Gmail raises limit to 4 GB (and counting), but you might hit it sooner

When Google introduced it’s free email service it offered 1 GB of space, much more than the competition at the time. Later the limit was doubled to 2 GB. It has been increasing on a counter since: As you watched you could see the KB figure of the limit steadily increase.

Two GB for email will last forever, right? Not quite. As a longtime Gmail user I first managed to hit the ceiling on one account less than two months ago, at 2.9 GB and therein lies a lesson, because I managed to hit the limit twice, for different reasons.

I was accessing the account in question via POP3. Mails were arriving in large numbers and I was picking them up from a mail client (Outlook Express via my spam filter), which explicitly deletes them from the mail server after pickup. Only my local hard disk should keep a copy. Nevertheless after some months all 2.9 GB on the account were in use and mails started getting rejected for lack of space.

I found I foolishly had opted to leave mails in the Gmail account even when the mail client had requested the mails to be deleted the from the server via POP3. Mails are either kept, archived or deleted. Gmail gives you that flexibility, but it means you can run out of space when you shouldn’t.

After mails started bouncing I went in and reconfigured the account to have any mails deleted that had been picked up via POP3. To create a safety margin I also went in and deleted several tens of megabytes of the oldest emails and emptied the trash, so the files were permanently deleted.

Soon after that mails bounced again. Here is what I found: When Gmail is configured to actually delete mails when a POP3 delete request arrives, it will not free up the space. It only moves the mail to its trash folder. It will not purge deleted emails from the trash if it runs out of space. Unless you go in manually, all these mails will stay around for another 30 days.

What this means in practice is that you need to leave enough space in your Gmail account for 30 days worth of email traffic or you’ll run out of space. Alternatively you periodically need to go in manually and tell Gmail to discard everything in the trash folder. If your monthly mail volume exceeds the Gmail mailbox limit you have no alternative but to manually empty the trash every couple of days.

The situation has eased a little bit because Gmail recently made more storage available, letting the limit count up rapidly to 4 GB and beyond, instead of the previous 2.9 GB. Paying customers get even more storage space.

Google’s intention with giving users more space is clear: They want their customers to keep files online, where they can be searched and edited with Google’s server-hosted online tools, rather than the desktop applications such as Microsoft Office that have been Microsoft’s cash cow until now. Google makes money through online ads, so it wants eyeballs on server-based applications such as Gmail which it controls.

I am not sure how well that strategy will work in the end. Personally I prefer to have all my data on a hard disk in my office or home, duplicated onto USB hard disks for security. I do not trust any company to always give me access when I need to. That’s why I use POP3 and not IMAP for email. If the server goes down I still have my data.

If I need to get access to my files while I’m away from home I will access my machines using remote access tools. Some people may feel like me, others like the idea of files that can be accessed from any PC via a website.

Irrespective of the success of server based file storage, even on the desktop there are now good alternatives to Microsoft Office, such as OpenOffice 2.3 which I have started using. I can view and edit just about any Microsoft proprietary data file without paying hundreds of dollars.

Between server-based tools offered by Google and others, full featured free Office competitors and increasing acceptance of Ubuntu and other Linux versions on the desktop and last but not least Microsoft’s toad called Vista that it hoped its user base would swallow eagerly, I can see trouble brewing for the monopolist in Redmont.

Update (2007-10-26):
A table in the source code of Gmail’s HTML pages reveals their planned schedule for increasing space. After reaching 4321 MB by October 23, the limit will steadily rise to reach 6283 MB by January 4, 2008. From there onwards the pace will slow down again, rising only about 1 GB per year. Of course they can revise this schedule any time, so your mileage may vary 😉

// Estimates of nanite storage generation over time.
var CP = [
[ 1175414400000, 2835 ],
[ 1192176000000, 2912 ],
[ 1193122800000, 4321 ],
[ 1199433600000, 6283 ],
[ 2147328000000, 43008 ],

Anti-Fraud sites under attack

Several of the main sites dedicated to fighting online scams are currently inaccessible because of a “Denial of service” (DoS) attack.

Fraudwatchers.com, aa419.org, 419eater.com and occassionally thescambaiter.com have been offline. Thescambaiter.com and 419eater.com are two of the oldest sites that fight “419” scams (named of the section in the Nigerian penal code that prohibits fraud). Fraudwatchers.org and aa419.org deal with a wider range of online scams, Nigerian scams as well as Escrow and commercial scams often run by Eastern European crime rings.

It is still unclear who is behind the attack. The selection of websites for this concurrent attack suggests Nigerian scammers, but technically the type of attack is more typical for Eastern European scammers. It may well be a sign of increased cooperation between both crime communities.

The exposure of websites to the danger of cyber attacks in a more and more net-centric world was highlighted earlier in the year when websites in Estonia were crippled for several days in large scale attacks, many of which originated from next-door Russia, with which Estonia has had a strained political relationsship.

