Add to Google

Tuesday, August 9, 2011

Computer 101: Google 2-Step Authentication for All your Google Accounts.

Everyone that have internet access or uses that internet regularly for gaming, research, business and many more have an email account, this email account can be a corporate or an organization based or the paid email accounts from different providers and the most common of all the free email account which is available everywhere in the internet. One such provider of free email accounts is Google.com which is a very big internet based company. They have a free email account service called the G MAIL or Google Mail, aside from that they also have a lot of free services being offered like blogger.com for creating your own personal blog in the internet. All this free account is link within the Google system, if you lo-gin to one account then you can access another by configuring a few option without typing a username and password again and again. This setup is very useful if you’re going to jump from one account to another within Google.

Now how do we use our email account? Well we use it for personal communication and transaction over the internet, some sensitive information has also been stored in our email. Now is this free email account really secure? Well yes they are secure because if not, in the first place no one will use them if they are not secure. The first level of security for these email services is the password. Yup that all important passwords, the things that we always keep forgetting is not used frequently or we have already to many password to memorize. Also the user name we used in combination with the all important password, the more complex the password the more secure it or the longer the password the more secure it also. Now nobody can access your accounts if they not know the username and password. But wait what if those two important information has been stolen form you? You say what, how they got my information?

An example of a phishing e-mail, disguised as ...Image via Wikipedia
Well every heard of the term hacking and Phishing? Simply put it, theses terms means to get or acquire in this case sensitive personal information from one account. There are many ways on how to implement this technique. One is using software another is using link from email send to your email accounts from some one you though you know. Please click the link to see a more details and historical explanation for Phishing and for hacking. To cut it short, rather that securing your email account with just the username and password why not use another layer of security. Well this is where the Google 2-step authentication process comes in for all Google accounts users. This process although will take longer to access your G mail account is very important in keeping your account safe. It will add another layer of security. When we log-in to our email account the first thing that we do is we put the username and the password then we wait for the contents to display on our screen.

But with added feature security the second step for verification or authentication is it will send a code to your very own personal phone, via text or voice call. And you will encode the code on the box provided to verify that you’re the real owner of that account. After verifying the code is correct it will proceed in displaying the content of your G mail account. Also there is an option on the verification process that the computer that you are using can be remembered for 30 days. This feature allows the user to enter the verification only once within 30 days for the same computer. This is very helpful if you are using your own laptop or PC we don’t have to type in that code every time we log-in to our G mail account. This second layer of protection is also very handy while we access our G mail accounts from public computers.

Now the next questions are how do we activate this G mail verification process? To activate the process on your G mail account please click the link provided, it is the official blog for Google Email protection.  For other email service pleas check if they provide for free accounts. 

Enhanced by Zemanta

1 comment:

  1. Phishing and hacking are the worst things that can happen to every business that runs online. These problems can be tackled, fortunately, by the teams of IT support specialists specially trained to deal with such problems. They really come in handy to any company that has an IT infrastructure, and they are more and more requested by companies as independent contractors.


Here Are Some of My Most Popular Posts Since Day One.

If you like my blog Please Subscribes to my RSS Feed for updates and more


↑ Grab this Headline Animator

Subscribe via email

Enter your email address:

Delivered by FeedBurner
Your Email Will never be shared or Made Public

Related Posts Plugin for WordPress, Blogger...