Skip to main content

How to Use Google Authenticator Without a Mobile Phone

Google’s two-factor authentication adds an extra layer of security to your Google Account. In addition to your username and password, you'll need to enter a code that Google will send you via text or voice message upon signing in. This drastically reduces the chances of having your Google account stolen by someone else because the hackers would have to not only get your password and your username, they'd have to get a hold of your phone.

What happens if there is no network coverage in your area, and you can’t receive SMS? For these dire situations, Google provides an app called Google Authenticator that can generate verification codes on your phone, offline. While the chances of you not having a cell phone in 2012 is rare, there is still a possibility that you may leave it in the office or your friend’s place.

How to generate verification code on the PC

  1. Install the GAuth Authenticator extension for Google Chrome.
  2. Go to your Google Account 2-factor authentication settings page, and under Mobile application, click on the Blackberry link (or Android/iOS link).
  3. You’ll get a 16-character secret key.

    gauth-chrome2

  4. Open the GAuth Authenticator chrome app. Click on the plus sign on the top left corner and enter the secret key. Give a name to the account so that you can identify it later.

    gauth-chrome

  5. GAuth Authenticator will generate a 6 digit verification code. Copy this code and enter on the verification page you got on step 3.

Once your “device” is verified, you’ll be able to generate verification code using GAuth Authenticator when you login to your Google account.

Google Authenticator for Java phones

The Google Authenticator app is available only for Android, iPhone, Windows Phone and BlackBerry mobile phones. If you are using an old Java based phone or even Symbian phone, checkout Google Authenticator for J2ME phones.

The process to verify your phone is the same – click on the Blackberry link (or Android/iOS link), get the 16-character code and use it to verify your device.

gauth-j2me1 gauth-j2me

Related: Misconceptions of Google Two-factor Authentication Debunked

Comments

  1. Not working for me with the chrome extension

    ReplyDelete

Post a Comment

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: