- To register visit https://www.designofstructuresonline.com
and click on "Register".
- Fill the registration form.
- After successful registration, you will be redirected to subscription purchase page,
where you can see what we are offering you.
- Click on Continue to Payment.
- Select the payment mode.
- Click on Continue to Payment and follow the instructions.
- You will receive a notification about success or failure of the transaction.
|
To change your password, you need to be logged in with the ID that you want to change.
- Click on the settings icon in the upper right corner.
- Click on the Change Password link in the next page that appears.
- Click on Change Password in pop-up menu.
- Follow the instructions to enter your current and new password.
- Click Save. You have successfully changed your password.
|
- If you forget your password, please visit the Forgot Password section.
- Enter your ID in the field provided.
- Click on Submit.
- Your password will be sent to your email address provided at the time of registration.
|
We are asking you to take this action now so that you can enjoy all that we offer
without worry. Changing your default password will assure safety of your account
from fraudulent use.
|
Please check the following:
- Is CAPS LOCK key on?
Passwords are case-sensitive, which means that "DESIGNOFSTRUCTURESONLINE" "designofstructuresonline"
and "DesignOfStructuresOnline" are three different passwords. Try typing your password
again, making sure to use uppercase and lowercase letters appropriately.
- Did you sign in with the correct ID?
Make sure that you are using the correct ID when signing in to your account.
|
You have received “You are not authorized to view this module! You may not have
appropriate access rights to view this module.” error message: There are typically
three causes of receiving this message:
- You have not purchased any subscription.
- The module or feature that you are trying to access is not part of your subscription.
- Your subscription has expired.
Please contact
Design of Structures Online for more information and solution.
|
Your browser may be preventing you from downloading the output report or 2D drawing
due to security settings. Make sure that you have added Design of Structures Online website in trusted sites
list and your browser is allowed to download files.
|
We try to generate a very accurate drawing for you. That makes the 2D drawing generation
process very critical and resource consuming. In some cases this process requires
significant amounts of time and you may have to wait to get the drawing.
|
- After successful registration, you will be redirected to subscription purchase page,
where you can see what we are offering you.
- Click on Continue to Payment.
- Select the payment mode.
- Click on Continue to Payment and follow the instructions.
- You will receive a notification about success or failure of the transaction.
|
- Clicks on the settings icon in the upper right corner.
- Click on the Subscription link in the next page that appears.
- Click on View Subscribed Bundle in pop-up menu.
|
- Clicks on the settings icon in the upper right corner.
- Click on the Subscription link in the next page that appears.
- Click on Add New Bundle in pop-up menu. you will be redirected to subscription
purchase page, where you can see what we are offering you.
- Click on Continue to Payment.
- Select the payment mode.
- Click on Continue to Payment and follow the instructions.
- You will receive a notification about success or failure of the transaction.
|
|
We recommend the following:
- Computer with 2.0Gz processor or higher.
- 1 GB RAM or higher.
- Internet connection of 512 kbps or higher.
The following operating systems:
- Windows 98, NT, 2000, XP.
The following browsers:
- Microsoft® Internet Explorer 7.XX and above.
- Mozilla Firefox 8.0 and above.
- Google Chrome 16.XX and above.
|
Yes, as long as the notebook meets the recommended system requirement.
|
We recommend that you should use:
- Microsoft® Internet Explorer 7.XX and above.
- Mozilla Firefox 8.0 and above.
- Google Chrome 16.XX and above.
|
There are two general indications of a secured web page:
- Check the web page URL
Normally, when browsing the web, the URLs (web page addresses) begin with the letters
"http". However, over a secure connection the address displayed should begin with
"https" - note the "s" at the end.
Try it! - Visit our home page (https://www.designofstructuresonline.com). Note the URL
begins with the "https" meaning the user name and password typed in will be encrypted
before sent to our server.
