Skip to main content

Protect your Google Accounts with a USB Security Key



Most big-name web services like Gmail, Microsoft, Evernote, WordPress and Dropbox now support 2-step authentication to improve the security of your online accounts. Once you enable two-factor authentication, a malicious person will not be able to log into your online account even if they know the password – they’ll need access to your mobile phone as well to get in.
The verification codes required for logging into a 2-step enabled account can be generated either using a mobile app – like Authy or Google Authenticator – or you can have them sent to your mobile phone via a text message or a voice call. The latter option however will not work if the mobile phone associated with your account is outside the coverage area (like when you are in a foreign country).
There’s another option that makes the process of logging into a 2-factor enabled account Google less cumbersome. Instead of generating the verification codes on a mobile phone,  you can use a hardware based authenticator that can be inserted into a USB port on your computer and you’ll be signed-in automatically without having to hand-type the digits.
The option works for both Google and Google Apps accounts and you don’t even need the mobile phone

Google 2-factor Authentication Simplified

I am using the least-expensive Yubico key though there are more options to choose from. The first stop is to associate the USB security key with your Google Account. Go to myaccount.google.com, click on 2-step verification and then switch to the Security Keys tab. Here click the Register Device button and then insert the USB key into the computer to attach it to your account.
Once registered, you can use your USB security key to log into your Google Account from any other desktop or laptop computer without requiring the mobile phone. Simply open the Google login page, type in your username & password, click the Sign-in button and then insert the USB key. The lights will blink on the device, you need to tap it once and it will instantly log you into the account. Internally, the key generates the codes that are sent to Google servers and you are logged in.
The USB security keys require no software and they are compatible with Windows, Mac, Chrome OS and Linux computers. They need no batteries, they are tiny like a regular USB thumb drive but also rigid. You can also associate multiple Google Accounts with the same USB key which can be a huge timesaver for some users.
USB Security Keys make 2-factor authentication painless but you can only use them inside Google Chrome on desktop and laptop computers. You’ll still have to rely on SMS messages, or the authenticator app, for logging into Google on your mobile phones or in browsers like Firefox and Opera

Comments

Popular posts from this blog

Live inside technology

Microsoft doesn’t just want you to use the latest Windows; it wants you to live inside of it. The company has revealed the HoloLens, a wearable holographic computer launching alongside Windows 10 that lets you project Windows apps onto the surfaces of your home or office. Holographic Fetus & Other Incredible 3D Tech 3D scanners are enabling us to see all kinds of things we’ve never dreamed of witnessing before. Microsoft outlined some of the uses of HoloLens in a demo video, which showcases how Windows apps can come to life once you put the headset on. Some examples include the ability to see Windows app icons on your kitchen cabinet, project a Skype call onto your wall and even physically manipulate a Minecraft world that’s laid out on your coffee table. The HoloLens itself is a black headset with a circular plastic headband and sunglass-like, see-through lenses in the front. The device uses a “high-end” processor and GPU, with an additional holographic processing uni

How to Use the NETSH Command to Change from Static IP Address to DHCP

You can use the netsh command in Windows 2000 to script the process of changing a computer from a static Internet Protocol (IP) address to Dynamic Host Configuration Protocol (DHCP) or vice versa. The netsh command accomplishes this task without the need to restart the computer. This feature is particularly useful for laptops that move from one environment to another, when it is necessary to use statically assigned IP addresses at one location and DHCP assigned IP addresses at another. To switch the specified adapter from a static address to DHCP, type the following command: netsh interface ip set address “Local Area Connection” dhcp NOTE: Typing this command changes the interface named “Local Area Connection” to DHCP. To display all of the adapters in the computer with their current IP addresses to determine the correct adapter name, type the following command: Netsh interface ip show config To change to a static address, type the following command: netsh interface ip set

Now you can breathe liquid!

DIVE DEEP The recommended absolute limit for recreational SCUBA divers is just 130 feet, and technical dives using Trimix bottom out at 330. Even then, you’ve got less than five minutes at depth before requiring monitored decompression to avoid getting the bends (the not-scary word for when nitrogen dissolves into your tissue under the massive pressure of the water column, is ejected into the bloodstream during ascent, and you die of a brain embolism). Interestingly though, once your body hits its nitrogen saturation limit, it doesn’t matter if you stay down for an hour or a month; your decompression time effectively maxes out. This technique, known as saturation diving, is how recovery divers working on the K-141 Kursk were able to spend hours 300 feet below sea level (amidst 10 atmospheres of pressure) and how the crew in The Abyss were able to do their jobs. LIQUID AIR Perhaps the best-remembered scene from the 1989 Sci-Fi classic The Abyss is when Ed Harris’ chara