![]() |
Active Topics Memberlist Calendar Search |
| |
| News | |
| |
|
| Author | Message |
|
cmjg6l2pde
Newbie
Joined: Apr 29 2013 Location: United Kingdom Online Status: Offline Posts: 20 |
![]() Topic: cheap toms so it makes sense to revoke access toPosted: May 02 2013 at 10:12am |
|
can contact the editors at indiarealtime@wsj.com.Check out the main contributors to the blog and their bios here. An error has occured and your email has not been sent. Please try again. You must enter the verification code below to send. Invalid entry: Please type the verification code again.[标签:标题]
We sent an email to: Please click on the link inside the email to complete your registrationThis service is temporary unavailable due to system maintenance. Please try again later.The username entered is already associated withanother account. Please enter a different usernameThe email address you have entered is already in use.Please re-enter the email address.Louisa Gouliamaki/Agence France-Presse/Getty ImagesA Feb. 3, 2012 snapshot shows the hacked Greek ministry of justice website.A few years ago, someone hacked into my Google Account and took control of all the data associated with it, including my emails, videos I’d uploaded to YouTube, my family photos on Picasa, my address book, and even the search queries that I’d been typing into Google for years.It was a scary moment because my other non-Google accounts – like Twitter and Facebook – were also associated with that Gmail address, so there was a big risk of losing them too.Fortunately the story had a happy ending as the support team at Google quickly identified the breach and restored access to my account pretty soon,cheap toms.All this happened even though I used complex and lengthy passwords. There is a definite need to add another layer of security. Here are some suggestions:The easiest option is to turn on 2-step verification for your Google Account and then install the Google Authenticator app on your mobile phone. This is available for Android, iOS and BlackBerry devices. When you are trying to sign into your Google Account from another computer or mobile device, you will need the account password as before, but you will also have to enter a unique time-dependent code generated by the Authenticator app on your mobile phone,toms shoes discount. So if someone manages to get hold of your Google password, say through a key logger software, they still won’t be able to gain access without your mobile phone.If the Authenticator app is not available for your mobile phone, you can still enable the 2-step verification. Google will send you the unique code through a text message or a voice call.If you are planning to access your Google Account from a public computer, you might consider using a virtual on-screen keyboard to enter your Google credentials. Go to the Run box in the Windows Start Menu and type osk.exe to activate the virtual keyboard,toms shoes reviews. But the best method to bypass key loggers on public computers is a Live Linux CD – you can boot the “unknown” machine using the Live CD and it will leave no traces whatsoever once you exit the session.It’s also a good idea to check the list of services that are authorized to access your Google Account. Some of these services may have access to your Google data, so it makes sense to revoke access to those that you no longer use Related articles: |
|
IP Logged |
|
|
||
Forum Jump |
You cannot post new topics in this forum You cannot reply to topics in this forum You cannot delete your posts in this forum You cannot edit your posts in this forum You cannot create polls in this forum You cannot vote in polls in this forum |
|