Skip to main content

Posts

Showing posts from January, 2022

Manually reclaiming storage space in Gmail

Our email addresses are the cornerstones of our digital life. We not just use it to send and receive emails but also use them as usernames to sign into various other apps and websites. All these cause us to receive different types of emails - ranging from personal correspondences with friends and family that we hold important to unsolicited spam messages. Over time, this accumulation eats into the storage of 15 GB available on our Google accounts -  you have to bear in mind that the storage space for your Google Account is shared between three Google products - Gmail, Google Drive, and Google Photos - and bring about unintended consequences where important emails addressed to that email address are bounced back off due to lack of adequate storage on your Google account.  Note : Since June 1, 2021, if you remain inactive or go over your storage quota for 2 years or longer, all of your emails may be deleted. More info is available at https://support.google.com/googleone/answer/10214036?

Email Authentication and Handling Unsolicited Emails in Gmail Inbox

We daily receive emails from known and unknown sources. So, it is essential that we understand the risks involved in handling emails in terms of identifying them and thereafter knowing how to best deal with the threats posed by the malicious ones. The Gmail spam and abuse detection algorithm use multiple signals such as Google's internal algorithm, blacklists, and crowdsourcing among other unknown factors Google doesn't make public to identify incoming messages and help the users on this front.  However, the spammers are extremely smart, and they can find ways to escape the algorithm through innovative ways. This is why, even with an effective spam and abuse detection system in place, one needs to be aware of some essential details so as to remain vigilant while handling emails, should there be a false-negative one. Everyone knows about Spam, Spoofed, and Phishing emails (among others) and they are the common types of unsolicited emails we receive in our addresses. Determining