Why You Should Turn On Two Factor Authentication – By Tom Scott youtube.com VIDEO
The short answer is: “because it’ll make things more secure”. The long answer involves Ronald Reagan
USB Type A Connector: Everything You Need to Know – By Chris Hoffman howtogeek.com
USB comes in many shapes and sizes, but USB Type-A connectors are the most common type. They’re rectangular in shape and have been in wide use for decades. In the official USB specification, USB-A is known as “Standard-A.”
What Is Multi-Factor Authentication (MFA), And How Is It Different from 2FA? – By Anthony Heddings cloudsavvyit.com
Two Factor Authentication, or 2FA, has been around for a while. It usually refers to using an SMS code as an additional step for logging in to your account. However, the term has been being replaced by “Multi-Factor Authentication.” What’s the difference?
The YubiKey 5C NFC Can Unlock Your Phone, Tablet, Laptop, or Desktop – By Josh Hendrickson reviewgeek.com
Whether you’re on the go or working from home, locking your electronics is always a tricky balance of security and convenience. A device can either be totally secure or incredibly convenient to access, but not both. Yubico’s latest security key, the $55 YubiKey 5C NFC, might have the balance just right. It can unlock nearly any device with minimal effort.
How to use Microsoft OneDrive – By Kevin Stratvert youtube.com
In this step-by-step tutorial video, learn how you can use Microsoft OneDrive to backup files, to access your files anywhere, and to share and collaborate with others. I walk through how to get OneDrive and how to use OneDrive across PC, web, and phone.
The Beginner's Guide to PC Backup – By Eric Griffith au.pcmag.com
We all know we're supposed to back up our data. It's essential to a person's well-being and peace of mind, and one copy of a file on your computer does not a backup make. Redundancy, people, redundancy!
How to Backup a Computer to External Hard Drive? – By backupeverything.co.uk
Backup a Computer – Even though it may seem a great idea to gather all of the important files in one folder and let it reside safely over any local storage directory, but this is not true for every situation. With the growing influence of the Internet of Things, our data has been exposed to various vulnerabilities. Whether it’s a drive failure or system corruption or any cyber-attack, data is the only thing that suffers a lot.
How to Clone a Hard Drive on Windows & Mac – By Ivan Belcic avg.com
Cloning your hard drive creates a perfect one-to-one copy, fully bootable and exactly like the original. You’ll want to clone your drive if you’re backing up valuable data, migrating to a shiny new computer, or upgrading to a solid-state drive (SSD). Learn how to clone your hard drive on Windows computers and Macs with our step-by-step guide.
How to use copy and paste on a Chromebook – By Andrew Myrick androidcentral.com
It should come as no surprise that as time has passed everyone by, Chromebooks have progressed and become true productivity machines. And while these devices give us a lot of functionality that you won't find elsewhere, you'll likely want to know how to do some of the more basic tasks. One such task that is performed a plethora of times per day is to simply copy and paste text or other items from one place to another. Here's how you can do so right from your Chromebook.
How to download a video from YouTube – By Ben Schoon 9to5google.com
You can find just about anything on YouTube. For one reason or another, you may need to download some of that content and, luckily for you, there are a number of ways to download a video from YouTube based on what you need to do with it.
What Is My IP Address? – By Courtney Linder popularmechanics.com
You've heard about one of those cases before: a high school student, or your neighbor down the street, has been receiving harassing messages from an unknown online assailant. That person's profile was devoid of identifying information, yet authorities tracked them down with something called an IP address.
Why People Look Different in Photos Taken with Different Lenses – By Harry Guinness howtogeek.com
If you’ve ever taken a close-up portrait of someone with your smartphone’s wide-angle lens, you might have noticed they look a little . . . off. Maybe their nose seemed a bit big, or their face was just a tad too wide. You weren’t imagining it.
Multi-factor authentication and Two-factor authentication (2FA) Resources
I agree with experts, who suggest using Two-factor authentication on all of your accounts that offer it. Most banks and credit unions require 2FA. It's the code they send to you by SMS text, email, or a voice call.
- I have included articled from five sourced describing what 2FA is how to use it and many web sites that offer it as an option to secure your account.
- After learning what 2FA is, you will find a great article by PCmag, "Who Has It and How to Set It Up." It's a great guide to implementing 2FA is sites most of us use.
- Perhaps as impotent as implementing 2FA is avoiding getting locked out of your accounts when using Two-Factor Authentication.
- I use Authy in place of Google Authenticator. Authy synchronizes to the cloud allowing use on multiple devices, including phones, tablets, computers, and browsers, making it both convenient to use and eliminates the issue moving to a new phone or computer.
> This site Two Factor Auth maintains a list of websites and whether or not they support 2FA.
Multi-factor authentication and Two-factor authentication – By From Wikipedia, the freeen.wikipedia.org
Multi-factor authentication is an authentication method in which a computer user is granted access only after successfully presenting two or more pieces of evidence.
Two-factor authentication – By Chris Woodford explainthatstuff.com
How careful are you when it comes to securing your computer? Do you take pains to choose complex passwords and not write them down where other people can find them? Even if you do, isn't it just possible someone else could hack into the systems you use and do all kinds of damage?
Two-factor authentication (2FA) – By Margaret Rouse searchsecurity.techtarget.com
Two-factor authentication (2FA), sometimes referred to as two-step verification or dual-factor authentication.
How Does Two-Factor Authentication (2FA) Work? – By Brad merchantfraudjournal.com
Two-factor authentication is the best way to protect sensitive data from theft.
