• Categories
    • Technology
    • Mobile Gadget
    • Science
    • Google
    • Computer
    • Computer
    • Market
    • Q&A
    • Facebook
    • LinkedIn
  • Hot Tags
    • Contact us
    • Sitemap
    • Authors
  • Search
  • Follow Us

      Follow Us

      • rss
      • rss
      • rss
      • rss
      • rss
      • rss

      Facebook Fanpage

  • Share
      • Tweet
Homepage » cyber security » How to prevent someone from accessing your Gmail account

How to prevent someone from accessing your Gmail account

Post Tags

accessing your Gmail account

Share This

  • Tweet

Pretty Posts

  • Samsung sued for U.S. $ 250 million for poor working conditions
  • Scientists determine who in 2011 discovered planet is made of diamond
  • Weak demand hampers the Apple iPhone 5 in Exchange
  • Rove HP Envy 20, computer all in one touch screen
  • Printer can print on a hair
By Ankur Pandey - January, 13th 2013

Gmail has become over the years a very strong alternative to email service Hotmail (now converted into Outlook.com) and Yahoo Mail . Google has endeavored to create a flexible and accessible tool that has been able to convince users. One of the major thrusts that this service has received has come from the hand of Android , the mobile operating system of the company. Because this system is structured on aGoogle account (and therefore the mail Gmail ), the company has managed to turn this service on the most popular on the market, with over 425 million users . The problem of this success is that cibercrminales see this service as an increasingly attractive target. We tell you how to add a new layer of protection to your account Gmail so anyone can access it.

In recent months we have witnessed as a network drive on the massive amounts of data from different account access Internet services that have leaked. The problem is that often people use the same password to access different accounts and that increases the risk of breaching the account of Gmail. To avoid unwanted incursions, Google offers the option to set a second safety barrier after entering your regular password. This is the two-step verification.

To use it, it is necessary to have a mobile phone . It can be done by sending codes via SMS , or through an application for Android, BlackBerry and iPhone called Google Authenticator . First, activate the ability to receive the codes via phone.

To start using this tool safety, we setup Gmail (tightening nut on the top right) and then on “Options.” We choose the tab “Accounts and Import” and then you click on “Other Settings Google’s account. “

In this step, choose “Security” from the options that are offered to the left of the screen. The central feature is part of the “two-step verification.” Default, its status is “off” . We click on the option “Edit.” In the next step we click on “Start Configuration” . We introduce our mobile number and choose the option to send an SMS or a voice message. We press on “Send code” and then write the six numbers that we received on the mobile. We again click on “Check” and then we must choose whether we want to establish the computer as reliable (this will not have to re-enter that computer codes for the next thirty days).

The problem with this tool is that if you use an Android need to create application-specific passwords. Of course, you only have to type the password once for each application installed . On the other hand,Google recommends setting up a second mobile phone in case you can not access the main. You can also print a list of ten codes “emergency” if we can not access any of these phones.

Finally, we can also generate codes via a mobile app called Google Authenticator . After installing the Android market, the account is added Gmail has already been configured with two-step verification. In short, one way to improve the security of our mail and prevent theft of accounts that happen very often, but it may be a little heavy if you use different computers on a regular basis.

  • Tweet
Ankur Pandey

He has over 5 years of experience as Online Media and Marketing Consultant, which allow him to enable companies to enhance and meet their Digital marketing goals. He has experience as both in-house and Agency Digital Marketing Experts. Ha has spent the most recent 4 years of his career focusing building Strong terms of Digital Marketing for his clients. In addition to his strengths on Building Brands and Serving Online Marketing strategy for his clients.

Related Posts

  • no image

    Google abolishes Quickoffice

    Google
  • no image

    Huawei Honor 6- a 4G compatible Android Smartphone

    Huawei
  • no image

    Microsoft OneDrive now offers upto 15GB free space and revise rates

    Microsoft

Comments are closed.

Popular Posts

jelly-bean-nexus-S

Google Nexus S receives the first update Android 4.1 Jelly Bean

Apple July, 23rd 2012
Mass Effect Vs The Higgs boson 1

Mass Effect Vs The Higgs boson

Science July, 16th 2012

Android will see YouTube videos without Internet connection

Computer June, 29th 2012

Change the rules between mobile operators and users

Technology June, 21st 2012

Colombia reach the BlackBerry Curve 9320 and Curve 9220

Mobile Gadget June, 21st 2012

Categories

  • Acer
  • Alcatel
  • Amazon
  • Android
  • Antivirus
  • Apple
  • Apps
  • ASUS
  • browser
  • Business
  • Camera
  • Cloud
  • Comparisions
  • Computer
  • cyber security
  • Cyber Threats/Weapons
  • Development
  • Digital Camera
  • Facebook
  • Fujistu
  • Games
  • Google
  • Hewlett Packard(HP)
  • HP
  • HTC
  • Huawei
  • IBM
  • Intel
  • Intel
  • Internet
  • Lava
  • LG
  • LinkedIn
  • Machines Technology
  • Market
  • Micromax
  • Microsoft
  • Mobile Gadget
  • Motorola
  • Nokia
  • Operating System
  • Panasonic
  • Patent War
  • Pinterest
  • Q&A
  • RIM/ Blackberry
  • Samsung
  • Science
  • Security
  • Skype
  • Smartphone
  • SmartWatch
  • Snapchat
  • Social Media
  • Sony
  • Sony Xperia Z
  • Sports
  • Technology
  • Twitter
  • Ubuntu
  • Whatsapp
  • Who Invented
  • Wordpress
  • Yahoo
  • YotaPhone
  • Youtube
  • ZTE
  • Contact us
  • Sitemap
  • Authors
Powered by Newspaperstimes.com