Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Two-Factor Authentication a method of confirming a user's claimed identity


The second security feature is called Two-Factor Authentication, arguably the best way to keep any internet sign-in you have secure. here’s been a lot of security issues popping up on the internet lately such as password leaks.
Two-step verification or two-step authentication is a method of confirming a user's claimed identity by utilizing something they know (password) and a second factor other than something they have or something they are.

An example of a second step is the user repeating back something that was sent to them through an out-of-band mechanism. Or, the second step might be a six digit number generated by an app that is common to the user and the authentication system. If you’ve claimed your account with an email and verified it, your account is protected automatically with our IP Location Lock.

Furthermore, to make your account effectively impenetrable, you should also enable Two-Factor Authorization. Read on for a quick explanation of how each of these features protect your account (plus some password tips at the bottom of this post).

The use of multiple authentication factors to prove one's identity is based on the premise that an unauthorized actor is unlikely to be able to supply the factors required for access.
If, in an authentication attempt, at least one of the components is missing or supplied incorrectly, the user's identity is not established with sufficient certainty and access to the asset (e.g., a building, or data) being protected by multi-factor authentication then remains blocked.
The authentication factors of a multi-factor authentication scheme may include: some physical object in the possession of the user, such as a USB stick with a secret token, a bank card, a key, etc. some secret known to the user, such as a password, PIN, TAN, etc. some physical characteristic of the user (biometrics), such as a fingerprint, eye iris, voice, typing speed, pattern in key press intervals, etc.

Somewhere you are, such as connection to a specific computing network or utilizing a GPS signal to identify the location. Many multi-factor authentication vendors offer mobile phone-based authentication.
ReadMore »»  

Nuklir Bukan Musuh Dunia Cinta Damai


KTT Keamanan Nuklir di Seoul membicarakan masalah nuklir yang katanya dapat membahayakan dunia. Persepsi dan sudut pandang dengan mengatas namakan terorisme menjadi hal utama terhadap pemanfaatan nuklir untuk kepentingan umat manusia.

Nuklir bukan merupakan bahaya tingkat tinggi jika digunakan untuk kepentingan damai, hal tersebut justru membawa manfaat untuk kehidupan manusia. Nuklir dapat diibaratkan seperti pisau dapur, akan membawa manfaat untuk ibu-ibu di dapur karena sebagai alat mengiris sayur-sayuran, daging, ikan dan berbagai macam bumbu dapur yang dipergunakan untuk membuat resep masakan lezat bagi anggota keluarga tercinta. Namun, pisau dapur juga dapat menjadi alat pembunuh apabila dipergunakan oleh perampok untuk melancarkan aksi perampokannya, sehingga apabila perampok melihat orang membawa pisau maka dalam pikirannya adalah orang tersebut akan melakukan pembunuhan dengan pisau dapur. Sebuah pemikiran yang salah karena terkontaminasi oleh halusinasi perilaku buruk yang dijalani oleh perampok.

ReadMore »»  

Will Google Glass Project Became Favorite Gadget?


Lifestyle is currently equipped with a project of google that known as google glass project. The presence of glass google is very interesting, because it is inconceivable how a technology is able to present such a future film.

Google Introduces Glass Project. Imagine google glass became a best gadget when it feels like a dream come true. Its presence can provide a sense of awe at the presence of high technology for a simple gadget.

ReadMore »»  

Save on Smartphone Battery Fit Needs


Android, BlackBerry, Cisco IOS, Windows Mobile, is a smartphone with many features that are most commonly used your computer, such as navigation systems, radios, stereos and televisions. Smartphone that have many features like this with a level of high resolution screens and high-performance hardware (faster processor, video camera, graphics chip, and sensor) then tends to drain the battery, especially when they are not configured optimally with power management perspective.

Some tips below apply to all types of mobile devices, not specific to the Android platform, so that the battery life increase from your mobile device:

ReadMore »»  

Virtualization Server Comparison With Manual


Currently, the development server technology so rapidly, starting from manual to virtualization technology like cloud computing. Gains and losses may be obtained from the both, but before you decide to move to a virtual technology of server there are some good things that you consider that appropriate for your business development when compared with manual server technology.

The advantage of using virtualization server technologies such as cloud computing where if your data is deposited to a third party that can bring an advantage such as no need for maintenance of data that can cut production costs, a little resource usage or smaller, thus making maintenance easier and simple server and funds expended for the procurement of cheaper resources, minimize downtime and improve responsiveness with reduce managament tasks.

After gains of course there are losses realized in the use of virtualization server technology, because your data is third on the part of it is necessary to note the importance of confidentiality of data that can be known by others, but this does not apply if you implement systems with server virtualization cloud computing itself, because virtualization technologies such as cloud configuration is new it will take for the transformation of the old system which can cause a little more cleverness administrators must be improved.
Are you ready to welcome the presence of virtualization technology? 3G Wireless Reading Device with New E Ink Pearl Technology
ReadMore »»