How does multi-factor authentication work (technically)? – Christian Roberts, Security Engineer at Protectimus Solutions
The most popular second factor is OTP (one-time-password). Usually, it is 6 or 8 digits password, which could be delivered to users via SMS or email or generated by software or hardware token.
Two-Factor Authentication: Who Has It and How to Set It Up – By Eric Griffith pcmag.com
You can get that code via text message or a specialized smartphone app called an "authenticator." Once linked to your accounts, the app displays a constantly rotating set of codes you can use whenever needed—and it doesn't even require an internet connection. The arguable leader in this area is Google Authenticator (free on Android and iOS). Twilio Authy, Duo Mobile, SAASPASS, and LastPass Authenticator, among others, all do the same thing on mobile and some desktop platforms, and the majority of popular password managers all have 2FA by default.
The codes provided by authenticator apps sync across your accounts, so you can scan a QR code on the phone and get your six-digit access code on your browser if supported.
RSA is an American computer and network security company with a focus on encryption and encryption standards.
SecurityWatch: How to Not Get Locked Out With Two-Factor Authentication – By Max Eddy pcmag.com
What happens if I lose my password? Or if my antivirus deletes my stuff? The advent of two-factor authentication has created a new twist on familiar anxiety: what happens if I can't use my second factor and get locked out of my account?
How to Avoid Getting Locked Out When Using Two-Factor Authentication – By Chris Hoffman howtogeek.com
What happens if you lose or reset your phone? If you don't plan your recovery method ahead of time, you could permanently lose access to your accounts.
- Who initiates the process to set up the authenticator app, by which I mean, who generates the code for a transaction?
- Is it always the merchant, or does the customer sometimes initiate it? i.e., Are there some merchants who let the customer initiate the app to generate a six-digit code?
The confusion comes because of Authy. As I understand Authy, that the program generates a six-digit code.
A: Authy app requires a cell phone number to set up. I also have Mac, Win10, and Chromebook apps. gmm
- Banks don't require the use of the cellphone when a log-on attempt comes from my desktop computer.
A: SMS to a cell phone is much faster and works when not at your home.
- To continue my question, how is it that Authy can generate a six-digit code that is useful if the merchant always and only creates a code that it will accept and recognize? I have not gotten Authy to work yet?
A: Authy and Google Authenticator use TOTP (Time-Based One-Time Password) algorithm that generates short-lived OTPs to provide additional security to users' accounts. Generated passwords are temporary and valid a certain amount of time (usually 30-60 seconds). TOTP algorithm based on HOTP with a time-based moving factor described in RFC 6238.
OTP (one time password) is sent to an Authentication server by a user, for authentication validation is synced based on time.
There are three factors involved in the OTP generation process:
- Serial no. of a token (secret key)
- Are there merchants who let the customer generate the 2fa six-digit code for a transaction?
A: OTPs are generated based on the secret key. Usually, the server generates the secret key, and the token programs the secret key into the app, allowing the generation of OTPs by the app. The server checks OTP, and if it's correct, the server provides access to the system.
A: Two Factor Auth twofactorauth.org List of websites and whether or not they support 2FA.
Separate but related issue: Privacy.com has not let me identify a bank to work with their service.
A: We're only able to send an SMS text message to confirm someone's phone number on their Privacy account.
Turn on MFA Before Crooks Do It For You By krebsonsecurity.com
Many popular websites now offer some form of multi-factor authentication (MFA), which helps users safeguard access to accounts if their password gets breached, stolen, or guessed. But people who don’t take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked. Increasingly thieves will enable multi-factor options and tie your account to a device they control. Here the story of one such incident. Turn on MFA Before Crooks Do It For You
Here are some of the resources you might check out to keep updated on COVID-19 issues. Glenn
- Johns Hopkins COVID-19 series. This video does a good you showing how to use the Johns Hopkins web site.
Coronavirus Pandemic Update 86: COVID-19 Testing & Cases Increasing but Daily Deaths Decreasing YouTube Video
Links referenced in this video: Johns Hopkins Tracker and Testing
- Googles Coronavirus disease (COVID‑19) site
- (CDC) Centers for Disease Control and Prevention
- The Institute for Health Metrics and Evaluation (IHME) at UW Medicine, part of the University of Washington
- Rt Covid-19 – These are up-to-date values for Rt, a key measure of how fast the virus is growing
- This is still my daily go-to YouTube site by Dr. John Campbell daily uploads. John Campbell is a retired Nurse Teacher and A and E nurse based in England. He also teaches in Asia and Africa when time permits. These videos are to help students to learn the background to all forms of health care. His PhD focused on the development of open learning resources for nurses nationally and internationally.
- US HealthWeather™ Map Powered by Kinsa Insights The map shows you how much influenza-like illness we’re detecting throughout the country.
You can contribute to our illness signal with your Kinsa Thermometer or by using the free Kinsa app by itself.
We got the Kinsa QuickCare oral thermometer. It connects the App using Bluetooth, a temperature reading in 8 seconds, backlit display with readings in degrees F or C. Use it with or without the Kinsa App. $29.99
Google Photos vs Amazon Photos – Which free photo app is the best? – By dottotech youtube.com
Is Google Photos better than Amazon Photos? Which is better for the average person, photographers, video makers?
How do SSDs Work? | How does your Smartphone store data? – By Branch Education youtube.com VIDEO
How to Copy, Cut, and Paste on a Windows PC – By Benj Edwards howtogeek.com
Copy, cut, and paste are three basic operations that every Windows user should know by heart. The concepts behind them apply to nearly every application you’ll ever use. Here’s how they work.