Support

Support levels

TrustPort Basic, free, for all customers

  • Updates via the internet
  • E-mail hot-line, Mon-Fri 8.00-16.00 CET
  • Helpdesk system

TrustPort VIP, prepaid, for business customers

  • Basic support included
  • Optional additional services
Support

 

Before you decide to contact support, we recommend that you try to find the information needed in the Technical FAQ and Sales FAQ.


Sales support:
sales@trustport.com

Technical support: support@trustport.com

Other queries:
info@trustport.com

Tel.: +420 541 244 471
Fax: +420 541 235 038

Postal address:

TrustPort a. s.
Purkyňova 2845/101
612 00 Brno, Czech Republic

Glossary

  • Asymmetric cryptography Asymmetric cryptography is used to encrypt data and also to create electronic signatures. During the coding process, different parts of the encryption key are used for the encryption of data, whilst...
  • Authentication Authentication is a process in which a confirmation is obtained about the identity of the person or about the integrity of the information....
  • Botnet Botnet is a term for a collection of software robots, or bots, that run autonomously and automatically. A botnet's originator (aka "bot herder") can control the group remotely, usually through a means...
  • Certificate revocation list Certificate revocation list (CRL) is a database of invalid certificates. Before using a particular certificate, the relying party must firstly verify that the certificate is not on this list....
  • Certification authority A certificate authority or certification authority (CA) is an entity that issues digital certificates for use by other parties. It is an example of a trusted third party. Certification authorities are...
  • Computer worm A computer worm is a self-replicating computer program. It uses a network to send copies of itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike a...
  • Dialer Dialer is a malicious program that changes Internet access via a modem. It diverts dial numbers to lines with excessively high rates. Users usually only discover this once they receive a phone bill...
  • Electronic signature Electronic signature is a transformation of the original message with the help of cryptographic methods, ensuring the integrity of the message and authentication of the signee. For some purposes an...
  • Grayware If an application is classified as annoying or behaves in annoying or undesirable fashion yet isn’t considered to be as dangerous, serious, or troublesome as malware, it is called grayware or...
  • Keylogger Keystroke logging (often called keylogging) is the practice of noting (or logging) the keys struck on a keyboard, typically in a covert manner so that the person using the keyboard is unaware that...
  • Parental lock Parental lock or parent lock is a function built into computer software which prevents children from browsing the internet and viewing inappropriate websites....
  • Pharming Pharming is a hacker's attack aiming to redirect a website's traffic to another bogus website. Pharming can be conducted either by changing the hosts file on a victim’s computer or by exploitation of...
  • Phishing In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details by masquerading as...
  • Private key Private key is the secret part of a pair of asymmetric keys. It is used to create digital signatures....
  • Public key Public key is the public part of a pair of asymmetric keys used for verifying signatures that were created with the corresponding private key....
  • Public key certificate Public key certificate is a data report that was issued by the provider of certification services, which combines the data for verification of electronic signatures to the signatory, and which also...
  • Rootkit A rootkit is a software system that consists of a program or combination of several programs designed to hide or obscure the fact that a system has been compromised. Contrary to what its name may...
  • Spam Spam is the abuse of electronic messaging systems to send unsolicited bulk messages indiscriminately. The most widely recognized form of spam is e-mail spam. E-mail spam, known as unsolicited bulk...
  • Spyware Spyware is computer software that is installed surreptitiously on a personal computer to collect information about a user, their computer or browsing habits without the user's informed consent. While...
  • Symmetric cryptography Symmetric cryptography is a method of data encryption, which uses the same key for coding and decoding messages and also uses encryption algorithms such as 3DES, AEC, BlowFish, and RC4. The advantage...
  • Timestamp authority Timestamp authority is a service which allows the demonstration that at certain time, a particular digital document existed, and that it was electronically signed at that time. The aim of this service...
  • Trojan A trojan, short for Trojan horse, in the context of computing and software, describes a class of computer threats (malware) that appears to perform a desirable function but in fact performs...
  • Virus A computer virus is a computer program that can copy itself and infect a computer without the permission or knowledge of the owner. For its multiplication it infects other executable files or...