Skip to main content

Twitter Starts Rolling Out Two-Factor Authentication

Twitter has finally joined the growing league of companies and services that offer two-factor authentication to secure accounts of users from being stolen or misused. Account hijack is serious matter and no company is immune, especially high profile ones such as Twitter.

To get started with two-factor authentication, go to Twitter’s account settings page, scroll down to the section “Accounts security” and check the box that says “Require a verification code when I sign in.”

twitter-2-factor

Add and verify your phone number. After that, an SMS message containing an authentication code will be sent to a nominated phone which will be used to complete the login procedure.

The blog post says: “With login verification enabled, your existing applications will continue to work without disruption. If you need to sign in to your Twitter account on other devices or apps, visit your applications page to generate a temporary password to log in and authorize that application.”

But unlike other authentication systems, such as that of Google and Microsoft, the code has to be generated and entered every time users sign into Twitter through its website. There is no way to “authenticate” a computer for future code-free logins. Also, there is no authenticator app that you can run locally on your phone. This means, that in areas where signal reception is poor or there is a network outage, you’ll not be able to login to Twitter.

Twitter played a big role in Egypt and Libya during the 2011 revolution, where protesters used the social media site to organize action plans when other means of communication was either shut down or censored. Twitter is also usually the first to break news of disasters and violence when phone communications break down. Without an alternative way to receive or generate authentication code that doesn’t rely on a network service provider, fast dissemination of news for which Twitter is famous, could no longer happen.

Comments

Popular posts from this blog

How to Record CPU and Memory Usage Over Time in Windows?

Whenever the computer is lagging or some application is taking too long to respond, we usually fire up task manager and look under the Performance tab or under Processes to check on processor utilization or the amount of free memory available. The task manager is ideal for real-time analysis of CPU and memory utilization. It even displays a short history of CPU utilization in the form of a graph. You get a small time-window, about 30 seconds or so, depending on how large the viewing area is.

How to Schedule Changes to Your Facebook Page Cover Photo

Facebook’s current layout, the so called Timeline, features a prominent, large cover photo that some people are using in a lot of different creative ways. Timeline is also available for Facebook Pages that people can use to promote their website or business or event. Although you can change the cover photo as often as you like, it’s meant to be static – something which you design and leave it for at least a few weeks or months like a redesigned website. However, there are times when you may want to change the cover photo frequently and periodically to match event dates or some special promotion that you are running or plan to run. So, here is how you can do that.

Diagram 101: Different Types of Diagrams and When To Use Them

Diagrams are a great way to visualize information and convey meaning. The problem is that there’s too many different types of diagrams, so it can be hard to know which ones you should use in any given situation. To help you out, we’ve created this diagram that lays out the 7 most common types of diagrams and when they’re best used: