Are you worried about spam in your precious gmail account ?

If yes, then you would like to consider making aliases of your gmail id to use when you’re not sure whether you’re signing up for something safe or not.

It is a very simple task to provide an alias of your gmail id. Whenever you sign up on the internet on some site that you think may not be safe(or a site which might send you spam),all you have to do is give out the email address as [email protected]

For example if your email id is [email protected],you can provide [email protected] or [email protected] .You can put anything after the + and all email sent will still go to your gmail account.

In the event that you did give your email to a spammer and you start receiving spam, don’t worry! Just create a filter, and make everything that is sent to [email protected] go to the trash. This way all the spam that you might get will automatically be deleted.

Explore More

What are the user authentications supported by the SSH-2 protocol?

The SSH-2 protocol supports the following user authentications: * Public key authentication (DSA, RSA*, OpenPGP) * Host-based authentication * Password-based authentication Note: SSH-1 supports a wider range of user authentications,

Visit to Myanmar —-~_~—

ShweDagon Pagoda @ Yangon, Myanmar INTO’s Education Seminar @ Trader Hotel Myanmar ICT Exhibition 2010 @ Tatmataw Hall, Yangon btw, Now I’m @ NEW WAVE Cyber Cafe, No. 12/A D1,

DoS vulnerabilities

Denial Of Service Overview DoS or Denial Of Service vulnerabilities will occur if there is some type of bottleneck within the software application. This could cause excessive cpu usage, memory