{"id":980,"date":"2013-06-16T15:44:35","date_gmt":"2013-06-16T19:44:35","guid":{"rendered":"http:\/\/mikemartinezonline.com\/blog\/?p=980"},"modified":"2013-08-23T13:50:45","modified_gmt":"2013-08-23T17:50:45","slug":"using-googles-two-step-verification","status":"publish","type":"post","link":"https:\/\/mikemartinezonline.com\/blog\/2013\/06\/16\/using-googles-two-step-verification\/","title":{"rendered":"Using Google&#8217;s Two Step Verification"},"content":{"rendered":"<p>If you don&#8217;t know what 2-Step Verification is here is a simple explanation: The two-step system uses both a password and a numerical code tied to your mobile phone, which can be sent by Google via SMS or generated by a smartphone app. Either way, it means a prospective hacker would need to obtain both your password and your phone to access your account.<\/p>\n<p>I\u2019ve been aware of Google\u2019s two-step verification system for some time, but I felt my very strong password, the fact that I don\u2019t use that password anywhere else and that it could not be ascertained by usual social engineering methods, was more than adequate protection. I was also concerned the system might be a hassle to use since I routinely sign in from so many different computers and locations. I already do use a password manager (<a href=\"http:\/\/keepass.info\/\">KeePass<\/a>) that requires not only a master password but I also use a key file too. [There are other very effective password managers out there I suggest you use one. Ars has a good article about that <a href=\"http:\/\/ars.to\/18Oyc7B\">here<\/a>.]<br \/>\nBut with the massive increase in hacking and high jacking of information and the advancement of brute force cracking <a href=\"http:\/\/ars.to\/13VKdVl\">technologies and techniques<\/a> I felt it was time to get onto the 2-step wagon.<\/p>\n<p>Also I suggest that if you use Yahoo mail for anything you migrate towards Gmail or some other ISP. Yahoo has one of the worst records for email security. They are\u00a0 hacked all the time! One recent article is <a href=\"http:\/\/tnw.co\/WRJDqY\">here<\/a>.<br \/>\nAnd for petesake please do NOT &#8216;link&#8217; your Facebook account with Yahoo &#8211; that too is a major source of hacked Facebook account activity. If you currently have it linked I suggest you separate it. You can read <a href=\"http:\/\/yhoo.it\/12ASZJz\">how here<\/a> and <a href=\"http:\/\/yhoo.it\/11hX57E\">here<\/a>.<\/p>\n<p>So here is a brief explanation of how to enable 2-step verification. I will also link to some other resources on how to enable and use it at the bottom. If you find this too complicated or too much of a hassle you can always disable it very easily.<\/p>\n<p>So let\u2019s get started. Login to your account and go to Account then. Security<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; padding-top: 0px; padding-left: 0px; display: inline; padding-right: 0px; border: 0px;\" title=\"image\" alt=\"image\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image_thumb.png\" width=\"491\" height=\"388\" border=\"0\" \/><\/a><\/p>\n<p>In the Security list you\u2019ll see 2-step verification. This is where you can \u2018turn it on\u2019 and edit the settings.<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image1.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; padding-top: 0px; padding-left: 0px; display: inline; padding-right: 0px; border: 0px;\" title=\"image\" alt=\"image\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image_thumb1.png\" width=\"498\" height=\"432\" border=\"0\" \/><\/a><\/p>\n<p>Printable backup codes. Warning: If your phone is unavailable, these codes will be the only way to sign in to your account. Keep them someplace accessible, like your wallet, desk drawer or other safe place. Printable backup codes.<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image2.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; padding-top: 0px; padding-left: 0px; display: inline; padding-right: 0px; border: 0px;\" title=\"image\" alt=\"image\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image_thumb2.png\" width=\"497\" height=\"483\" border=\"0\" \/><\/a><\/p>\n<p>Here click on \u2018Show backup Codes\u2019<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image3.