Throughout this year criminals have been building the Storm botnet, a network of remote-controlled zombie computers infected with Malware that lets the criminal masters download and run any software on them that they chose. So far the Storm botnet has been used primarily fo sending pump-and-dump penny stock spams (see here). However, experts estimate the network as being comprised of between 1 and 10 million computers, far larger than needed to spam every computer on the planet. It’s probably the only peer-to-peer network comparable in size to eBay’s voice-over-IP giant Skype, which currently has 4 to 7 million concurrent online users.

Botnets have the potential to cripple the information infrastructure that countries increasingly rely on. Greater efforts need to be made to prevent infections, clean up or quarantaine infected computers and to track down the criminals who control them.

Robert Scoble on “How Bill Gates beat Gary Kildall”

Gary Kildall, creator of CP/M, the first industry standard operating system for personal computers

If you’re interested in the history of personal computers and the software industry, Robert Scoble’s one hour show on “How Bill Gates beat Gary Kildall in OS war” is well worth watching. In an interview Tom Rolander, who worked with Gary Kildall when IBM came to talk about an operating system for their yet unannounced PC, talks about how Microsoft came to pick up the contract that set the foundation for its Windows empire, while DRI lost it’s role as the operating system standard of the early microcomputer industry.

Also mentioned is the dismissal of a lawsuit by Tim Paterson, the author of QDOS aka SCP-DOS, which was renamed IBM PC-DOS and MS-DOS by IBM and Microsoft. You can download the ruling here. Paterson had sued author Harold Evans for defamation after being mentioned in a chapter of Evans’ book “They Made America” on Gary Kildall.

On July 25 judge Thomas S. Zilly ruled that:

Plaintiff Tim Paterson has failed to provide evidence that statements in Sir Harold Evans’
chapter on Gary Kildall are provably false or defamatory. The statements in the Kildall chapter constitute non-actionable opinion protected by the First Amendment, or statements
that are not provably false. In addition, as a limited purpose figure Mr. Paterson has failed to
provide any evidence that Sir Harold Evans acted with actual malice.

CrossLoop beta released

CrossLoop, a secure screen sharing utility for anyone who uses a computer with a broadband connection, is now in beta testing. If you use computers you sooner or later encounter problems where you need somebody’s help to solve them. Often it can be difficult to describe the symptoms or the solution. Whether it’s helping a parent or a customer, CrossLoop makes remote problem solving and cooperation easy and intuitive. Installed and running in under two minutes, it lets you share access to the same computer, looking at the same screen and (optionally) with shared use of the keyboard and mouse. It’s also handy for running a slide show or demonstrating the use of some software to someone hundreds or thousands of kilometres away. Complex software installations, remote troubleshooting — it’s almost like you’re both sitting in front of the same computer. CrossLoop does this without complex setup such reconfiguring routers and firewalls and leaves no backdoors. All data is securely encrypted using 128-bit encryption, so no one can snoop in. And it’s all free 🙂

CrossLoop

Disclaimer: I work for the company that makes this product. As someone who lives in Japan, with family, friends and colleagues in Europe, the USA and elsewhere this is a natural product for me to work on and use myself.

Other blogs that talk about CrossLoop:

You can add comments and ratings to the digg review mentioned above by clicking the “join digg for free” link below the list of user comments.

A strange type of spam

On June 15 I received some unusual spam. It arrived from an IP address in Turkey (88.224.75.25) that is listed by SpamHaus.

Subject: Credit card processing courtiers

Hello,

Im Adam Aministers from credit card processing company. We can offer now good rates and bi-weekly payouts. If you are still looking for credit card processing, please contact me by ICQ 192687669

With regards,
OffshoreInstantProcessing
Key account manager

A credit card processor who would handle card data for all your customers has to be trustworthy. Someone who sends spam, doesn’t have a website and can not be contacted via either e-mail nor the telephone (let alone gives a physical address) is the exact opposite. What merchant in his right mind would do business with these people?

My suspicion is that the credit card transactions these guys handle in themselves are illegal (e.g. software piracy, child pornography).

Communications via ICQ are very common in Russian spammer and online fraud circles.

Toshiba Gigashot GSC-R30 / GSC-R60 Hard Disk Camera

Gigashot GSC-R30 at AmazonThe Toshiba Gigashot GSC-R30 is my fourth video camera since I started filming for a hobby in 1990. It is compact, fairly lightweight and records hours of DVD-quality video and/or tens of thousands of digital pictures without any change of media. I bought it in early April 2006 (my previous camera, a Mini DV model by Sony, had developed problems with its zoom after a close encounter with sea water).

Initially I was considering another DV model or maybe a DVD-R recorder, but Toshiba’s new hard disk recorder caught my eye in the store. Its 30 GB capacity far exceeds the 1.3 GB of DVD recorders or various memory card-based recorders. The R30 includes a 30 GB tiny 1.8″ hard disk while the slightly more pricey R60 features a 60 GB drive. That’s enough for almost 7 hours / 14 hours of DVD-quality video or 30,000 / 60,000 digital pictures at 2 Megapixel.

