Online PC Support

OPS Technical Solutions : +1(833)-522-1003


Follow your Gmail® e-mail’s path

You must be sending and receiving many mails in your Gmail account daily. But, have you ever given a thought what happens to your mail once you hit the ‘send’ button after composing the content and e-mail ID of the recipient? What route is taken by the mail to travel from your Gmail account to your recipient’s Gmail account across the country or around the globe?

Mini-site launched

In an effort to make you aware of the functioning of this digital miracle, Google Inc. has unveiled a new mini-site named ‘The Story of Send. With the help of graphics and animations, the mini-site will explain you what happens to your Gmail e-mail once it’s shooted from your end.

Image and content source: Story of Send

Gmail® Priority Inbox indicators coming to all users

Gmail is very popular among users because of the simple interface and advanced features. Gmail ensures that users are able to easily send and receive e-mails. The entire interface is extremely attractive and user friendly. However, the best part about the mailing client is that, it is constantly updating various features for improving the service.

In Gmail, Google will make available the priority inbox indicator to all users. Users would be able to experience a completely new type of mailing tool with the priority inbox indicator in place. It help them to prioritise their mails in a much better way. The Priority Box feature will filter mails according to importance and save your time in checking mails. You can configure the settings according to your preferences for marking emails from specific people as important. Users can also choose to skip certain mails from the inbox. Labels can also be made for various categories of emails. If an important mail is incorrectly categorized by Gmail, you can click on the button ‘Mark as Important’. The classification is done by Gmail according to the pattern of sending mails. To use the feature of Priority Inbox, just click on the option ‘Show Priority Inbox’.

Google admits to Identity theft

Google recently gave another shock to the world. But this time the reason for the shock is something different. The Internet search engine giant, Google has recently admitted that it was spying on the computer passwords and emails across Britain.

“The Sunday Telegraph” has reported that the California based company was downloading personal data from wireless networks for its Street View project. In some of the cases complete email addresses with the passwords and along with the URLs were captured. However, the search engine giant has apologized for the action.

Alan Eustace, Google’s Vice-President of engineering and research has said- “We want to delete this data as soon as possible, and I would like to apologize again for the fact that we collected it in the first place.”

The Information Commissioner’s Office, the privacy watchdog has said that it will look into the matter. Google started to collect the pictures for its Street View project in 2008 with a panoramic camera mounted on a vehicle.

Google also confessed that the vehicles also gathered information related to the local wireless networks along with the devices that connects computer to the telecommunications network via radio waves. However, it is assumed that the wireless networks that were protected with a password were not affected by this. Google also confirmed that the information and the data it has gathered includes e-mails that were being sent by individuals at that time, the WebPages they were visiting along with the information like passwords.

The director of Privacy International, Simon Davies said- “It’s absolutely scandalous that this situation has developed and so many people have had their communications intercepted.

“The company must launch a full inquiry and produce a public report on exactly what happened, as well as release the audit it has already undertaken. There are a lot of questions that need to be answered about how and why it did this.”


Privacy International has already launched a complaint against Google earlier this year about the Google’s Street View project.

How to Unlock and Hide your IP

From the time immemorial the birth of Internet has altered things at a greater pace and has given birth to a new electronic world. The Internet helps you to send your letters any where within a fraction of seconds. But, in the modern era of touch screen one can not only send emails but also can go for video conferencing or sending short messages using a small computer called the “Mobile Phones”. The internet world is not only a wonderful era of emails, chatting, blogging, and surfing or purchasing but also an era which has many tracking system adhered to it. The tracking system helps one to trace those spammers who continuously infringe by sending illicit emails and loading our in box with unwanted material. The IP address which is actually Internet Protocol is just like the address of your computer from where you are sending the emails or blogging. The IP address not only helps to track the address of your computer but also aids by letting you know the location of the computer from where the email was posted.

But can you hide or unlock your IP address?

Can you prevent others from tracking your computer or IP address?

Yes, you can do all the above by simply following some easy instructions to achieve it and resolve your dilemma.


Step one

Before proceeding any further you need to find out a proper proxy website. You can find one by simply typing “proxy website” in any search engine and you will get a list of websites in front of you to tackle with. However links to some of the popular proxy websites are, and http://thunderunblock.infoetc. The websites mentioned before hand are amongst the most popular proxy websites available. The proxy website is like a gateway for you to enter in to the world of unblocking or hiding the IP address.

Step two

Then you are required to make appropriate changes under the proxy settings of your computer and you can find the proxy settings by right-clicking on the “Internet explorer” icon or any other web browser icon which you can find on the desktop of your computer screen. Access the “Internet options” tab and then click on the “proxy” tab and under that section make settings like check or un-check the desired settings you want to have. You can click on by enabling the cookies or disabling them and then you can also maintain the level of security like Local Intranet or other settings.