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; padding-top: 0px; padding-left: 0px; display: inline; padding-right: 0px; border: 0px;\" title=\"image\" alt=\"image\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image_thumb3.png\" width=\"494\" height=\"404\" border=\"0\" \/><\/a><\/p>\n<p>I printed out a set and put them someplace safe. I also saved them to a text file and imported and copied that text file of codes into my Password management application \u2013 <a href=\"http:\/\/keepass.info\/\">KeePass<\/a>.<\/p>\n<p>If you click on the Application Specific Passwords you can create them for you other applications like Outlook, iMail, ThunderBird etc. Just give it some useful name, click on \u2018Generate Password\u2019 and then make sure to copy (or right down) that password \u2013 it is only shown once! I just copied each one to a text file so I could then paste them into the proper field (password) on my Outlook\/configuration setups.<\/p>\n<p><a href=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image4.png\"><img loading=\"lazy\" decoding=\"async\" style=\"background-image: none; padding-top: 0px; padding-left: 0px; display: inline; padding-right: 0px; border: 0px;\" title=\"image\" alt=\"image\" src=\"https:\/\/mikemartinezonline.com\/blog\/wp-content\/uploads\/2013\/06\/image_thumb4.png\" width=\"494\" height=\"400\" border=\"0\" \/><\/a><\/p>\n<p>Some other links and info.<\/p>\n<p><a href=\"http:\/\/bit.ly\/18KOoVU\">Here&#8217;s Google&#8217;s info page<\/a>. And more <a href=\"http:\/\/bit.ly\/XrReJk\">here<\/a>.<\/p>\n<p><a href=\"http:\/\/bit.ly\/190iXEk\">Setting up Mac Mail<\/a>.<\/p>\n<p><a href=\"http:\/\/bit.ly\/12woTrC\">Setting up Outlook<\/a>.<\/p>\n<p>One more thing to consider if you\u2019re a paranoid guy like me. I have all my browsers set to delete Internet history, cache and cookies when I close my Browsers AND I also run CCleaner many times a day to clean out temp files. Doing this will clear out the 2-Step \u2018security token\u2019 so you must manually enter some specific cookies to NOT be deleted in your browser and\/or CCleaner.<\/p>\n<p>To create \u2018safe cookies\u2019 in Firefox <a href=\"http:\/\/bit.ly\/17ercBC\">here<\/a> is a good article. For Chrome <a href=\"http:\/\/bit.ly\/1bJeBTz\">go here<\/a> and read the \u2018Make exceptions for cookies for specific websites. The method is just about the same for InternetExplorer and Safari.<\/p>\n<p>For CCleaner you can add the cookies to keep manually. <a href=\"http:\/\/www.piriform.com\/docs\/ccleaner\/ccleaner-settings\/choosing-which-cookies-to-keep\">Read here<\/a>.<\/p>\n<p>The actual cookie names you need to keep are here:<\/p>\n<p>accounts.google.com<br \/>\naccounts.youtube.com<br \/>\ngoogle.com<br \/>\nmail.google.com<br \/>\napis.google.com<br \/>\n0.docs.google.com<br \/>\ndocs.google.com<\/p>\n<p>Hope this helps some. Peace out.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>If you don&#8217;t know what 2-Step Verification is here is a simple explanation: The two-step system uses both a password and a numerical code tied to your mobile phone, which can be sent by Google via SMS or generated by a smartphone app. Either way, it means a prospective hacker would need to obtain both &hellip; <a href=\"https:\/\/mikemartinezonline.com\/blog\/2013\/06\/16\/using-googles-two-step-verification\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Using Google&#8217;s Two Step Verification&#8221;<\/span><\/a><\/p>\n","protected":false},"author":587,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[55,10,173,21,13,11],"tags":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/980"}],"collection":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/users\/587"}],"replies":[{"embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/comments?post=980"}],"version-history":[{"count":4,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/980\/revisions"}],"predecessor-version":[{"id":986,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/posts\/980\/revisions\/986"}],"wp:attachment":[{"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/media?parent=980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/categories?post=980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mikemartinezonline.com\/blog\/wp-json\/wp\/v2\/tags?post=980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}