Amazines Free Article Archive
www.amazines.com - Wednesday, October 17, 2018
Read about the most recent changes and happenings at Amazines.com
Log into your account or register as a new author. Start submitting your articles right now!
Search our database for articles.
Subscribe to receive articles emailed straight to your email account. You may choose multiple categories.
View our newest articles submitted by our authors.
View our most top rated articles rated by our visitors.
* Please note that this is NOT the ARTICLE manager
Add a new EZINE, or manage your EZINE submission.
Add fresh, free web content to your site such as newest articles, web tools, and quotes with a single piece of code!
Home What's New? Submit/Manage Articles Latest Posts Top Rated Article Search
Google
Subscriptions Manage Ezines
CATEGORIES
 Article Archive
 Advertising (133268)
 Advice (160743)
 Affiliate Programs (34733)
 Art and Culture (73614)
 Automotive (145483)
 Blogs (74984)
 Boating (9837)
 Books (17129)
 Buddhism (4122)
 Business (1327909)
 Business News (426289)
 Business Opportunities (366242)
 Camping (10947)
 Career (72722)
 Christianity (15832)
 Collecting (11636)
 Communication (115036)
 Computers (241925)
 Construction (38957)
 Consumer (49617)
 Cooking (17054)
 Copywriting (6567)
 Crafts (18206)
 Cuisine (7532)
 Current Affairs (20367)
 Dating (45756)
 EBooks (19677)
 E-Commerce (48182)
 Education (185088)
 Electronics (83420)
 Email (6389)
 Entertainment (159758)
 Environment (28924)
 Ezine (3038)
 Ezine Publishing (5443)
 Ezine Sites (1552)
 Family & Parenting (110872)
 Fashion & Cosmetics (196366)
 Female Entrepreneurs (11839)
 Feng Shui (130)
 Finance & Investment (310191)
 Fitness (105761)
 Food & Beverages (62803)
 Free Web Resources (7936)
 Gambling (30211)
 Gardening (25056)
 Government (10513)
 Health (628946)
 Hinduism (2156)
 Hobbies (44025)
 Home Business (91542)
 Home Improvement (251191)
 Home Repair (46090)
 Humor (4797)
 Import - Export (5444)
 Insurance (45077)
 Interior Design (29540)
 International Property (3485)
 Internet (190947)
 Internet Marketing (146273)
 Investment (22822)
 Islam (1168)
 Judaism (1357)
 Law (80443)
 Link Popularity (4592)
 Manufacturing (20794)
 Marketing (98719)
 MLM (14136)
 Motivation (18208)
 Music (26993)
 New to the Internet (9475)
 Non-Profit Organizations (4048)
 Online Shopping (129601)
 Organizing (7796)
 Party Ideas (11852)
 Pets (38083)
 Poetry (2234)
 Press Release (12665)
 Public Speaking (5618)
 Publishing (7522)
 Quotes (2407)
 Real Estate (126595)
 Recreation & Leisure (95227)
 Relationships (87412)
 Research (16148)
 Sales (80291)
 Science & Technology (110112)
 Search Engines (23445)
 Self Improvement (153060)
 Seniors (6219)
 Sexuality (35932)
 Small Business (49274)
 Software (82908)
 Spiritual (23439)
 Sports (116451)
 Tax (7657)
 Telecommuting (34073)
 Travel & Tourism (306753)
 UK Property Investment (3117)
 Video Games (13420)
 Web Traffic (11722)
 Website Design (56767)
 Website Promotion (36554)
 World News (1000+)
 Writing (35748)
Author Spotlight
MARC DESCHAMPS

Marc Deschamps is a professional content creator and digital marketing entrepreneur. He runs a numbe...more
ALEN OWEN

I am an essay writer with vast experience in data analysis, PowerPoint writing and research paper ed...more
HANNA ADMIN

Are you married, but not dead? Interested in discreet married dating? Welcome to FindNewPassion.com ...more
BRIAN WILSON

I am a qualified internet marketing professional and content writer with more than 10 years of exper...more
DERRICK REDE

I am Derrick Rede, glad to share the latest trends and solution to motorcycle loves. Motopartscente...more


How to Avoid Being Hacked, Part 2 - Two-Factor Authentication by Steve Burgess






How to Avoid Being Hacked, Part 2 - Two-Factor Authentication by
Article Posted: 08/06/2017
Article Views: 1303
Articles Written: 36
Word Count: 1002
Article Votes: 0
AddThis Social Bookmark Button

How to Avoid Being Hacked, Part 2 - Two-Factor Authentication


 
Computers,Email,New to the Internet
How to Avoid Being Hacked, Part 2 – Two-Factor Authentication, by Steve Burgess, 2017

Multi-factor authentication (MFA) makes it much harder for a hacker to get access to your online stuff, and the most common form of consumer MFA is two-factor authentication (2FA). A very common form of 2FA is the debit card. One factor is the card itself, which contains magnetic identifying info (these days, a chip), and a PIN that you provide when you stick the thing in an ATM machine. It’s simple and fairly good at keeping others out of your ATM-accessible cash. 2FA is important for your online accounts, such as email and your iCloud accounts.

While I admit it can be a bit of a pain to have to do something additional to get into your account, it’s far less of a pain than having one’s identity stolen, losing access to your email, or answering to your friends who wonder why you have said such crazy things about them (unless, of course, you actually said those crazy things!). Or, heaven forfend, someone logging in as you on one of your gaming accounts.

Here’s how 2FA or two-step authentication works for a couple of different online account types. (Note, these services change things up from time to time, so it’s good to keep abreast of such changes.)

