You will need
- a private business card;
- – notebook, PDA and other devices for recording data;
- – access to the Internet;
- – access accounts on other multiplayer resources;
- – a sheet of paper and a pen.
Instruction
1
View e-mail on my business card in case if you have lost access рабоче1 mail or if the card indicated personal mailbox. The first domain address will be your username. This advice will help those who use the cards.
2
Pick up all working notes in diaries, notebooks, and other devices that are normally used for entering the information. If you have a notebook for recording all registration data, review the entries in it. You need to find the write your own mailing address. In notebooks there is a special liner for filling in personal data of the owner, where also there is a column of e - mailthat could be filled.
3
Remember, for what purposes you used this box, and who were in correspondence. If you have the opportunity to contact their email contacts, ask them to hold the archive of correspondence and to tell you the full name of your mailbox. In that case, if the box is mentioned at check-in social networks and other multiplayer resources, these are also available.
4
Try to remember the maximum number of accounts tied to the lost mailbox and visit each of them. Alternately, examine account settings and existing registration data that you have entered. They have to have e - mail.
5
Check the history of outgoing messages on the phone and in instant messaging, where you might transmit your email to any of the interlocutors. If in the archives of such information does not, try to remember who of your friends or colleagues you could ever give your e - mail.
6
Open the mailbox server on which is located the box with the computer that you used to activate your account one last time. In that case, if the browser settings when opening the box was activated the memory function of the login and password, then when you double click on the corresponding column a context menu will appear with a listing of usernames that have ever been entered into it.
7
Make a list of possible options login in that case, if the above recommendations did not lead to the result. Take a sheet of paper and a pen, and write all the existing usernames that you use now on the Internet. Try to imagine what could be login and password of that mailbox. Consider the fact that sometimes the preferred option, the mail server may reject as duplicate already existing mailbox. This forces users to remember the failed login.
8
But when the system notifies the introduction of a different login, the user is often only slightly modifies an existing one. Some services to help offer a list of possible options. Thus, make a maximum number of options for login and methodically try each one in the box to activate.