- Check for the "Lock" icon There is a de facto standard among web browsers to display
a "lock" icon somewhere in the window of the browser (NOT in the web page display
area!) For example, Microsoft Internet Explorer displays the lock icon in the lower-right
of the browser window:
Click (or double-click) on it in your Web Browser to see details of the site's security.
Image will be changed after acquiring security certificate for DesignOfStructuresOnline
This is important to know because some fraudulent web sites are built with a bar
at the bottom of the web page to imitate the lock icon of your browser!
|
If you encounter problems while access Design of Structures Online using Internet Explorer, you may need to upgrade your browser or update it with
the most recent fixes from Microsoft to keep it running smoothly. Keeping your browser
updated is also likely to protect your computer from known security weaknesses.
|
This is commonly known as GPF (General Protection Fault). You'll have to restart
your browser. If the problem persists, please consult your PC vendor.
|
To clear your browser cache:
- Internet Explorer
- Go to "Tools"
- Go to "Internet Options"
- Select "General"
- Click on "Delete Files" at "Temporary Internet files"
- Mozilla Firefox
- Go to "Tools"
- Go to "Clear Recent History"
- Select the time range
- Select "Cache"
- Click on "Clear Now"
- Google Chrome
- Go to "Customize and Control Google Chrome"
- Go to "Under the Hood"
- Select or click on "Clear browsing data"
- Select the time period
- Select "Empty the cache"
Click on "Clear browsing data".
|
SSL stands for "Secure Sockets Layer". It is a protocol designed to enable applications
to transmit information back and forth securely. Applications that use this protocol
inherently know how to give and receive encryption keys with other applications,
as well as how to encrypt and decrypt data sent between the two. SSL has been universally
accepted on the World Wide Web for authenticated and encrypted communication between
the customer's computer and servers. Some applications that are configured to run
SSL include web browsers like Internet Explorer and Netscape, email programs like
GroupWise, Outlook, and Outlook Express, FTP (file transfer protocol) programs,
etc. These programs are automatically able to receive SSL connections. To send an
SSL connection, however, or to open a secure connection, your application must first
have an encryption key assigned to it by a Certification Authority. Once it has
a unique key of its own, you can establish a secure connection with every other
application that can "speak" the SSL protocol.
|
40-bit and 128-bit refer to the size of the key used to encrypt information. To
use the lock and key analogy, the greater the number of keys, the more difficult
it is to find the correct key to fit into the lock that protects the information.
Therefore, the larger the size of the encryption level, the more difficult it is
to find the right key to unlock the information.
|
- Always ensure your PC is updated with latest anti-virus and operating system patches.
- Install personal firewall and anti-spy ware to protect your PC from internet attacks.
- Always change your passwords periodically say every month.
- You should report any suspicious or fraudulent e-mail/sites to us immediately.
|
Web browsers use standard security protocols like SSL, and S-HTTP to enable private
information to be transmitted safely over the Internet. When you visit a Web site
with the SSL protocol, a secure connection is created between your computer and
the Web site server you are visiting. Once this connection is established, you can
transmit any amount of information to the Web server safely. In contrast, the S-HTTP
is designed to transmit individual messages.
|
Digital certificates are issued by certification authorities to authenticate a Web
site or elements of Web sites. The certificate identifies the originator of the
site, or element, and verifies that it has not been tampered with. When your Web
browser is presented with a certificate, it will check to see if a legitimate certification
authority issued the certificate. If there is a match, your session will continue.
Otherwise, your browser will issue a warning and your safest action is to cancel
your activity.
|
If a secure session is established and the information is encrypted during transmission,
then others will not be able to view your information. However, you should be aware
that some Web browsers will store information on your computer even after you are
finished conducting your online activities, this is called caching. Therefore, you
should close your browser once you are finished using the Internet, particularly
if you visit secure sites to conduct financial transactions, check account balances
or view any other information that you regard as private and confidential.
|
This usually happens when a transaction is attempted before the Java applet is completely
loaded into your PC. To reload the applet, click on the toolbar, re-select the transaction
and wait for the loading to be completed before you proceed. If this does not help,
please try clearing the browser's cache before you log in again.
|
The slow response your are experiencing could be due to the following:
- You are not using the recommended browser, operating system and hardware.
