10 Gmail Hidden Features That Can Transform Your Email Experience

In email services, Gmail stands tall as one of the most popular and feature-rich platforms. While many users are familiar with the basics of sending and receiving emails, Gmail offers many lesser-known features that can significantly enhance your email management and productivity. In this blog post, we will delve into 10 Gmail Hidden Features that you might not be aware of.

1. Schedule Emails for the Perfect Timing

Have you ever wanted to compose an email but send it at a later, more convenient time? Gmail allows you to schedule emails effortlessly. When composing a message, click on the small arrow next to the “Send” button and choose the date and time you want your email to be dispatched. This is among the very useful Gmail hidden features that can make your work easy.

Gmail Hidden Features Schedule Emails

2. Undo Send – A Second Chance for Mistakes

Have you ever hit the send button only to realize you made a mistake? Gmail’s “Undo Send” feature gives you a brief window to retract your sent email. Head to your Gmail settings, enable this feature and set the cancellation period (usually 5-30 seconds) to grant yourself a second chance after sending an email.

Gmail settings
Gmail undo send

3. Multiple Inboxes for Better Organization

Take control of your inbox by enabling Gmail’s Multiple Inboxes feature. This allows you to divide your inbox into multiple panes, each displaying emails based on specific categories or labels.

How to Create Multiple Inboxes

  • On your computer, go to Gmail.
  • At the top right, click Settings.
  • Next to “Inbox type,” select Multiple inboxes.
  • To change multiple inbox settings, click Customize.
  • Enter the search criteria you want to add for each section.
  • To search for starred emails, use: is:starred.
  • When you search a person’s email address, the results in that section will also show emails from their alias. To limit the search to only the original email, the search should be enclosed in double-quotes. Example: “from:john.doe@gmail.com”.
  • When you search “from:email”, the results will also return Drive sharing notification emails from when that person shared a file with you.
  • Under “Section name,” enter a name for the section.
  • Next to “Maximum page size,” enter the number of emails you want to view in the section.
  • Next to “Multiple Inbox position,” choose where you want to place the sections.
  • At the bottom, click Save Changes.

4. Smart Compose – Your Intelligent Email Assistant

Gmail’s Smart Compose feature suggests auto-completions as you type, making email composition faster and more efficient. Enable Smart Compose in the “General” tab of your Gmail settings and let Gmail help you compose emails with ease.

5. Create Email Aliases for Easy Filtering

To keep your inbox organized, create email aliases by adding a “+alias” to your email address. For instance, use your.email+newsletter@gmail.com when signing up for newsletters. You can then set up filters to sort emails based on these aliases.

One useful trick involving temporary aliases is to create filters that put emails sent to one email address, such as, “johndoe+@gmail.com,” in a folder other than your inbox. This way, you can prevent your inbox from buckling under the weight of too many promotional emails.

How to Create Gmail Email Aliases for Easy Filtering

You can make use of either of the two options

  1. Plus Symbol (+)
  2. Dots (.)

Plus Symbol (+):

Gmail ignores everything after the plus sign-in your email address. For example, if your email is example@gmail.com, emails sent to example+alias@gmail.com will still be delivered to your primary inbox.

Example:

  • Primary Email: example@gmail.com
  • Alias: example+shopping@gmail.com
  • Alias: example+work@gmail.com

Dots (.) Option

Gmail doesn’t recognize dots in email addresses. Therefore, example@gmail.com is the same as e.x.a.m.p.l.e@gmail.com.

