How to change and recover your Gmail password


Generally, the best passwords are always complicated, memorable and long. The practice to change your password from time to time is widespread. It is recommended to change your Gmail password every two months if you want to prevent the break-in to your mail account. Try to change your password immediately in case you suspect your account is in danger of unauthorized access.
It is also obvious that no one password is fully secure. No matter how good the password is and how frequently it is updated, no one in protected against key loggers on your PC. If you want to increase your Gmail security, required phone verification can be added to your password.
In order to change your Gmail password you can go through the following steps:
Click the gear in your navigation bar and select “Settings” in the menu. Open Accounts category and click on the Change password link. It is situated under Change account settings. Then type your current password under corresponding field. In addition, give the answer to your secret question of Google account. Enter your new password twice in the “New password” and “Confirm ne password” respectively. Please create easy to remember and at the same time secure password. It will help you to prevent unwanted access to your account if you often change your password. Save the results clicking on the “Save” button.
It is a perfect practice to frequently change the password. What is to be done in case if the password is lost or forgotten? Gmail knows the password, but not you!
Validation process can allow you to set a new Gmail password and restore the access to your account.
If you want to recover your forgotten password you have to go through the following steps:
First of all make sure that you have another email address related to your account. Or make sure your Gmail account has been not used by you for 5 days. There is “Can’t access your account?” link on the Gmail log-in page. Please follow the link and enter full Gmail email address in the “Email address” field. Then click the “Continue” button.
In the case a secondary email address was specified for recovery you have to make sure that the email address desired is selected. Then select the “Get a password reset link at my recovery email” point in the “Choose how to get back into your account” field. Next click the “Continue” button. Enter your secondary account and open the “Google Password Assistance message” there. Then follow the “To initiate the password reset process for your …Google Account” link.
In the case you have specify a security question in order to recover Gmail password, select “Answer my security question” in the “Choose how to get back into your account” field and answer your security question.
In the case a phone number was set up for account recovery select “Get a verification code on my phone” point in the “Choose how to get back into your account” field and select the desired phone number. Press “Continue” button.
Get the SMS text message from Google. The message starts with Your Google verification code that should be typed on the Google Account Recovery page. Enter the code and click “Continue”. Then choose new password and enter it twice in the “New password” and “Re-enter password” fields. “Reset password” button is to be clicked then.
In order to recover the password your Gmail account should not be used for 5 past days. If it was, please let these 5 days to pass.
Nevertheless, if you cannot reset your password through security questions or with the help of the secondary email address, firstly be certain that you are attempting to access the right account. The account name can be checked for misspellings. Don’t forget to check if the security question is the same as you entered earlier.
You also can contact Google support team and provide them with more detailed info about your account. It can greatly help you to access to your Gmail account.

Related posts:

To Trace an Email Address


Email address can be traced in the most popular programs like Hotmail, AOL, Microsoft Outlook, Gmail and Yahoo! by learning the header.
Headers are the essentials of each email that come into your inbox. The data about the message’s originating Internet Protocol address and the routing of the message is contained in them. Nevertheless, you cannot track all messages back to their originating addresses. The fact you will trace an email address back is determined by the process of how you send messages.
No personal information is included into headers. At the best case, the computer name that sent the email and the origination IP will be shown to you. The initiating IP can be found after the trace information is viewed. This will help to determine the location the message came from. Your street name, phone number and house number is not contained in the IP address location information. The trace will provide the data about the ISP the sender used and the city the message is sent from.
How the header is forced to start the trace email process? There are various ways to get to the message options in each electronic messaging program. Let’s take a look to the basic info to start the trace in different programs.
Open the inbox in the Outlook and click the message. Select Message Options. Window will be opened with the headers in the bottom of it.
Click the correspondence in the Windows Live while it is in the inbox. Then choose “Properties” and click “Details”.
Open the correspondence in the Gmail program. See the word Reply in the upper right corner of the email. A little down arrow to the right should be clicked on. The select “Show Original”.
In the Hotmail click the memo and select “View Message Source”. Yahoo! gives you the option to click the note and select “View Full Headers”. Click “Action” in AOL and select “View Message Source”. The headers usually can be found just a right click away no matter the program you use.
How the trace is started when the header is gotten? What is the next step to trace an email address?
So, the first IP listed in the header should be found firstly. Considering it as the IP initiating point, there are some exceptions. Logical view at the information is the right way to deduce the originating IP.
Nevertheless, not every email address can be traced. The X-Originating IP section of the headers contains the information about anyone who sends a message to your hotmail account. However, a message from Gmail can be traced back only to Google IP addresses.

Related posts:

How to build a solid email list.

What can be the most important thing for the email marketer? A solid email list, of course. It is not easy to build such a list that should include only subscribers. It should also be completely opt-in and contain digital or written proof to show how and where each email address was gotten.

Are there some good guidelines to follow in order to build a list? You can use the following things to build a permission-based email-list.

1. Use a sign-up form on your web-site! Called also a sign-up box, a sign-up form is useful tool to gather email addresses and also to build up a contact list.

2. Create a long-term plan when adding the subscribers. You should create a long-term plan in order to keep in touch with the clients as long as possible. This may help you to get more customers’ feedback if they want to see some more data on your website. It is important also to develop trust with your customers and build up good relationships with them.

3. Using an old email list, re-confirm your customers. The list may contain old email addresses of the customers who do not want to be your customers anymore or their email addresses are old. In this case you can easily send a re-confirmation email to them. Customers will be asked to re-subscribe to your emails or newsletters.

It can be better to send several re-confirmation emails. Some of the customers may miss your email at the first time. People cannot click on the subscription link even after several emails. If this occasion takes place you can easily delete their email addresses from the list because they may be not interested in your subscription anymore.

When you send re-confirmation email it is likely to learn which of email addresses are not valid or bounced. These email addresses should be cleaned off. It will help you to focus your attention on those persons who are really interested in your newsletters.

4. A custom Sig-up form can be placed on your website. This will help your customers to sing-up automatically. It is perfect to place the form on each of the pages in the case the customer will not visit the page with the sign-up form. Browsing each of the pages will make the process to sign-up easier.

5. You also can use an email archive with web versions of your newsletters in case you want to get some more new subscribers.

6. You also can advertise your newsletters in other newsletters. A large number of email addresses can be yielded due to this oft-overlooked strategy in a short time. One of the popular outdoors newsletters can be used to place a link to your email sign-up form within the advertisement. High-volume and opt-in newsletter will be a great choice for the placement.

7. If you have an online shop and your customers make a purchase you can gather their email addresses. You can place a signup form somewhere in the information field. There your customers will be able to enter their email address. It is good also to inform them about the frequency and content of your newsletters.

8. Your email can also be uploaded to an email marketing community. This is the d=great place to show your emails as well as to build up your list. A brand new audience can be easily found due to putting your emails online in the community.

9. Trade shows, sales and any special event can be used to create a larger list with customers’ email addresses. Such events usually gather a lot of people. It is the reason to create a solid email sign-up form for more people to subscribe. This form should better be placed in some visible place in order the signing-up will be as comfortable as possible.

10. There is one more option to enlarge your list. The forward-to-a-friend link can be also used in your emails. People like to share some interesting data with their friends. This fast communication option will help you to enlarge your contact list.

Building a reliable list with customers’ email addresses is not always easy but possible. using some tricks mentioned here can help you.

Related posts:

Choosing strong and secure Gmail email password


Is your email account secure enough? Everyone knows that unsecured email can be easily opened and read. Nevertheless, people hacking still remain the prime danger in the face of your email account.
The first and best way to secure your account is to create strong password. It is hard to make it easy to remember and difficult to guess at the same time. In order to create something really defensive we recommend you to use one sentence that can be easily adapted for your personal needs.
A simple password is an easy target for hackers. If you are intended to create a hard to crack password you can follow the below tricks:
• Take one sentence that is extremely easy to remember. It can be in another language or describe some event or favorable place from your life.
• One of the important segments of your password is its length. Try to make it as long as possible, including at least 7-9 characters. Nice rhythm and ring is significant when making the password easy to remember. You also can combine some parts of the word, their beginnings or endings. Such strings will be easy to remember. Exclude using one letter several times.
• Several characters can be capitalized to make the password more secure. Try not to capitalize only last or first character of the word. Choose the words that make sense of your sentence and capitalize them.
• Introducing dots, numbers or any special characters in the most preferable places in your string. Some expressions can be easily turned into numbers like “4” instead of “for”. Remember that not all email services allow introducing extra characters into passwords.
Try to create a unique password for each email service if you have several email accounts. Something personal and unique that cannot be found on the web will be a perfect choice. You also can choose really random and long sentence as an alternative secure password if your email service allows you. About 45-55 characters will be enough for a good security.
Please remember that sending your password by email is not safe. Enter your passwords on any website only in cases when the site is using a HTTPS connection that is secure or if you’ve selected the address from your bookmarks or opened it by typing.
It is better to have two passwords, especially if one can just come through your phone. In addition to your password the two-step verification allows you using a special code to log in.

