Posts Tagged ‘google-mail’

A Look at Thunderbird’s Not so Distant Future

Thursday, July 26th, 2012

I think this was pretty much inevitable; the email client market is jam packed with competition and the browser market is obviously more profitable …

Mozilla’s de-prioritization of Thunderbird was a shock to many of the clients active users who feared that development would come to a complete halt in the near future. While that is apparently not the case, Thunderbird users are still in for a few surprises and changes when it comes to future development of the client.


Which Email Provider Offers the Best Spam Protection? Study Suggests Hotmail

Tuesday, February 14th, 2012

For a free email client, Hotmail does do a pretty good job of filtering out the spam …

Spam is one of those things that you never can get rid of completely, it seems. Email providers like Hotmail, Google Mail or Yahoo Mail are battling on the spam front ever since they opened their door for the first users. And while they managed to cut down significantly on spam in past years, there is still work to be done in that compartment. Providers are currently working together to eliminate most of the spam once and for all. Until then though, users will receive spam fairly regularly in their inboxes.


Gmail Adds Detailed Sender Information to Improve Security

Thursday, June 30th, 2011

This will definitely help; I’m surprised it took so long …

When I was working in tech support for a large German financial corporation I regularly had to deal with support requests by customers who received phishing emails. It took a lot to convince the majority of customers that those phishing emails were not sent by the company, but by criminals. Especially fake email addresses were a problem, as many could not understand that it was possible to fake the email sender.


Google Mail – How to Fix Gmail Attachment Failed Errors

Monday, May 2nd, 2011

Here’s an interesting assortment of tricks to get around Gmail attachment errors …

Gmail, like any other modern email service, supports file attachments that are then send with the email to the recipient of the email. File attachments need to be uploaded and match certain criteria before they are attached, or added, to the email. It is for instance not possible to send executables directly via Gmail.


Google Mail – Manual Option to Add Contacts

Thursday, April 7th, 2011

This sounds helpful; personally, I like to keep my contact lists streamlined rather than bloated with a bunch of names that I don’t recognize.

I have more than 1000 contacts in Google Mail, all people that I know and hold dear. Just kidding. Everyone, and I mean everyone, who send you an email in the past was automatically added to your contacts, as was everyone that you send an email to. That was not really comfortable considering that spammers and god knows who were added to the list of your contacts without your doing. Most email programs only add contacts to your address book if you write a message, or add the contact manually.


Google webMail Filer for Thunderbird

Friday, January 7th, 2011

This sounds like it could come in handy …

Lets say you have used the Mozilla Thunderbird client for some time and have decided to move to the cloud, more precisely to Gmail or Google Mail. Question is, how do you get your emails and the folder structure over to Gmail? Sure you could do that manually; Create the folders over at Gmail and forward each and every of your emails to your Google email address. But that’s not very practicable if the mail count exceeds a few dozen. What if you have thousands of emails neatly sorted in folders?


Gmail Security Checklist, Improve Login Security

Friday, October 8th, 2010

Most of the items on this list will look pretty familiar to most of us, but they’re still worth repeating from time to time …

There are two to tango, and the same is true for an effective online security strategy. What does it mean? On the one side, the company offering a service needs to make sure that user accounts are protected on their servers, that no one can exploit vulnerabilities to gain login information or other data from users of the service. On the other side, is the user and the local computer the service is accessed from. The user too has responsibilities like making sure the computer is running up to date software.