Quantcast
Channel: The Tech Guy - two-factor authentication
Browsing all 14 articles
Browse latest View live

Image may be NSFW.
Clik here to view.

Is it possible to reverse engineer Google Authenticator to figure out the...

Episode 907RobertBurbank, CAAll authenticators are doing the same thing. It's a time-based, one-time use pass code. There's no data going back and forth between the authenticator app and Google, they...

View Article



Image may be NSFW.
Clik here to view.

Apple Introduces Two-Factor Authentication for Apple ID

Episode 963Apple has had a lot of security issues as of late, one of them relating to its Apple ID "forgot password" system. It was possible for anyone to gain access to another user's account simply...

View Article

How can I see if someone is trying to access my gmail account?

Episode 963CarnegNorth Hollywood, CACarneg uses Apple Mail to download Gmail onto his computer, and he recently got an email from Google that someone was trying to access his account. So he tried to...

View Article

Keep Your Data Secure in the Cloud

After the recent iCloud security breach that released private celebrity photos, you may be wondering what you can do to protect your data in the cloud. Apple has released a statement saying that it was...

View Article

Prevent Your Email Account From Being Hacked

If you've had your email account hacked, then it may be time to take further security measures to keep it from happening in the future. Here are some simple steps you can take right now to better...

View Article


How to Set Up Two-Factor Authentication

Leo has talked a lot on the Tech Guy show about using two factor authentication wherever possible to ensure the security of your online accounts. Two factor authentication requires more than just a 1...

View Article

Image may be NSFW.
Clik here to view.

How does Apple's two-factor authentication work?

Episode 1457EdClairemont, OKEd set up two-factor authentication on his Mac. But it when he logs into his Apple account, it sends the two-factor authentication code to his Mac. How can that be secure?...

View Article

Image may be NSFW.
Clik here to view.

Is it possible to reverse engineer Google Authenticator to figure out the...

Episode 907RobertBurbank, CAAll authenticators are doing the same thing. It's a time-based, one-time use pass code. There's no data going back and forth between the authenticator app and Google, they...

View Article


Image may be NSFW.
Clik here to view.

Apple Introduces Two-Factor Authentication for Apple ID

Episode 963Apple has had a lot of security issues as of late, one of them relating to its Apple ID "forgot password" system. It was possible for anyone to gain access to another user's account simply...

View Article


How can I see if someone is trying to access my gmail account?

Episode 963CarnegNorth Hollywood, CACarneg uses Apple Mail to download Gmail onto his computer, and he recently got an email from Google that someone was trying to access his account. So he tried to...

View Article

Keep Your Data Secure in the Cloud

After the recent iCloud security breach that released private celebrity photos, you may be wondering what you can do to protect your data in the cloud. Apple has released a statement saying that it was...

View Article

Prevent Your Email Account From Being Hacked

If you've had your email account hacked, then it may be time to take further security measures to keep it from happening in the future. Here are some simple steps you can take right now to better...

View Article

How to Set Up Two-Factor Authentication

Leo has talked a lot on the Tech Guy show about using two factor authentication wherever possible to ensure the security of your online accounts. Two factor authentication requires more than just a 1...

View Article


Image may be NSFW.
Clik here to view.

How does Apple's two-factor authentication work?

Episode 1457EdClairemont, OKEd set up two-factor authentication on his Mac. But it when he logs into his Apple account, it sends the two-factor authentication code to his Mac. How can that be secure?...

View Article
Browsing all 14 articles
Browse latest View live


Latest Images