Related posts:

Spam, spammers and your email address….What can you do?


Spam is the thing every one of us came across once a time. If not, you have no email address either. If you really do not use the email address, think twice before start to use it. Your email inbox will become a place where the spam gets in permanently.
Spam could not be identified by one word only. Junk mail we get is sometimes easily recognizable due to its subject line. Emails that you cannot label as “suspicious” may be more suspicious than that you think are legal.
It stands to reason, a message from your friend or member of your family, newsletters you did sign up for, and an email from somebody who tries to reach you cannot be recognized as spam. It may appear somebody signs up instead of you and you get newsletters not knowing about the reason of such messages. It’s not a spam but a type of email abuse. Please take into consideration that not every email you get into your inbox is spam.
The fact spam works is evident. People who receive junk mail do purchase the goods advertised there. Spam is cheap and inexpensively to send. The risk to be caught involves dear costs and is substantial enough.
Taking into consideration that the cost is borne by the recipient, spam is a bad thing. It costs resources, time and money turning email into a non-attractive medium. Luckily, email was not destroyed completely due to the spam. Hopefully, it will not do it in future.
A good deal of time and many efforts are spent to manage and delete spam emails. It is annoying to deal with unwanted email. Take care about email address on your website. You might attract the spammers if your email address is hided not properly.
You should not display email addresses in traditional way on your web site if you don’t expect to get spam email. Spam robots harvest email addresses in a very efficient way.
When your email address is stolen by the spammers it will be targeted by them and may even passed or sold to other spammers. These actions are illegal. Spam robots as well as suspicious spammers are hard to detect. Although, the commercial emailers and those who conspire to violate anti-spamming laws can be penalized with imprisonment.
Almost all spammers have their own email address or active website due to which they can be easily tracked down. Spam is an amazing thing that reaches almost everyone online using astonishing and unprecedented efforts.
Spammers use mailing lists with the email addresses only to start sending spam. You are not obliged to provide your email address or to sign up for anything. You start to get spam into your inbox suddenly without any reason and plan.
The interest is caught be the fact how email addresses are discovered by the spammers and how your mailbox is found by them. Such widespread email providers as Yahoo! Mail or Windows Live Hotmail are great source to find addresses to send spam. One common domain name is shared by great many people. Most good and short names are already taken and can be easily discovered with taking into consideration that they all have an already known “hotmail.com” suffix.
It can appear to be very easy to find email address by combining short user name with the domain name. Use sophisticated and long user names if you want to avoid such type of spammers’ attack.
Spammers also use robots that scan following links and web pages to discover email addresses. Working a lot like the search engines’ robots these email address harvesting robots are not interested in page content but in rows with ‘@’ sign and domain name.
Spammers are particularly visit chat rooms, web forums and web-based interfaces due to the fact that a great number of email addresses can be found there. This is the reason to disguise your email address when you use it on the net. One of the ways out is to use disposable email addresses.
Encode your email address when posting it on your own blog or web page. So your visitors will be able to send you an email and see the address as against to spambots. A disposable email address is very effective and appropriate alternative.
Spammers try to send their messages from a distributed network of computers that are not even their own but those of users who do not suspect their computers are used to send spam emails. Spammers do this to avoid filtered and detected.
Spammers cooperate with virus authors to build such a distributed network of spam zombies. Small programs that can send bulk emails are equipped with worms. Moreover, these spam sending engines scan the address book of the user, his files and web cache to find more email addresses. This type of theft of your email address is most difficult to avoid.
The best anybody of us can do is:
– To keep email program patched and updated
– To avoid any unrequested attachments
– Scan your PC with up-to-date and free scanner regularly.
If you get spam into your inbox, don’t answer to the messages even if you want to ask the spammers not to send you spam! If you get something with “unsubscribe” link but did not subscribed to it, don’t click on the link. This is the common way to validate your email address which is followed by more unwanted emails in your inbox. You also can download any virus on your computer clicking on the link.
Never reply to spam messages and never click on links because the spammers do not care about your personal opinion and do their job in spite of the damage they apply to you and your mailbox.