The 60 GB model also includes a docking station or cradle for recharging or connection to the computer. The cradle provides an Ethhernet network connection on top of the USB connection, which may be useful if you want to view clips from more than one machine, but the R60 was not in stock when I purchased the camera.

At home I can hook up the camera to my computer using a USB 2.0 cable and it acts just like a USB 2.0 hard disk to the computer. I can browse the folder tree inside the camera using Windows Explorer. Any video clip on there can be played using the Windows Media Player or an MPEG-2 player of your choice. Burning a DVD is fairly easy.

Because of the MPEG-2 recording format, no conversion with loss of picture quality is required to produce a DVD on your computer. I would recommend backing up the files inside the camera onto your computer’s main hard drive or onto an external USB drive, even before you burn DVDs.

Upgrading your hard disk with Acronis True Image

Last Saturday the hard disk in my notebook computer started making strange noises. It performed lengthy retries and eventually produced write errors from Windows. This is usually a sign that a drive is on it’s way out. Not a good way to start a relaxing weekend, I thought.

My notebook is a 6 year old Dell. I bought it second hand on eBay. A disk upgrade from 12 GB to 40 GB about 4 years ago and a more recent memory upgrade to 512 MB have kept the 650 MHz Pentium III machine quite viable for me. I don’t see the point in purchasing more CPU power than I need, just as long as the rest of the system is adequate. It’s been quick enough and it was a reliable performer. Though I was worried about how long it would last, I was not keen on having to reinstall all the software on it if I were to move to a new machine.

Most of my data these days sits on external USB 2.0 hard disks. That way, if one machine goes down I just plug the drive into a USB port on another box and life goes on. I keep copies of the same data on multiple drives, but still, you always need a C: drive. The Windows registry and all the application settings in there don’t travel that easily. With the disk errors announcing the eventual failure of the drive it looked like I didn’t have much of choice.

I went out to local computer stores and ended up buying two items:

  • a 300 GB USB drive (IO DATA / Maxtor). Eventually I didn’t need this for the upgrade, but my 160 GB USB drive had too little space left for making a 40 GB image and I would have had to get something bigger soon.
  • a 60 GB USB notebook drive (Logitec) – I was originally looking for an internal drive (2.5″), but the USB version proved very useful.

My first approach
To be on the safe site, I first copied a few essential folders from the internal drive to the USB drive. Next I installed PowerQuest Disk Image 7 (DI7), which allows you to copy an entire drive to an image file on another drive and later restore it to another disk. That’s how the upgrade from the original 12 GB drive had been done. I had no luck. As soon as I started DI7 the program terminated, no error message. Probably the activiation mechanism realized I had previously activated the software on another machine, a desktop which I had used to try to copy the notebook drive to another internal drive because there I can hook up multiple drives to ATA cables.

I talked to a friend and he mentioned Acronis True Image. At just under $50 it was $20 cheaper than Noprton Ghost, the equivalent product from Symantec, which acquired PowerQuest’s product line. I found the product was available with a 15 day free trial and the reviews looked good.

Later in the afternoon my hard disk had recovered somewhat, but I still wanted to move on to the new drive because computer problems that go away on their own have this nasty habit of coming back on their own…

I installed Acronis on the machine (download Acronis True Image 9.0 Home 15 days trial here) and hooked up the notebook drive. It first wasn’t recognized because my notebook USB card did not supply bus power, but once I hooked up the USB power cable to the USB hub of my desktop monitor the drive came up. I selected the “Clone Disk” option, asking it to copy from the first hard disk to the USB hard disk. Then Acronis told me it was going to reboot the computer, which it did. I left it like this overnight.

In the morning I rebooted and found the complete original data on the USB drive. I then shut down the machine, removed the 40 GB notebook drive, opened the external USB case and transplanted the drive inside the notebook. The first reboot was unsuccessful, Windows reset the machine, but after the second reboot I was in business. I ran scandisk, viewed a couple of folders, everything worked. I had all my data and programs on a new drive and 30 GB of extra free space. This is excellent. I fully recommend Acronis True Imagine for anyone who wants to upgrade a hard disk in their machine. Using a USB hard disk as the target drive this process is fairly painless even if only one hard disk at a time can be fitted inside the machine.

Acronis and network drives
There was one small hitch, which I found later in the day. I could no longer map a network drive to the 160 GB USB drive on my notebook from other machine in the network. The NET USE command from a DOS prompt gave the following error message:

System error 1130 has occurred.

Not enough server storage is available to process this command.

A quick Google search found a ready-made solution to the problem. Aparantly, Acronis installs a driver that watches writes to the disk drive so that it can determine which data needs copying on an incremental backup. This driver causes problems for the network server on Windows. The solution is to set a registry value in Windows to make the network server allocate more space when handling disk requests.