Additional Authentication Search Results

How To: Use authentication in Axosoft OnTime

There are two different methods of Authentication in OnTime, and each method has two different ways that the authentication can take place. In this installment from Axosoft's own series of video tutorials on the OnTime Project Management Suite you'll learn about these forms of authentication.

How To: Set Up Instagram Recovery Codes So You Can Always Access Your Account with 2FA Enabled

Two-factor authentication (also known as 2FA) adds a necessary additional layer of security to your username and password in many important apps. On Instagram, 2FA requires you to confirm it's you attempting to log in, with a special code sent to you via text message. Enter the code and you're in ... but what happens when you need to log in and don't have access to your phone?

How To: Create a user authentication system with PHP

In this clip, you'll learn how to code a simple user authentication system with PHP. Whether you're new to the PHP: Hypertext Preprocessor scripting language or are a seasoned web developer merely looking to improve your chops, you're sure to find benefit in this free video programming lesson. For more information, including detailed, step-by-step instructions, take a look.

How To: Configure LDAPS authentication on a BIG-IP Edge Gate

Watch how to configure LDAPS Authentication on the BIG-IP Edge Gateway with BIG-IP LTM functionality. Whether you're new to F5 Networks' popular network appliance or are a seasoned network administrator just looking to better acquaint yourself with BIG-IP, you're sure to benefit from this free video software tutorial. For more information, including detailed instructions, take a look.

How To: Secure Your Facebook Account Using 2FA — Without Making Your Phone Number Public

When it comes to digital security, one of the best ways to protect yourself is to use two-factor authentication. Most apps these days support it, including Facebook, a site where the more privacy you can muster, the better. However, of the two 2FA options available for Facebook, only one should be used as the other will share your phone number with the world, a huge privacy concern.

How To: Bypass RealVNC authentication

VNC stands for Virtual Network Computing. It is remote control software which allows you to view and fully interact with one computer desktop (the "VNC server") using a simple program (the "VNC viewer") on another computer desktop anywhere on the Internet. The two computers don't even have to be the same type, so for example you can use VNC to view a Windows Vista desktop at the office on a Linux or Mac computer at home. For ultimate simplicity, there is even a Java viewer, so that any deskto...

Snapchat 101: 6 Privacy Settings You Need to Check on Android & iPhone

Since starting as a simple messenger with self-destructing pictures, Snapchat has grown into a full-fledged social media platform. As features were added, new permissions were requested, and we're all probably guilty of just tapping "OK" to try out the latest and greatest. But at some point, it's a good idea to review your settings to see what personal data you're putting out there for all to see.

News: Mastercard, Qualcomm-Powered ODG Smartglasses Use Iris Authentication for AR Shopping

As the level of data being generated grows exponentially, past the Information Age and into the coming Hyper-Information Age of immersive computing — as resistant as many of us are to the idea — personal data security is becoming a necessary consideration in our everyday lives. Recognizing this, Mastercard, Qualcomm, and Osterhout Design Group have teamed up to show what secure shopping could look like in the very near future with iris authentication.

How To: Lock Magisk Superuser Requests with Your Fingerprint

It's been proven that hackers can manipulate your screen with fake taps through specific exploits, so they can potentially hit the "Grant" button when you get a superuser request. This is the last thing you'd want to happen since the malicious app from that point forward has full system privileges. Luckily, using a fingerprint to lock your superuser requests can prevent this.

How To: Get Haptic Feedback When Unlocking Your iPhone with Face ID

Haptic feedback is one of the iPhone's most underrated features. With Face ID, you'll feel a satisfying tap or two when buying something in the App Store or iTunes, unlocking protected notes, viewing saved passwords in Settings, and the list goes on. For the first time, Apple has added haptic feedback when unlocking your iPhone via Face ID, as well as a way to disable haptic feedback for Face ID entirely.