Example:

  • Primary Email: example@gmail.com
  • Alias: e.x.a.m.p.l.e@gmail.com
  • Alias: ex.ample@gmail.com

With these techniques, you can easily filter emails using Gmail’s filters and labels. For instance, you can create filters that automatically label and archive emails based on the alias used. Here’s how you can set up filters:

How to Create a Filter:

  • Click on the gear icon in the upper-right corner of Gmail and select “See all settings.”
  • Go to the “Filters and Blocked Addresses” tab.
  • Click on “Create a new filter.”
  • Specify Filter Criteria:
  • In the “To” field, enter your alias (e.g., example+shopping@gmail.com).
  • Click on “Create filter.”
  • Apply Actions:
  • Choose actions like “Skip the Inbox,” “Apply the label,” or “Mark as read.”
  • Create a new label for the alias (e.g., “Shopping” or “Work”).
  • Create Filter:
  • Click on “Create filter.”

Repeat this process for each alias you want to filter. This way, emails sent to specific aliases will be automatically sorted into their respective labels, making it easier for you to manage your inbox.

6. Right-Click for Quick Actions

Save time by right-clicking on emails in your inbox to reveal a quick menu with actions such as archiving, marking as unread, or deleting. This shortcut can streamline your email management process compared to using the toolbar.

7. Master the Art of Search with Advanced Operators

Gmail supports powerful search operators to refine your search queries. For instance, use “filename:” to search for attachments or “in:inbox” to narrow down your search to the inbox only. Mastering these operators can help you find what you need more efficiently.

8. Offline Mode – Access Your Emails Anywhere

Gmail’s Offline Mode allows you to access your emails without an internet connection. Enable this feature in settings, and Gmail will synchronize your emails for offline access. Ideal for travellers or those with intermittent internet connectivity.

9. Customize Swipe Actions on Mobile

For mobile users, Gmail offers the ability to customize swipe actions. Whether you want to archive, delete, or mark as read with a simple swipe gesture, you can tailor these actions to suit your preferences.

10. Efficiency Boost with Keyboard Shortcuts

Navigate Gmail like a pro by using computer keyboard shortcuts. Enable this feature in the “General” tab of your settings and familiarize yourself with shortcuts for tasks like composing, archiving, and navigating between emails. It’s a surefire way to boost your efficiency.

In conclusion, Gmail goes beyond being a simple email platform, offering a range of features designed to make your email experience seamless and efficient. By exploring and utilizing these lesser-known Gmail hidden features, you can transform the way you manage your emails, saving time and increasing productivity. Unlock the full potential of Gmail and elevate your email game today.

How To Book For Canada Biometrics In Kenya

This is a guide on how to book for Canada biometrics in Kenya. The process involves some specific steps to be followed. Canada requires certain visa applicants to provide biometrics (fingerprints and photographs).

Before you book for Canada Biometrics in Kenya however, make sure you have filed the visa application forms and paid any necessary visa fees. I have provided a complete guide on how to apply for a Canadian Visa and make payment.

GCKey Sign in

Steps to Follow to Book for Canada Biometrics in Kenya

Here are the steps to book a biometrics appointment for a Canadian visa application from Kenya. But first, retrieve your Biometric Instruction Letter from the IRCC website. You will use it to book for Canada Biometrics in Kenya

Book for Canada Biometrics in Kenya

Log in to the Immigration, Refugees, and Citizenship Canada (IRCC) website to access your Biometric Instruction Letter. This is in case you have applied for a Canadian visa and have been requested to provide biometrics. Here are the general steps:

  1. Visit the IRCC Website: Go to the official IRCC website at https://www.canada.ca/en/immigration-refugees-citizenship.html.
  2. Log in to Your Account, the one you used for the main visa application.
  3. Access Your Application: Once you’ve logged in, you should be able to access your visa application. Click on the section indicating that you have a new message.
  4. The full application status will open. Read through the various stages and you will encounter an area saying that your biometrics are required.
  5. Below that section is your Biometrics Instruction Letter. Download and print the letter as you will need it during the appointment date. The letter contains important details such as your IRCC Number, the deadline for completing your biometrics and the location of the Visa Application Centre (VAC) where you need to go.
VFS Global

Access VFS Global to Book for Canada Biometrics in Kenya

VFS Global is one of the service providers used by Canada to facilitate the biometrics collection process for visa applicants. Here are the general steps to follow to access VFS Global and book a biometrics appointment for Canada from Kenya.

