Getting Comfortable With The Basics

How it works

1 2 3 24

Best password manager to use for 2020

Best password manager to use for 2020: 1Password, LastPass and more compared – By Clifford Colby cnet.com

The coronavirus pandemic probably isn't being terribly helpful when you're trying to remember all of your passwords individually, but a password manager can help you to seamlessly oversee and handle all the login credentials on your devices. Password managers are also handy for auto-filling forms and syncing your data across Windows PCs and Macs, iPhones, iPads, Android phones, and more.


The Ultimate Password Manager: 1Password vs LastPass vs KeePass vs RoboForm – By Adam Henshall process.st

Staying safe and secure online has always been important but now more and more people are waking up to the fact that we need to take extra steps to protect our various accounts.

What Is My IP Address?

What Is My IP Address? – By Courtney Linder popularmechanics.com

You've heard about one of those cases before: a high school student, or your neighbor down the street, has been receiving harassing messages from an unknown online assailant. That person's profile was devoid of identifying information, yet authorities tracked them down with something called an IP address.

How to force quit a task on a Chromebook

How to force quit a task on a Chromebook – By Chris Wedel androidcentral.com

For everything that Chromebooks have going for them, every now and then an app can hang up and cause some frustration. Thankfully, there's a relatively simple way to find out which app or task is the culprit behind the slowdown. Let's get into the steps you can take to get your Chromebook back smoothly humming along.

Why People Look Different in Photos Taken with Different Lenses

Why People Look Different in Photos Taken with Different Lenses – By Harry Guinness howtogeek.com

If you’ve ever taken a close-up portrait of someone with your smartphone’s wide-angle lens, you might have noticed they look a little . . . off. Maybe their nose seemed a bit big, or their face was just a tad too wide. You weren’t imagining it.

> Two-factor/Multi-factor authentication

Multi-factor authentication and Two-factor authentication (2FA) Resources

I agree with experts, who suggest using Two-factor authentication on all of your accounts that offer it. Most banks and credit unions require 2FA. It's the code they send to you by SMS text, email, or a voice call. 

  • I have included articled from five sourced describing what 2FA is how to use it and many web sites that offer it as an option to secure your account.
  • After learning what 2FA is, you will find a great article by PCmag, "Who Has It and How to Set It Up." It's a great guide to implementing 2FA is sites most of us use.
  • Perhaps as impotent as implementing 2FA is avoiding getting locked out of your accounts when using Two-Factor Authentication.
  • I use Authy in place of Google Authenticator. Authy synchronizes to the cloud allowing use on multiple devices, including phones, tablets, computers, and browsers, making it both convenient to use and eliminates the issue moving to a new phone or computer.

> This site Two Factor Auth maintains a list of websites and whether or not they support 2FA.


Multi-factor authentication and Two-factor authentication – By From Wikipedia, the freeen.wikipedia.org

Multi-factor authentication is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence.


Two-factor authentication – By Chris Woodford explainthatstuff.com

How careful are you when it comes to securing your computer? Do you take pains to choose complex passwords and not write them down where other people can find them? Even if you do, isn't it just possible someone else could hack into the systems you use and do all kinds of damage?


Two-factor authentication (2FA) – By Margaret Rouse searchsecurity.techtarget.com

Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication.


How Does Two-Factor Authentication (2FA) Work? – By Brad merchantfraudjournal.com

Two-factor authentication is the best way to protect sensitive data from theft.


How does multi-factor authentication work (technically)?  – Christian Roberts, Security Engineer at Protectimus Solutions

The most popular second factor is OTP (one-time-password). Usually, it is 6 or 8 digits password, which could be delivered to users via SMS or email or generated by software or hardware token.




Two-Factor Authentication: Who Has It and How to Set It Up – By Eric Griffith pcmag.com

You can get that code via text message or a specialized smartphone app called an "authenticator." Once linked to your accounts, the app displays a constantly rotating set of codes you can use whenever needed—and it doesn't even require an internet connection. The arguable leader in this area is Google Authenticator (free on Android and iOS). Twilio AuthyDuo MobileSAASPASS, and LastPass Authenticator, among others, all do the same thing on mobile and some desktop platforms, and the majority of popular password managers all have 2FA by default.

The codes provided by authenticator apps sync across your accounts, so you can scan a QR code on the phone and get your six-digit access code on your browser if supported.


Two-Factor Authentication Is a Must for Mobile by RSA

RSA is an American computer and network security company with a focus on encryption and encryption standards.




SecurityWatch: How to Not Get Locked Out With Two-Factor Authentication – By Max Eddy pcmag.com

What happens if I lose my password? Or if my antivirus deletes my stuff? The advent of two-factor authentication has created a new twist on familiar anxiety: what happens if I can't use my second factor and get locked out of my account?


How to Avoid Getting Locked Out When Using Two-Factor Authentication – By Chris Hoffman howtogeek.com

What happens if you lose or reset your phone? If you don't plan your recovery method ahead of time, you could permanently lose access to your accounts.





