Skip to main content

Google’s Two-Step Authentication Enabled For All Accounts

The two-step authentication process, which has been available for Google Apps customers since September 2010, is being slowly rolled out to all Google users. It might seem a bit confusing and intimidating to some users, and definitely time consuming to set up, but it’s worth the hassle because of the robust protection it offers to your entire Google account and all the valuable data it holds.

What is two-step authentication?

Most of the login systems on the web uses ‘one-factor’ authentication where you enter one password and you’re in. But if that password gets compromised, you’re screwed. More secure systems require both a password and a physical card or dongle to login. These are called ‘two-factor’ systems, because they require both your password and another key, and are far more secure because a hacker probably isn’t going to have that physical token.

2-step-authentication

Google’s system uses your mobile phone as the physical keycard. Once you enable 2-step verification on your Account Settings page (if you don’t see it yet, don’t worry because Google is rolling it out over the next few days), you will be required to provide both your password and a security code that will be sent to you as a text message to your mobile phone, at the time of login. The security code is one time use only, so you don’t have to remember it.

account settings page

This might seem a hassle every time you login to Google, so you have the option to make the computer remember the verification code for 30 days.

For third-party applications like email clients and mobile devices you have to generate unique application-specific passwords that can be used for only that application. You'll only need to generate the new password for each application once unless you decide to revoke access to that application or device.

All this looks awfully complex, but they serve a useful purpose – and that is to provide enhanced protection to all users.

For detailed instruction on how to setup and use the two-step authentication, visit this help page.

Comments

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: