Skip to main content

Email will be deleted automatically ?

                GMAIL CHANGES

Today I am back with new tech ideas so let's go for it.


Gmail is a free, advertising-supported email service developed by Google. Users can access Gmail on the web and using third-party programs that synchronize email content through POP or IMAP protocols. Gmail started as a limited beta release on April 1, 2004, and ended its testing phase on July 7, 2009.
Gmail is a free, advertising-supported email service developed by Google. Users can access Gmail on the web and using third-party programs that synchronize email content through POP or IMAP protocols. Gmail started as a limited beta release on April 1, 2004…
 

These days GOOGLE launch snooze feature in Gmail and smart reply and many new feature and in this launch one feature is CONFIDIANCIAL MODE today we talk about it this feature likely to Instagram and Snapchat after 24 hours message will be automatically deleted now this feature is available for us in Gmail but the main thing is that you can set the time when the message will delete,I know you are thinking how the message will be deleted automatically so read my full article for better knowledge.

The benefit of CONFIDIANCIAL MODE is that your serious or important message will not be open by someone without the passcode if you have to open Gmail message then you need the passcode and that's why the CONFIDIANCIAL MODE is more secure then other.

HOW TO USE IT ?


First you have to open your Gmail account and click on compose then type that email which you have to send then fill the subject line after filling type your matter on the bottom find a small lock icon then tap on it and then a pop up window will be open in front of you now you can choose your email expire date there is date you see 24 hrs,1 week, 1 month, 3 month, you can select maximum 5 years and you can select that day you have to delete the message and then save the day you saved on that day the message will be deleted. There you can set the passcode if you not set the passcode then other man an easily read your message and if you set the passcode then you have to enter the phone number that you have to send email now save changes and send.

After set the passcode receiver receive the mail but receiver have to verify their number and request for OTP (ONE TIME PASSWORD) after fill the OTP if OTP matched then receiver can see the content and the best part of the CONFIDIANCIAL MODE is that receiver can't copy the content and can't forward it to other so this is the best part of CONFIDIANCIAL MODE I like so this was CARRY MINATI signing off n

THANKS FRIENDS  TO READ MY ARTICE

NEW TIPS FOR TECH   

Comments

Popular posts from this blog

How Viruses are spread on our computer

Today I am back with my new topic which is based on How Viruses are spread on our computer Let's start !! A program that has the capability to infect other program and make copies of itself and spread into other programs is called Virus. A Virus can be identified if our system:    Takes a long time to load applications.     Has an inability to boot.     Shows unpredictable program behavior.     Has strange graphics appearing on the screen. The types of viruses are:   File Virus, which infects and replicates when it gets attached to MS-DOS program files with EXE or COM extensions. Boot Sector virus infects the boot sector of the floppy disk or hard disk.   Macro Viruses insert unwanted words or phrases in MS Word or Excel. How Viruses are spread? It seems to be a common belief that viruses are spread by games, by Internet file downloads or by Bulletin Board Systems (BBSs). The truth is more intricate. A physical disk has to be involved in case

How Internet Works and how much kind of it

Today I am back with an interesting topic which is how the Internet works. Let's Start! About Vinton Gray Cerf The Vinton Gray Cerf is an American Internet Pioneer. He was born in (June 23, 1943). Who is recognized as one of the fathers of the Internet? Sharing this title with TCP/IP co-inventor Bob Kahn. His acknowledge and lauded, repeatedly, with the honorary awards that include the National Media Of Technology, the Turing Award, the Presidental Medal Of Freedom, the Marconi Prize and membership in the National Academy Of Engineering.  If you want to read more about Vint Cerf then click on the link:  https://bit.ly/1je8u4g Wired Communication Media The data is physically transmitted from the source computer to the destination computer through the wired transmission medium. Bounded media are made up of the external conductor (Usually Copper) bounded by the jacket material. Bounded media are great for LABS because they offer high speed, good security, a

Safely browsing the web and using social networks

Today i am back with my new topic which is Cyber security. Let's start!! Internet is the most recent telecommunication technology,which has brought a technological revolution not only in offices but also in homes. Internet is the world's largest computer network, which connects several computers of different types belonging to various networks all over the world. Internet is not governed by a single authority. So, there are no official rules and regulations to control activities involving it.  This has many problems being associated with the internet. Individuals or organization use  their computers to store important and valuable data.Very often this data is kept confidential and needs to be stored securely. However, with the internet connecting all these computers, this security is now being threatened.   INTERNET APPLICATION  It is not that the Internet is used only for sending and receiving information. It has its commercial aspect too. Internet