2FA questions

  • Who initiates the process to set up the authenticator app, by which I mean, who generates the code for a transaction?
  • Is it always the merchant, or does the customer sometimes initiate it? i.e., Are there some merchants who let the customer initiate the app to generate a six-digit code?

The confusion comes because of Authy. As I understand Authy, that the program generates a six-digit code. 

  A: Authy app requires a cell phone number to set up. I also have Mac, Win10, and Chromebook apps. gmm 

  • Banks don't require the use of the cellphone when a log-on attempt comes from my desktop computer.

  A: SMS to a cell phone is much faster and works when not at your home.

  • To continue my question, how is it that Authy can generate a six-digit code that is useful if the merchant always and only creates a code that it will accept and recognize? I have not gotten Authy to work yet?

A: Authy and Google Authenticator use TOTP (Time-Based One-Time Password) algorithm that generates short-lived OTPs to provide additional security to users' accounts. Generated passwords are temporary and valid a certain amount of time (usually 30-60 seconds). TOTP algorithm based on HOTP with a time-based moving factor described in RFC 6238.

OTP (one time password) is sent to an Authentication server by a user, for authentication validation is synced based on time.

There are three factors involved in the OTP generation process:

  1. Time(T1)
  2. Serial no. of a token (secret key)
  3. Algorithm(A1)
  • Are there merchants who let the customer generate the 2fa six-digit code for a transaction? 

A: OTPs are generated based on the secret key. Usually, the server generates the secret key, and the token programs the secret key into the app, allowing the generation of OTPs by the app. The server checks OTP, and if it's correct, the server provides access to the system.

A: Two Factor Auth twofactorauth.org List of websites and whether or not they support 2FA.

Separate but related issue: Privacy.com has not let me identify a bank to work with their service. 

A: We're only able to send an SMS text message to confirm someone's phone number on their Privacy account.

 

 

Best password manager to use for 2020

Best password manager to use for 2020: LastPass, 1Password and more compared – By Clifford Colby cnet.com

If you've always had a hard time keeping track of all your passwords, the coronavirus pandemic probably isn't helping. What can help, however, is a password manager to oversee and handle the login credentials of each of your devices. The best password manager can also auto-fill the forms in your web browsers as well as sync your data across Macs and Windows PCs,  iPads,  iPhones, Android phones, and more.

LastPass review

LastPass review – By Sean Riley tomsguide.com

LastPass has been the biggest name in password management for several years, and it's easy to see why. It is one of the most feature-packed password managers and offers the best free tier available.

Open and edit photos on a Chromebook

How to open and edit photos on a Chromebook – By Ara Wagoner androidcentral.com

One of the many, many myths around Chromebooks is that you can't edit photos on them, which is just patently untrue because I edit 95% of the photos I use for my articles on Chrome OS. Just because the full-featured and full-priced Adobe Photoshop doesn't live on Chromebooks yet doesn't mean that you can't do simple tweaks or advance photo editing here. There's a basic photo editor built right into the Gallery app on every Chromebook, and among the myriad of photo editors out there, Google Photos' web editor can do a lot more than you'd think.

Lenovo Flex 5 Chromebook Review

Lenovo Flex 5 Chromebook Review: The New Measuring Stick – By Chrome Unboxed youtube.com  Video

The Lenovo Flex 5 Chromebook brings so much to the table at such a dramatically low price, it is difficult at this point to recommend any other Chromebook.  With it's ability to deliver a high-end experience on a low-end budget, this Chromebook is easily the new Chromebook to beat and will force other manufacturers to bring down prices on their new devices.


Lenovo Chromebook Flex 5 – By Robby Payne chrmshop.com

While the Lenovo Chromebook Flex 5 doesn’t quite stand up to the ultra-premium Galaxy Chromebook or ASUS’ Flip C436, that’s okay: it doesn’t have to and that’s the beauty of this device. On the inside, you’ll get the same, powerful internals with up-to a Core i5 processor, 8GB of RAM and a very respectable 128GB of PCIe SSD storage. Here’s a closer look at what the Lenovo Chromebook Flex 5 has to offer.

– >Turn on MFA Before Crooks Do It For You

Turn on MFA Before Crooks Do It For You By krebsonsecurity.com 

Many popular websites now offer some form of multi-factor authentication (MFA), which helps users safeguard access to accounts if their password gets breached, stolen, or guessed. But people who don’t take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked. Increasingly thieves will enable multi-factor options and tie your account to a device they control. Here the story of one such incident. Turn on MFA Before Crooks Do It For You

2 Factor Authentication – What is 2FA?

2 Factor Authentication – What is 2FA? – By dottotech youtube.com

Google calls it 2 Step Verification.2FA is simple to implement security settings that can and will protect most of your online accounts.
It is based on one rule, in order to access your account you need to know something (name and password) and have something (a trusted device like a smartphone to verify you are who you say you are). This combination secures your account to a much higher level.

1 2 3 24