  1. Visit the VFS Global Website: Click on visas, eVisas and Permits tab. Select the country you are applying from and the one you are visiting. Click on take me to the website.
  2. Select the option of booking an appointment.
  3. Select your preferred method of booking your appointment and click View More.

There are Five Main Methods you can use to book Your Canada Biometrics

  1. Online – The link will redirect you to an Appointment Login screen which enables you to: 
  • Schedule an appointment
  • Re-schedule an appointment
  • Cancel an appointment

You’ll have to follow the instructions mentioned on the page to create your own login credentials and schedule an appointment.

VFS Global Book for Canada Biometrics in Kenya

2. Telephone – If you wish to schedule an appointment via phone, you can do so by calling the helpline number 0800720214. A contact centre agent will be available to assist you in scheduling, rescheduling, or cancelling an appointment.

3. Email – If you wish to schedule an appointment via email, you can do so by using the web form.

4. Web Chat – If you wish to schedule an appointment, you can do so by clicking the Chat Now link. A contact centre agent will be available to assist you in scheduling, rescheduling or cancelling an appointment.

6. In Person – You can walk into the Canada Visa Application Centre during stipulated business hours to request this service and also schedule an appointment using the self-service method.

How to Book for Canada Biometrics in Kenya Using Online Option

  1. Click on the View More option to access the online booking option.
  2. Click on Create Account. Remember to activate your account using a link that will be sent to your email.
  3. Log into the VFS site and select the visa centre you wish to attend.
  4. Add the applicant(s) before proceeding to book your desired date of Biometrics for your Canadian Visa.

What you need to bring with you during the appointment:

When you present yourself at the biometric collection service point of your choice, you must bring the following:

  • a copy of the Biometric Instruction Letter, and
  • the passport or travel document that you referenced in your application.
Book for Canada Biometrics in Kenya

A Note About Emergency Biometric Appointments:

The criteria for an emergency biometric appointment are as follows:

  • Death of an immediate family member residing in Canada
  • Critically ill immediate family member residing in Canada

An immediate family member is defined as a

  • spouse or common-law partner
  • dependent child
  • dependent child of a dependent child
  • parent or step-parent
  • guardian or tutor

Applicants requesting emergency appointments for the purpose of biometric collection must provide proof of emergency (any one of the following) at the time of attending an appointment at the VAC

  • Death/Medical Certificate
  • Letter from Medical Officer/Unit
  • Letter from Funeral Home

Please note the VAC will report all applicants to IRCC who do not present the required proof of emergency at the time of attending an emergency appointment at the VAC. IRCC may take this into consideration when reviewing the application.

An emergency biometric appointment does not affect IRCC’s processing times for the application or the outcome.

Please note that emergency biometric appointments cannot be scheduled using the online appointment system. To schedule an emergency biometric appointment, please do so by calling the VAC Contact Centre or by visiting the VAC in person.

What is a Printed Circuit Board (PCB)? A Comprehensive Guide

A printed circuit board (PCB) is a critical component in many electronic devices. It serves as a platform for connecting and supporting electronic components like integrated circuits (ICs), resistors, capacitors, and connectors.

PCBs provide a physical structure and electrical connections for these components. This allows them to work together to perform various functions in electronic devices. A good example is a computer motherboard.

Printed Circuit Board

Here are Some Key Points About Printed Circuit Boards:

1. Basic Structure of the Printed Circuit Board

PCBs are typically made of a non-conductive substrate material (usually fibreglass-reinforced epoxy) with a thin layer of copper foil bonded to one or both sides. The copper foil is used to create the conductive pathways, also known as traces or tracks, that carry electrical signals between components.

2. Components: 

Electronic components are soldered onto the PCB. These components can include microchips, transistors, diodes, capacitors, resistors, connectors, and more.

3. Layers

PCBs can have multiple layers of copper traces, with each layer separated by insulating material. Multi-layer PCBs are used in complex electronic devices to accommodate more components and intricate circuitry.

A Computer Motherboard - a good example of Printed Circuit Board

4. Solder Mask

A solder mask is a protective layer applied to the PCB to cover and insulate the copper traces, preventing accidental short circuits and oxidation. It is typically green, but it can come in various colours.

5. Silkscreen

PCBs often have a silkscreen layer, which is a layer of ink containing labels, symbols, and other markings that help with component placement and identification.

6. Through-Hole vs. Surface Mount

PCBs can support through-hole components (components with wire leads that pass through holes in the board) or surface-mount components (components soldered directly to the board’s surface).

7. Manufacturing of Printed Circuit Board

PCBs are manufactured through a process that involves designing the PCB layout using specialized software, fabricating the board itself (which includes etching the copper traces and adding layers), and populating it with electronic components using automated or manual assembly methods.

8. Applications

PCBs are used in a wide range of electronic devices, from simple items like calculators and remote controls to complex systems like smartphones, computers, medical equipment, and aerospace systems.

9. Customization

PCBs can be customized for specific applications. Designers can create unique circuit layouts and choose materials that meet the requirements of the device.

10. Testing

PCBs undergo rigorous testing to ensure they function correctly. This includes electrical testing, functional testing, and quality control checks.

PCBs are a fundamental technology in modern electronics, enabling the miniaturization and functionality of electronic devices we use in our daily lives. They have evolved significantly over the years, becoming more complex and capable as electronic devices have become more sophisticated.

A PCB

How the Printed Circuit Board is Made

The manufacturing of printed circuit boards (PCBs) involves several steps, from designing the circuit layout to producing the final board. Here’s an overview of the PCB manufacturing process:

  • Design: The process begins with the design of the PCB. Engineers and designers use specialized PCB design software to create a digital representation of the circuit board. This includes specifying the placement of components, the routing of traces, and defining any necessary layers for multi-layer boards.
  • Schematic Capture: Before creating the PCB layout, a schematic diagram is typically drawn to represent the electrical connections and components in the circuit. This schematic serves as a blueprint for the PCB layout.
  • PCB Layout: Using the PCB design software, designers create the physical layout of the circuit board. This includes placing components on the board, routing traces to connect the components as per the schematic, and adding necessary features like drill holes, vias, and fiducial marks.
  • Gerber Files: Once the PCB design is complete, the next step is to generate Gerber files. Gerber files contain all the information needed to manufacture the PCB, including layer information, trace widths, component placement, and more. These files are used by PCB manufacturers to fabricate the board.
  • Material Selection: PCB materials are typically composed of fiberglass-reinforced epoxy laminates with copper foil bonded to one or both sides. The type of laminate material and copper thickness are chosen based on the specific requirements of the circuit.
  • Layer Preparation: For multi-layer PCBs, the individual layers of the board are prepared. This involves cutting and drilling the substrate material to the required size and creating copper layers with the desired traces using photolithography.
  • Layer Alignment and Bonding: In the case of multi-layer boards, the individual layers are aligned and bonded together using heat and pressure. Special prepreg material, which is a resin-soaked fibreglass fabric, is used to facilitate bonding between layers.
  • Copper Etching: A chemical etching process is used to remove excess copper from the board, leaving behind the desired copper traces. A protective layer called the solder mask is applied to cover the traces and prevent unintended connections.
  • Drilling: Holes are drilled in the board to create vias (plated through-holes) for making connections between different layers and to accommodate components with leads that pass through the board (through-hole components).
  • Plating: Vias and other exposed copper surfaces are plated with a thin layer of metal, typically copper, to improve conductivity and ensure proper electrical connections.
  • Solder Mask Application: A solder mask is applied to the board to insulate the copper traces, preventing unintentional short circuits and protecting the board from environmental factors.
  • Silkscreen Printing: The silkscreen layer, which includes labels, component outlines, and other markings, is printed onto the board to aid in component placement and identification.
  • Component Assembly: Electronic components are placed on the board using automated pick-and-place machines or manual assembly, depending on the complexity of the PCB.
  • Soldering: The components are soldered onto the board to establish electrical connections. This can be done through reflow soldering for surface-mount components or wave soldering for through-hole components.
  • Inspection and Testing: The assembled PCBs undergo visual inspection and various tests to ensure quality and functionality. This includes electrical testing, functional testing, and other quality control checks.
  • Final Inspection and Packaging: Once the PCBs pass all tests and inspections, they are cleaned, inspected again, and then prepared for packaging and shipment to the end-user or the manufacturer of the electronic device.

Each of these steps is critical in ensuring the successful production of a functional PCB that meets the specifications of the intended electronic device. PCB manufacturing can be highly automated for large-scale production or customized for unique and specialized applications.

Enhancing Online Security: A Comprehensive Guide to Protecting Your Digital Accounts

Online Security

In our rapidly evolving digital landscape, safeguarding your online accounts has become paramount. The rise of cyber threats underscores the importance of robust online security practices. This comprehensive guide is designed to lead you through the essential steps of bolstering your digital defences and ensuring the safety of your sensitive information.

15 Best Practices to Achieve Online Security

Establish Strong and Unique Passwords

The foundation of online security lies in crafting strong and distinctive passwords for each of your digital accounts. These passwords should be intricate and defy predictability, comprising a blend of uppercase and lowercase letters, numerals, and special characters.

  • Use a Passphrase: Instead of relying on a single complex word, consider using a passphrase – a combination of random words or a sentence. For example, “BlueSky$Rainbow@2023” is more secure than a single word like “password123.”
  • Length Matters: Longer passwords are generally more secure. Aim for a minimum of 12 characters.
  • Mix Characters: Include a mix of uppercase and lowercase letters, numbers, and special characters (!, @, #, etc.).
  • Avoid Dictionary Words: Avoid using common dictionary words, as they can be easily cracked using dictionary attacks.
  • Use a different password for each online account. This prevents a security breach on one site from affecting your other accounts.
  • Randomness: The more random your password, the better. Avoid patterns or sequences.
  • Avoid Common Patterns: Avoid using common patterns like “123456,” “qwerty,” or “abcdef.”
  • Avoid Keyboard Walks: Refrain from using sequences of characters that appear in keyboard walks, such as “asdfg” or “zxcvbn.”
  • Misspell Intentionally: Consider intentionally misspelling words or using substitutions (e.g., “Pa$$w0rd” instead of “Password”).

Harnessing the Power of Password Managers

Discover the convenience of password managers, which can generate, store, and automatically enter your passwords. These tools encrypt your passwords, simplifying the management of complex passwords across various accounts. This is what you achieve with password managers.

  • More robust Security: Password managers generate and store complex, unique passwords for each of your online accounts. This dramatically reduces the risk of falling victim to hacking attempts that exploit reused or weak passwords.
  • Password Storage: You don’t need to remember all your passwords; the password manager securely stores them for you. This means you can use strong, random passwords without worrying about forgetting them.
  • Auto-Fill: Password managers often have browser extensions or mobile app integrations that can automatically fill in your login information for websites and apps. This saves you time and effort typing in usernames and passwords.
  • Cross-Platform Syncing: Password managers usually offer synchronization across devices. This means the passwords you save on one device are available on all your other devices. You don’t have to manually transfer passwords between devices.
  • Reduced Mental Load: Remembering multiple complex passwords can be challenging and stressful. A password manager frees you from the mental load of memorizing and managing numerous passwords.
  • Emergency Access: Some password managers offer features that allow trusted contacts to access your passwords in case of an emergency.
  • Encrypted Data: Password managers use strong encryption to store your passwords, making it significantly more difficult for hackers to access your sensitive information.

Multi-Factor Authentication (MFA) for Added Security

Multi-Factor Authentication (MFA) is also known as Two-Factor Authentication (2FA) Elevate your security measures by activating multi-factor authentication whenever feasible. MFA necessitates supplementary verification, such as a code sent to your phone, in conjunction with your password.

There are three main types of factors used in multi-factor authentication:

  • Something You Know: This is typically a password or PIN. It’s something that only the user should know.
  • Something You Have: This can be a physical device such as a smartphone, a hardware token, or a smart card. These devices generate temporary codes or act as a second means of authentication.
  • Something You Are: This refers to biometric data such as fingerprints, facial recognition, or iris scans. These are unique physical traits that can be used to verify your identity.

Shielding Yourself from Phishing Attacks

Vigilance against unsolicited emails, messages, and links soliciting your login credentials is essential. Phishing attacks mimic authentic websites to deceive users into divulging their passwords.

Here are steps you can take to shield yourself from phishing attacks:

  • Be Skeptical of Emails and Messages: Be cautious when you receive unsolicited emails, messages, or requests for personal information. Even if the sender appears to be from a reputable source, verify the legitimacy of the request before responding.
  • Check the Sender’s Email Address: Carefully examine the sender’s email address. Phishers often use email addresses that look similar to legitimate ones but have subtle differences.
  • Avoid Clicking on Links: Instead of clicking on links in emails or messages, manually type the website’s URL into your browser. This prevents you from accidentally accessing fake websites.
  • Hover Over Links: If you must click on a link, hover your mouse cursor over it to see the actual URL. Check if it matches the expected destination before clicking.

Periodic Password Updates

Rotate your passwords at regular intervals, particularly for vital accounts. This approach curtails unauthorized access, even in the aftermath of a breach. Users can change their passwords at regular intervals, such as every 30, 60, or 90 days.

Eschew Personal Information in Passwords

Abstain from incorporating easily discoverable details like birthdays, names, or everyday expressions in your passwords. Cybercriminals can readily obtain such information from social media or other public sources.

Fortify Recovery Options

Secure your password recovery options meticulously. Utilize robust security questions or alternate options such as secondary email addresses, rather than information that can be easily unearthed.

Consistent Account Activity Oversight

Regularly inspect your account activity for any signs of unusual or unauthorized access. Numerous online services provide tools for tracking login attempts and activity histories.

Stay Informed and Educated

Yes, like you are doing now. Remain up-to-date with the latest cybersecurity risks and best practices. The landscape is ever-evolving, and knowledge is an indispensable shield.

Routine Software Updates to enhance Online Security

Maintain the currency of your devices and software. Updates frequently encompass security patches designed to rectify known vulnerabilities.

Device Security

Bolster your devices with robust passwords, PINs, or biometric safeguards. Ensure devices are locked when not in use to forestall unauthorized access.

Secure Wi-Fi Networks

Use strong passwords for your Wi-Fi networks and enable WPA3 encryption. Avoid using public Wi-Fi networks for sensitive tasks.

Use a Firewall to bolster Online Security

Enable the built-in firewall on your computer or use reputable third-party firewall software to protect against unauthorized network access.

Regular Backups

Back up your important data regularly to an external drive or a cloud service. In case of a cyberattack, you won’t lose valuable information.

Install Antivirus Software

Use reputable antivirus software to detect and remove malware, spyware, and other malicious software from your devices.

Online Security - Stay Safe

Conclusion on Online Security Measures and Best Practices

Elevating your online security requires an ongoing commitment to vigilance and attention to detail. By incorporating these meticulous best practices for password management, you significantly elevate your digital safety, minimizing the likelihood of succumbing to cyber threats.

Although no security method is entirely infallible, the amalgamation of robust passwords, multi-factor authentication, and informed decision-making contributes immeasurably to protecting your digital presence and sensitive data.

Adopt a proactive stance, remain attuned to the latest developments, and prioritize online security to cultivate a more secure and guarded digital journey.

Verified by MonsterInsights