However, settings can be modified or changed according to requirements of the individual or needs of an individual.

Once you are done with the above steps, you can now browse internet and one can not only browse internet behind the proxy server but also can have their IP address hidden now.

How to Configure Microsoft Outlook 2003 to Receive Yahoo! Emails

Just like Google’s Gmail, Yahoo! has it own e-mail services which are widely used across the globe. Some of the Yahoo! e-mail services are paid and some are free depending upon your region. Yahoo! provides POP access to its free users and to the paid users who take the POP subscription. With POP access you can configure and download the Yahoo! mails in our computers Outlook or Outlook Express as both these Email clients support POP configuration. For Configuring any Email account using POP you would some vital information like the POP server address, the SMTP server address, the POP port numbers and the encryption type, the SMTP port number and obviously your Username and the Password. If you have this information you are ready to configure any Email account via POP in any Email client of your choice. In this article we will tell you how to configure you Yahoo! mail in Microsoft Outlook 2003.

To start with Open Outlook and if there is no Email account configured in it then you will get the add E-mail account wizard open else you need to start the Wizard by going to Tools menu. In Tools menu click on Email Accounts and then click on Add a New Mail Account. From the account type selection box you need to select POP3 and click on Next. In the User Information box fill in your username and the password and your Email ID. Now in the Incoming mail server POP3 box you need to fill in the server address of your mail. This varies in case of Yahoo and the correct server address can be obtained by calling Yahoo~ support and asking the POP server address for your email account. Similarly enter the Outgoing Mail Server SMTP address after getting it from Yahoo!. While entering the username in this window make sure that you just type the user name and do not add the ‘@’ sign followed by domain name. For example if your email id is “” then your user name would just be “test”. If you wish you can let Outlook save your password, or if wish to enter it each time you access outlook then you can leave it unsaved. Now click on the button which says More Settings and under the General Tab type a name by which this account would be identified. This is for local use only and any name can be given to it. Click on the second tab which is Outgoing Server and select My Server Requires Authentication. Further down select Use same settings as my incoming mail server. Now click on the last tab and select Save a copy on the server option if you want a backup to be always present on Yahoo! server. In the same tab enter the POP port number as 995 and SMTP port number as 587. Click on OK and close all the settings windows. Now click on Send/Receive and your Yahoo mails will start getting downloaded in your Outlook’s inbox.

What is System Restore?

System Restore and Its Features

One day, you are minding your own business, doing some work online or just listening to some music, when you are suddenly faced with cricket-noise-inducing silence and a blank screen. Maybe you’re watching a video that you waited patiently to download and a few minutes into the opening credits the movie pauses, along with your whole screen. Those are just some of the problems that will require you to use the System Restore in your Windows operating system.

What System Restore Can Do For You

System Restore will assist you in restoring the computer system to an earlier point when it was working at its optimum efficiency. This is the system’s version of an undo that will not affect your personal files like emails, documents or photos.

Certain installations of some programs and drivers might cause some unexpected errors or changes in your computer which will cause Windows to behave in an unpredictable way. Uninstalling the program often corrects the driver problem but a System Restore will undoubtedly help make the process of restoring the computer faster. It will return the status of your computer to an earlier date when it was working properly.

System Restore has a feature called system protection so you can regularly create and you can even save restore points on your computer which you can choose from. These certain restore points have information about registry settings and other system information that Windows will use. You can create restore points manually apart from the computer’s own saved restore points. You can find information about creating restore points on the option Create.

You can use the system image backups that were stored within the computer’s hard drive for your System Restore which are similar to the restore points that were actually made by system protection procedures. System image backups may contain both your system files and personal data, but your files will not be affected by System Restore. If you need to know more about system images you can find out on ‘What is a system image?’

If you plan on backing up files, System Restore is not what you need. It will not aid in recovering personal files that have been deleted or damaged. You are responsible for backing up your personal files and important data using a backup program. If you need more information regarding the necessary backing up important personal files, look at the Back up your files option.

Simple Ways to Enable System Restore

You can access System restore if you click the Start button. Using the search box, type in System Restore, after which you will see the results where you can click System Restore. You might be prompted for an administrator password and in this case you should type it to provide confirmation. You can see more information about system protection on ‘What is system protection?’

This information will help you in knowing what to do in case you come across problems during installation or downloading of foreign files. By being informed, you can make the process of maintaining your computer at its optimum level of performance.

Call Now: +1 833-522-1003
Call Now: +1 833-522-1003
Call Now: +1 833-522-1003