Larry’s Computer Class

image

Larry Cote

My Goals

Mission Statement

Terms of use


Why is 2FA so important

What is a computer chip (CPU)

how video cards work

Learn computer memory

Creating non admin account

Creating a Sitemap

Create Custom Error Page

Computer and Wireless Security

Modems, Routers and Firewalls

History of Computers

.htaccess files

How the internet works

Questionnaire

Change desktop icons

Speed up your computer

Screen saver personal pictures

Adding email attachments

Computer Symbols

Get better rankings search engines

Snap shot of computer screen

Computer Viruses

Blocking Pop Up Ads

Deleting Temporary Files

How does a computer work?

Prevent and report spam

Binary 0’s & 1’s


My Personal Video's

Personal Video

World Trade Center Video



Click the Click Here button below to sample free videos

Beginner Video's Classes

Basic computer skills and settings

Intermediate Video's Classes

Microsoft Word, PowerPoint and Excel

Advanced Video's Classes

html, php and external style sheet webpages

View samples or login

2FA

2Fa helps protect you by requiring two forms of authentication. This could be something you know, a password or your phone number. 2Fa protects against phishing, password hacks and stolen credentials, keeping your identity and data secure. Passwords alone are no longer enough to keep accounts safe. 2FA adds a second check, making it harder for attackers to retrieve your data or personal information.

2FA boosts security by verifying users through two different authentication factors. 2FA Keeping your passwords safe, stops key logging threats, protects against phishing attacks and preventing brute-force attacks. Two-factor authentication (2FA) is the foundational element to protect sensitive data. You must verify that the users trying to access data are who they say they are. It is an effective way to protect against many security threats that target your passwords and accounts, such as phishing and brute-force attacks. By integrating two factor authentication with your applications, attackers are unable to access your accounts without possessing your physical device that’s being used as a second factor.

While 2FA protects against a multitude of treats, the most common threats are stolen passwords. 2Fa validates the user with a second input after the password is entered. Phishing is an attempt by hackers who often send emails that include a link to malicious websites designed to either infect a user’s computer or convince the user to enter their password. Once obtained a password can be used to access your personal information. Unless you add 2FA to your login page.

Social Engineering allows hackers to manipulate users into giving up their passwords by posing as a professional at the user’s company. 2FA protects against this by validation the location and IP address of every login attempt.

Brute force attacks are when a hacker randomly generates passwords for a computer until they land on the correct password. (This is why you need to create strong passwords). Suggestion for password could be something like typing a simple word like book, then just add a couple of symbols in between each letter. For example (b@o@o%k). Or (b@oo%k). it is also recommended that you use at least one capitol letter (B@oo%k).

Key log in is a program that a hacker downloads to your computer and allows the hacker to records every key stroke you make on your computer. Hackers can use this malware to track and copy everything you type on your computer. Without 2FA they can access your password and use it against you. 2Fa is a second validation that prevent this situation from happening.


THANKS FOR WATCHING, IF YOU FOUND THIS ARTICLE INTERESTING PLEASE LEAVE A COMMENT.

CONTINUE READING OTHER COMPUTER ARTICLES FROM THE LEFT COLUMN.