Setting up Google 2-Step verification

First you log in with user name and password (we’ll get to choosing smart passwords in Part 3) to your Gmail account. There should be an avatar in a circle near the upper-left hand corner of the window. Maybe it’s even a photo of you. Click on it and you’ll see “My Account.” (Incidentally, this changes every couple of years) On the new window that opens up, click on “Sign-in & security.” Click on “2-Step Verification,” then on “Get Started.” Time to enter your username and password again. Enter a phone number and click on whether you want to receive a text or a phone call. Then you magically get a text or phone call with a 6-digit verification code. Type it in and select the option to turn on 2-step verification. It’s that easy. Okay, it’s several steps, but not that hard.

It may be that you prefer to collect your Gmail with some other app, like Outlook, rather than using a browser to go to the Gmail page for your mail. If so, it may be that once you’ve turned on two-step verification, your Outlook (or other app) keeps telling you that you have the wrong password, even though you know darn well it’s right. This has happened to me. You probably need to have Google give you a specific app password that Google will generate for you. You’ll need to go to the App passwords page, which at the time of this writing is here.

Select the app you want it for (if Outlook, then you would select “Mail”), then the device you are using (Google magically presents a list of the devices you use with their services). Then select “Generate.” It will show you a 16-digit number in a yellow bar for you to use as your new password for that app (Outlook, eg) on that device (don’t enter the spaces). You can save that password in your app and you may need that number again in the future.

Yahoo!

Yahoo! is similar: sign into your account, go to the account security page, click on “two-step verification,” and toggle the button there to turn it on. Select an option to get a text or a phone call for verification. Enter the code that comes to you via text or phone call. At this point, you can create an app password, similar to the Google process above for your various apps like Outlook or Apple (iOS) Mail.

iCloud

Now, let’s set up 2FA on your iCloud account. First, you have to have a passcode set on your iPhone or iPad.

Click on the Settings app. If your device uses iOS 10.3.3, click on your name (or the name of the account you use to sign on), then on “Passwords & Security.” Did I mention that this will change as Apple keeps us on our toes by changing everything up once we’ve gotten comfortable with the previous version? In the most recent previous version, you would have clicked on Settings, and then on iCloud, then your name, then Password & Security. But I digress…

Now tap “Turn on two-factor authentication.” Be prepared to answer some security questions – which we’ll be discussing in a future article – and then enter the phone number where you want to receive the code for 2FA, and as previously, select whether you want a phone call or a text.

Macintosh

For a Mac, open System Preferences, and select iCloud, and then “Account Details.” You might have to login using your Apple credentials. As above, answer your security questions if it asks, enter the phone number where you want to receive calls or texts for verification. Once again, a magical robot instantly sends you the code and you have to enter that into the field that awaits your answer.

Once it’s turned on, you’ll get a message asking for approval if an unknown device or location signs onto your account. Note that on a Mac, that notification can sometimes be on a window that is hidden behind another, so look for that if you find you’re having troubles with getting the approval request.

Speaking of troubles, it seems like a lot of work to have two-factor authentication, but once it’s set up, it’s not too much of a pain and will add considerable safety to your accounts, as well as considerable barriers to potential hackers. So do it!

Next time, we’ll discuss passwords, passcodes, and why you shouldn’t fill out those fun questionnaires that all of your friends send you.

Next, in part three: Choosing smart passwords and secret questions (aka, giving away the form).

Related Articles - hacking, email, cybersecurity, data safety,







Email this Article to a Friend!

Receive Articles like this one direct to your email box!
Subscribe for free today!

 Rate This Article  
Completely useless, should be removed from directory.
Minimal useful information.
Decent and informative.
Great article, very informative and helpful.
A 'Must Read'.

 

Do you Agree or Disagree? Have a Comment? POST IT!

 Reader Opinions 
Submit your comments and they will be posted here.
Make this comment or to the Author only:
Name:
Email:
*Your email will NOT be posted. This is for administrative purposes only.
Comments: *Your Comments WILL be posted to the AUTHOR ONLY if you select PRIVATE and to this PUBLIC PAGE if you select PUBLIC, so write accordingly.
 
Please enter the code in the image:



 Author Login 
LOGIN
Register for Author Account

 

Advertiser Login

 

ADVERTISE HERE NOW!
   Limited Time $60 Offer!
   90  Days-1.5 Million Views  

 

Great Paranormal Romance

World News


GENE MYERS

Author of four books and two screenplays; frequent magazine contributor. I have four other books "in...more
LAURA JEEVES

At LeadGenerators, we specialise in content-led Online Marketing Strategies for our clients in the t...more
SUSAN FRIESEN

Susan Friesen, founder of the award-winning web development and digital marketing firm eVision Media...more
CHRISTOPHER EVANS

Christopher is based in the U.K. and is the author and founder of Critical Eye. ...more
STEVERT MCKENZIE

Stevert Mckenzie, Travel Enthusiast. ...more
MICHAEL MIFSUD

Michael Mifsud was a House of Commons Commonwealth correspondent at the age of 16. He published Brit...more
ROGER LEWIS FISCHEL

Roger Lewis holds a doctorate in language and literacy from a major midwestern university. His inter...more
STEVE BURGESS

Steve Burgess is a freelance technology writer, a practicing computer forensics specialist as the pr...more
ALEX GREENE

Alex Greene are Senior Editor at Sports Intensity, an online sportsbook review site dedicated to pro...more
AYAD ELHIMER

www.businbook.com is a website that provides listings for local businesses. He currently offers a wi...more

HomeLinksAbout UsContact UsTerms of UsePrivacy PolicyFAQResources
Copyright © 2018, All rights reserved.
Some pages may contain portions of text relating to certain topics obtained from wikipedia.org under the GNU FDL license