Monday, July 6, 23:43 p.m.
Home how To Gmail is a handy feature that you may not know

Gmail is a handy feature that you may not know

Did you know that you can customize your Gmail address, which can help track who's sending you messages? Below we will see what you can do by simply using a few extra characters in Google email. gmail

Let's first look at something that can you already know:

You can place a dot (.) Between any of the characters in the username of your email address. Gmail does not recognize it as a character in the username. She completely ignores it.

Adding dots can be useful in long and multi-word emails. It separates the order of characters and makes it easier to read the address.

For example, if your email is secnews@gmail.com, you can type it as sec.news@gmail.com and Gmail will still see it as your home address. If you like, you can also use secnews@gmail.com, but it's a little overdone.

However, you should be aware that you cannot use a dot at the beginning or end of your username or use two or more in a row.

Let's see now what you can do with the plus sign (+).

Yes you can also use the plus sign (+) to add any number of words or numbers at the end of the username. Just like the dot, Gmail ignores the plus sign and everything else. This allows you to customize and create an endless array of email addresses.

This feature is especially useful for newletters and sites that require an email address to sign up because you can add the site name to organize your inbox.

For example, if you would like to subscribe to the SecNews newsletter, secnews@gmail.com can be secnews+newsletter@gmail.com. The newsletter will still go to the inbox of the first address, but seems to have been sent to "secnews+newsletter@gmail.com".

You can also use the plus sign between many words like this: secnews+lets+add+more+words@gmail.com.

Why else can you use the plus sign in your address? If you suspect that an organization may sell your information.

The trick can add the name of the company to which you entered your emails. So if you see the same email being used to send you spam you will know who the culprit is.

LEAVE ANSWER

Please enter your comment!
Please enter your name here

SecNews
SecNewshttps://www.secnews.gr
In a world without fences and walls, who needs Gates and Windows

LIVE NEWS

Windows 10 2004: Unauthorized settings "block" the upgrade

Users report that they have a problem with Windows 10, since they are excluded from the application of the May 2020 update, when they manually attempt to ...
00:02:04

Lenovo is improving Linux ThinkPads but the problems remain

Last month, when Lenovo announced that it was going to certify the ThinkPad series for use with Linux operating systems, we thought directly ...

Nigerian accused of fraud against US companies

A Nigerian was taken to the federal court in Chicago on Friday, after being accused of coordinating an international cyber fraud system, which affected ...

Home routers display critical errors and run unpatched Linux

The German Fraunhofer Communication Institute (FKIE) conducted a survey that included 127 home routers from seven different brands, in an effort to ...

IPhone 12 release: Will we finally see it by the end of 2021?

New data on the release of the iPhone 12, which we all expect not to happen in September, say that it will only be delayed ...

MySQL: Replaces terms that reinforce racial discrimination

MySQL database developers have announced that they will be replacing terminology such as master, slave, blacklist, and whitelist.

The CEO of a cryptocurrency investment company was cheating

As reported by News24, Willie Breedt, the founder of VaultAge Solutions (cryptocurrency investment company), declared bankruptcy last week and the ...

United Kingdom: Will it exclude Huawei from its 5G networks?

The UK government has received an NCSC report on Huawei, which may change its policy ...

A Yahoo engineer is not in jail after hacking 6.000 accounts

A former Yahoo engineer has been sentenced to five years in prison for hacking into personal accounts ...

PoC exploits released for critical vulnerability on F5 BIG-IP devices

PoC exploits released for critical vulnerability on F5 BIG-IP devices Two days after the release of updates on critical vulnerability on F5 ...