Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

Tip of the Week: Quickly and Easily Find That Long Lost Gmail Message

b2ap3_thumbnail_gmail_app_400.jpgAs great as Gmail is, sometimes, you might have difficulty locating certain messages, especially if they were sent months, or even years ago. If you happen to misplace a message, you can use the search feature to locate it.

Performing a search in Gmail is as simple as using the search bar at the top of the screen, just above the inbox. You can use this search feature for a basic inbox search, but there are options that allow for more comprehensive searches. Here are three steps that you can take to perform better Gmail searches for your missing or desired messages.

First, enter your search results in the search bar. If you don’t find your desired messages, click the down arrow:

ib 1

A window will pop up that allows you to sort through your messages according to certain criteria, like sender, receiver, subject, keywords, etc. You can also omit certain results by taking advantage of the “Doesn’t have,” field. Use these checkboxes to determine whether or not the messages have attachments, or you can apply a range for size or date to help you narrow down the search results.

One of the most notable features of Gmail’s search function is the top button that defaults to “All Mail.” By clicking it, you’ll be provided several options that you can use to search through specific parts of your Gmail account, including inbox, sent messages, spam, and trash. This helps to make sure that you don’t miss messages in the future.

ib 2

If there are messages in your spam or trash that match your search, Gmail will display a message underneath your inbox that says, “Some messages in Trash or Spam match your search. View messages.” By clicking the link, you’ll be shown the messages.

These updates to Gmail only apply to the web application at this time, as more comprehensive search functions aren’t currently available on the mobile application. That doesn’t mean they won’t arrive in the near future, though.

For more great tips, be sure to subscribe to Voyage Technology’s blog.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 10 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Efficiency Network Security User Tips Internet Malware IT Support Privacy Google Phishing Email Workplace Tips Computer IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Productivity Backup Quick Tips Passwords Cybersecurity Saving Money Communication Data Backup Managed Service Smartphone Android Upgrade AI Data Recovery Business Management VoIP Smartphones communications Disaster Recovery Mobile Devices Windows Social Media Browser Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Information Automation Artificial Intelligence Facebook Miscellaneous Cloud Computing Covid-19 Holiday Training Gadgets Remote Work Server Managed Service Provider Outsourced IT Compliance Employee/Employer Relationship IT Support Encryption Spam Office Windows 10 Data Management Business Continuity Government Wi-Fi Business Technology Windows 10 Bandwidth Virtualization Blockchain Vendor Two-factor Authentication Mobile Office Data Security Apps BYOD Mobile Device Management Tip of the week Chrome Gmail Budget Managed Services Voice over Internet Protocol Apple Networking App Employer-Employee Relationship Computing Hacker HIPAA Information Technology Applications Avoiding Downtime Marketing Access Control Office 365 Conferencing WiFi How To BDR Operating System Computers Router Virtual Private Network Risk Management Website Health 2FA Office Tips Analytics Help Desk Augmented Reality Retail Storage Password Bring Your Own Device Healthcare Managed IT Services Big Data Vendor Management Customer Service Cybercrime Solutions Physical Security Display Printer Paperless Office Infrastructure Windows 11 Monitoring Firewall Document Management Excel Remote Workers The Internet of Things Scam Data loss Telephone Social Cooperation Free Resource Project Management Going Green Patch Management Windows 7 Save Money Remote Monitoring Vulnerability Microsoft 365 End of Support Content Filtering Hacking IT Management Presentation VPN YouTube Meetings Cryptocurrency Employees Wireless Technology Integration Computer Repair Modem User Tip Processor Mobile Security Virtual Desktop Data storage LiFi Holidays Word Data Storage Outlook Smart Technology Supply Chain Machine Learning Video Conferencing Money Humor Managed Services Provider Virtual Machines Professional Services Saving Time Maintenance Safety Antivirus Managed IT Service Sports Mouse Downloads iPhone Licensing Administration Entertainment Vulnerabilities Data Privacy Images 101 Robot Customer Relationship Management Multi-Factor Authentication Mobility Settings Telephone System Cost Management Printing Wireless Content Remote Working Unified Threat Management Wearable Technology Memory Vendors Hosted Solution Motherboard Data Breach Typing Comparison Google Play Be Proactive Health IT Directions Videos Assessment Electronic Health Records Permissions Workforce Network Congestion Knowledge Google Drive User Error Wasting Time Threats User Trend Micro Specifications Security Cameras Workplace Strategies Microchip Internet Exlporer Software as a Service Fraud Meta Point of Sale 5G Experience Username IP Address Google Docs Managing Costs Amazon Unified Communications eCommerce Bitcoin Network Management Black Friday SSID Running Cable Tech Support Database Surveillance Google Wallet Virtual Assistant Outsource IT Monitors Media IT Technicians Virtual Machine Environment Recovery Cookies Hard Drives Windows 8 Cyber Monday Medical IT Laptop Websites Proxy Server Reviews Tactics Development Domains Drones Hotspot Transportation Small Businesses Electronic Medical Records SharePoint Mirgation Hypervisor Displays Nanotechnology Optimization Refrigeration PowerPoint Halloween Shopping Addiction Public Speaking Lenovo Language Employer/Employee Relationships Outsourcing Writing Navigation Virtual Reality Management PCI DSS Lithium-ion battery Chatbots Screen Reader Hacks Server Management Distributed Denial of Service Workplace Entrepreneur Scary Stories Private Cloud Gig Economy Service Level Agreement Internet Service Provider Superfish Computing Infrastructure Teamwork Hiring/Firing Identity Theft Fun Deep Learning Evernote Paperless Twitter Regulations Compliance Identity Bookmark Smart Tech Memes Undo Co-managed IT Error Social Engineering Download Net Neutrality Alerts SQL Server Technology Care Education History Business Communications Remote Computing Financial Data Browsers Smartwatch Connectivity IT Mobile Computing Break Fix Scams Search Upload Procurement Azure Hybrid Work Tablet Cyber security Application Best Practice Multi-Factor Security Tech Human Resources Alert Social Network Telework CES IoT Communitications Managed IT Dark Web Cables Buisness File Sharing Dark Data How To Trends Supply Chain Management IBM Legal IT solutions Regulations Business Growth Google Calendar Term Google Apps Notifications Customer Resource management FinTech Data Analysis Star Wars IT Assessment Microsoft Excel IT Maintenance Travel Cortana Gamification Flexibility Techology Staff Value Business Intelligence Google Maps Social Networking Alt Codes Legislation Shortcuts Organization Fileless Malware Digital Security Cameras Smart Devices Competition Ransmoware Downtime Unified Threat Management

Blog Archive