- Your Internet Service Provider, Local Area Network or our system is facing intermittent
slowness.
|
Email sent over the Internet is generally not secure unless it is encrypted. In
reality, most email programs currently do not have this capability. To send us an
email securely, we recommend that you do so by using the secure email function provided
by some online services like Online Banking.
|
Without using additional measures such as a digital signature, it is easy for fraudsters
to imitate e-mails. But that doesn't mean you can't recognize scam e-mails. Cyber-criminals
often place alarming, enticing or exciting subjects in their e-mails with the hope
of tempting you to respond impulsively and divulge the requested information. So,
always take your time to read the e-mail carefully. In case of doubt, it is better
not to respond. If you choose to respond, always first check that the mail is genuine
by contacting the company that is the apparent sender by telephone, for instance.
|
'Phishing' refers to the practice of fraudsters 'fishing' for your details in order
to find out and misuse sensitive personal and financial information. Criminals may,
for instance, make identical copies of existing corporate websites, or send scam
e-mails to elicit a response from you and trick you into divulging your personal
information.
|
A worm is a virus that does not infect other programs. It makes copies of itself,
and infects additional computers (typically by making use of network connections)
but does not attach itself to additional programs; however a worm might alter, install,
or destroy files and programs.
Melissa:
The Melissa Worm, also known as "Mailissa", "Simpsons", "Kwyjibo", or "Kwejeebo",
is a computer worm that also functions as a macro virus, hence making it a "multipartite
virus".
Code Red:
The Code Red worm was a computer worm released via the Internet on July 13, 2001
affecting computers running Microsoft's Internet Information Server (IIS) web server.
The programmers at eEye Digital Security who reported it named it after both the
Mountain Dew soft drink and the phrase "Hacked By Chinese!" (see Red Scare) that
it propagated. The worm exploited a vulnerability in the indexing software distributed
with IIS and did several things like it defaced the affected web site to display
“HELLO! Welcome to https://www.worm.com! Hacked By Chinese!. "
|
One of the security mechanisms we use to protect our systems and your information
is called a firewall. Our firewalls use a combination of industrial strength computer
hardware and software that is designed to securely separate the Internet from our
Internal Web servers, computer systems, networks and databases. During your secure
online sessions, firewalls prevent unauthorized Internet traffic from entering our
Web servers, systems and network.
|
One Time Password (OTP) has been introduced as an additional security feature by
Design of Structures Online to protect your account from online fraud. OTP is a eight digit code sent to users
on mobile and e-mail ID registered with us. OTP will be sent to you only when the
system suspects unusual activity or change in your access pattern and you will be
asked to enter the OTP when you log in next.
OTP is confidential and should not be shared with anyone, even if the person claims
to be a Design of Structures Online official.
Please ensure that your mobile number and your email ID is updated with us.
|
Besides your User ID and login password, you are required to enter a One Time Password
in case our system suspects unusual activity/behavior on your account.
|
If we observe a change in your access parameters, you will be asked to enter OTP
to access your Design of Structures Online account. OTP is confidential and should not be shared with anyone, even if the person
claims to be a Design of Structures Online official.
|
If we observe a change in your access parameters, you will be asked to enter OTP
to access your account. Every such login will generate a new OTP. You will have
to enter this new OTP to access your account.
|
OTP is an additional security measure adopted by us to protect your account from
online fraud. You are required to authenticate your login by entering OTP when we
observe a change in your access parameters.
OTP is a eight digit code sent to users on mobile and e-mail ID registered with
us. If you do not receive the OTP, you can request us to send it again by clicking
on re-send link besides the OTP field.
|
If you have tried to login multiple times, multiple OTP will be generated. Every
new login will generate a new OTP. You will have to enter the new OTP to access
your account.
|
No. OTP is valid for one login session. OTP is a dynamic password and is valid for
the current session only.
|