How To: Use Your Android as a Streaming Wi-Fi Camera

Not too long ago I showcased ReCam, a free app that lets you schedule recordings and use your Android device as a security or spy camera of sorts. While useful, this app required you to schedule when to record in advance, resulting in you possibly missing the footage you intended to record (assuming your scheduling wasn't as on-point as you wished).

How To: Lock Apps Using Your Samsung Galaxy S6’s Fingerprint Scanner

Like its predecessor—and probably every device in the future—the Samsung Galaxy S6 comes with a fingerprint scanner that allows for a more secure lock screen, web sign-ins, and account verification. But unlike its brethren, the sensor on the S6 has been vastly improved. No longer does it require a clumsy swipe—all you have to do is place your finger on it for less than a second, much like Touch ID on iPhones.

How To: Download additional maps on a Nokia C5 mobile phone

In this clip, we learn how to download additional Ovi Maps-compatible maps when using a Nokia C5 mobile phone. The C5 is the first offering in Nokia's new "C" series of mobile phones. It runs on Nokia's Symbian OS and features a 2.2-inch screen and 3.2-megapixel camera. Want more? Search WonderHowTo's sizable collection of C5 video tutorials.

How To: Use fill flash when taking photographs

In this Click Here Photography instructional video, learn how to photograph using a fill flash to produce a great photograph. Equipment, how to set-up, and additional props are gone over. Although a fill flash takes some time to set-up & is an additional item to carry, it will produce better photographic results in certain lighting situations. Learn how to experiment with your fill flash and maximize your photo's potential with the advice, tips, and information given here.

How To: Use Flickr photos in your screensaver

In this video tutorial, viewers learn how to use Flickr photos in their screen-saver. This task can only be done on the Windows computer. Users will need to download the program from the website provided in the video. Once downloaded and installed, there is an option in the Screen Saver Settings. Users are able to take photos from specific users or groups, or can search through tags and contacts. Further options include selecting the size of the photo and delay between switching the photos. U...

How To: Hack with Hacme Shipping

Foundstone Hacme Shipping is a web-based shipping application developed by Foundstone to demonstrate common web application hacking techniques such as SQL Injection, Cross Site Scripting and Escalation of Privileges as well as Authentication and Authorization flaws and how they are manifested in the code. Written in ColdFusion MX 7 using the Model-Glue framework and a MySQL database, the application emulates the on-line services provided by major shipping companies. This video will get you st...

How To: Link your Hotmail email account & Mac mail

The video shows you how to link your hotmail account to your Mac. The person first asks you to open the mail and write down your full name, hotmail id and the password in the boxes given there. Then click on continue, and in the next option box, leave the account type as POP and then give a description as hotmail in the space provided. Then you have to type pop3. live.com in the box given for incoming mail server. Once done, click on continue and it will ask you for description of outgoing ma...

How To: Make a basic paragraph

This technique can be used to write answers for a question asked in the exam or can be used to write a paragraph while applying for a scholarship or while writing a brief letter. The main thing to be considered while writing the paragraph is having an outline, all we need to do is prepare an outline before starting the paragraph. First write the "main idea" that is to be delivered, then the main idea should be supported with additional details, there can be two to three additional points to s...

How To: Enable a Live/Hotmail account in Mac's Mail

In this video from AppleGenius0921 we learn how to enable a Live/Hotmail account on the Mail application on a Mac. Open Mail. In full name put your full name. Type in your email address and password and continue. Leave the account type on POP and name the description what you'd like. The incoming mail server is pop3.live.com. Type in your live.come username with @live.com in it! Click Continue. The outgoing mail server should be smtp.live.com. Check use only this server and check use authenti...

How To: Get started with the AdWords API PHP client library

In this tutorial, we learn how to get started with the AdWords API PHP client library. First, download the library by going to the API documentation online. From here, set the authentication information and then open up the library. Now, save the changes to the file and use a sandbox environment. The examples folder has all versions that the API library supports. You can browse the campus folder with the search button, just type in the command of what you want to see. After you do this, you c...

Prev Page