It makes copies of itself, and infects additional computers (typically by making use of network connections) but does not attach itself to additional programs; however a worm might alter, install, or destroy files and programs. Commonly know worms are Melissa Worm that also functions as a macro virus, hence making it a "multipartite virus" and Code Red worm.