5/6/2023 0 Comments Adium gtalk not authorizedFinally, you turn on 2-step verification and you're done. If you answer, "yes" that computer will be authorized for use for 30-days. Your computer will then ask you if you want it to remember the computer you're using. You then enter this code into the data entry box provided by your Web browser. In a matter of seconds, you'll get a call with your verification number. You can also choose whether to get your verification code by voice or SMS on your phone. From here, you'll enter the country your phone is registered I and enter your phone number. Once there, you'll need to choose "Using 2-step verification" from the menu. Next, you need to sign-in to your Google account and head to the two-step verification settings page. Google recommends that you use a mobile phone number as opposed to a landline or Google Voice number.You can use either, but I suggest you don't use a Google Voice number since that could trap you in a situation where you couldn't easily access any of your Google services You're going to need that because Google uses your unique phone and its number as its second factor. The first thing you'll need is a phone that will accept anonymous SMS (aka text) messages or voice calls. Here's how to set Google's two-step verification up. To use Google 2 step verification, you'll need your phone as well as your PC. What Google two-step verification adds to your security blanket is to get access to your Google account and all its services is that to break in a cracker needs not only your password but your phone as well. savvy friends, however, who swear by 1Password. If you use a different passphrase for each account, you limit your damage to that one service.Īnd, if you have trouble remembering all those passphrases-as we all do-I suggest you invest in a password management program. These days, as in both the Honan situation and the recent Dropbox breach, a major reason things went bad was that one password was used for multiple accounts. Second, use different passphrases for each of your accounts. "Always color outside the lines!" is both much easier to remember and far harder to break than say "Tr)ub4DORm1." ![]() ![]() First, don't use passwords, use passphrases. Since Google played a role in the Honan case and almost everyone uses some Google service or the other-and Apple doesn't support two-factor authentication-let's go over how to turn on Google's version of two-factor authentication: two-step verification.īefore jumping in that though here are some other basics. On the Web, two-factor authentication typically requires you have both a password and a phone with its unique number, which can be used as the item. As the name suggests it requires you to both show you know something, typically a password, and have a unique item that identifies you. If you've ever worked in a shop that required you both to show an ID card and enter a pin to go through a door, you've used it. ![]() Two-factor authentication is ancient IT technology. There are several ways to try to protect your online accounts and one of the more important of these is two-factor authentication. That could have been you, and it could have been worse. Do you really think security is too much trouble? That no one is ever going to bother with your accounts? Ask former Gizmodo employee Mat Honan if he feels that way after his accounts and devices were wiped clean.
0 Comments
Leave a Reply. |