Related posts:

Identity Theft and Phishing


Phishing is an online scam that intends to reveal personal information of its victims.
The scammers want to reveal your personal data as date of birth or credit card numbers. It can be called identity theft and may lead to run up of false credit card charges or steal of money from bank accounts. Many phishing attacks may be created to steal website passwords and logins, email or your sensitive information.
Firstly, a spam email is sent by the criminals. It is designed to look like an email from a trusted organization as a bank or some other financial company. The scammers will do their best to make the email be as from a legitimate organization or company. These emails may have a wording and similar design as official emails as well as same graphics and so on.
The message can include link to a “real” website placed on the first page. This fake can look identical or similar to the legitimate site. Getting in the phishing email you may be asked to provide your personal details.
Keylogger software can be embodied into email and spy on the keystrokes. It will relay them remotely to the criminals who can see your sensitive information as financial details or passwords that you enter.
Some of us can easily be tricked to provide our personal data. The criminals can also purchase goods and services using such victim’s personal data as drain funds from the bank accounts or financial credentials.
It is cheap to send an email that criminals send out a great number of similar emails and target customers from the particular organization such as an internet service provider or bank. Sending out such emails phishers expect that at least some of the receivers are the customers of the real organization they supposedly send emails from.
You should know how to protect yourself from online identity theft and phishing attacks.
The effectiveness of phishing emails is high because the senders try to make them look like they are from a legitimate organization or company including similar graphics, design, wording and links.
Be aware when receiving emails. No financial institution or bank will ask their customers to provide their personal information through email. Phishing emails may target your sensitive details as social security information, your date of birth or credit card number.
Bad grammar, poor spelling or an unusual turn of phrase are among evident characteristics of phishing emails. Most of emails come from countries that do not use English as their first language. Professional and accurately designed email is a sign of a reputable company that uses its best to communicate with its clients.
Phishing email may contain the information that it is something wrong with your bank account’s security and asks you to enter your personal details in order to identify you.
Some of phishing emails can appear like a warning about your undone purchase to cancel it by providing your details. Any reputable bank will hardly announce its customers about some inconveniences through email.
Phishing emails are often generally worded while any business that deals with you already knows all necessary information that is specific to you.
Be cautious if you are not sure if the email you received is from your bank or other legitimate company. Contact the organization when you doubt about the origin of the letter. Read the message attentively before reply on it or click to any embedded link.
A legitimate site of the organization is the reliable source to learn the information you doubt about.

Related posts:

Facebook Email Addresses


One of the most popular social networks in the world, Facebook, also aims to be the provider of your email.
Each Facebook user has got a Facebook email address that is linked to his/her account on the network. It is supposed that you even do not realize it. Little-used @facebook.com addresses were nudged into the spotlight on Monday. Facebook switched the email addresses of a great number of site’s users from the familiar to new ones.
This change was done on the Facebook.com site and will help your friends to quickly find you if they do not know your email address. The switch was abrupt that caused universal discontent.
Tech blogger Gervase Markham, representatives of Forbes.com and Gizmodo declared about this sudden inconvenience. According to a Facebook spokesman other tweaks were consistent with this change that led to more control to users. Addresses on Facebook were updated and made consistent across the site.
A new setting was added to everyone choose which addresses he/she wants to be shown on timelines. It is easy to switch the priority of email accounts. Your “About” page can be shown as well as it was on your old account. If you want to see the information about you, just click your name and select “About”.
If you want to adjust the priority of different email addresses associated with your Facebook account, select edit under the “Contact Info” section and set their visibility.
According to Facebook spokesman, this change is intended to strengthen your privacy and security. The same generic @facebook addresses are offered to everyone. Your preferred email can be easily protected by the company. Its visibility can also be limited.
People still have the ability to control their posts to be shown even when timeline is launched. Now all Facebook users can easily hide or show their posts on their own timelines.

Related posts: