If you find yourself typing the same messages or text blocks over and over, you will want to use Gmail’s Canned Responses. Continue reading “Gmail Canned Response”
To simplify your online life, you should keep your Brewster and personal email completely separate. If you have a personal Gmail account, you can easily toggle between accounts in Chrome. Continue reading “Manage Two Gmail Accounts in Chrome”
When making the transition to Google Drive you may have numerous files and folders to upload and convert. In the process of uploading folders and files, it can be confusing what you have uploaded and what is remaining to be uploaded. If you worried that you may have already uploaded the folder of files, Google will let you know by issuing them with unique file names. If there are uploading files with the same name as existing files in your Google Drive, the new files will be saved with a number suffix in the file name. This ensures that nothing will be overwritten and lost.
Using templates will help you with everything from essays to t-shirt order forms. Templates are available in Google Docs, Sheets, Slides and Forms. Be sure to check out all the templates as they will make your work easier by providing an outline for you to insert your information and work.
Did you know that you have a YouTube account? It’s part of your Brewster Google Suite of Apps just like Google Docs and Gmail. Taking video from your computer and uploading it to YouTube is rather simple. Here’s how to do it from scratch! Continue reading “Upload Video to YouTube”
Traveling always requires some planning, not only deciding on what will go in your suitcase but also how to prepare and safeguard your computer, phone, and data. Preparing your computer and backing up may not be at the top of your list, but loss, theft, or accidental damage can happen, especially when traveling. A laptop or phone are easily replaceable – your data, photos, essays – not so easy. Continue reading “Travel Tech Tips for Devices and Data”
The following excerpts were pulled from an article posted on TechRepublic
It all starts in a Gmail account that has already been compromised. Reports say that perpetrators are accessing hacked accounts immediately and sending phishing messages to other Gmail addresses in the hacked accounts contacts list.
An email lands in the target inbox from the hacked address, and here’s where it gets tricky: The phishing email uses a legitimate subject line, text, and attachments from emails already sent by that account, making it look completely legitimate. Continue reading “Tricky Gmail Phishing Attack”