Be a loving person rather than in a love relationship because relationships happen one day and disappear another day. They are flowers; in the morning they bloom, by the evening they are gone. But people find it very difficult to be a loving person, a loving soul, so they create a relationship and be fool that way that "Now I am a loving person because I am in a relationship". And the relationship may be just one of monopoly, possessiveness and exclusiveness. The relationship is needed only because love is not there. Relationship is a substitute. Become alert! Relationship destroys love, destroys the very possibility of its birth.
Monday, 17 February 2014
Google is getting smarter day by day. adding to it's tail they have opted for more and more security features. Recently they have update their security features. Slick login is one of them. Let's have a look at it. what it's and all.
The global internet giant Google is acquiring SlickLogin, an Israeli developer of sound-based password alternative, in an "acqui-hiring deal", which means SlickLogin's staff and knowledge will be integrated into Google, SlickLogin confirmed the deal on its website Sunday.
how its sound-based password system works
By now nearly everyone is in agreement that passwords are not the safest way to authenticate users. They can be hacked, cracked and sometimes are literally as simple as ABC, so there’s been a great effort from the bigger technology companies to replace generic passwords with something that’s a lot more harder to crack, if not impossible.
We have seen many concepts and ideas being floated about. Biometrics have been preferred, but can be cumbersome to implement in mobile devices, with the exception of the elegant solution in the iPhone 5s. Motorola has been talkingabout tattoos and skin implants that could replace passwords. And late last year, an Israeli startup SlickLogin showed off its sound-based verification system atTechCrunch’s Disrupt SF 2013 Battlefield.
Fast forward to 2014 and Google has now purchased SlickLogin in an acqui-hire deal that will see the Israeli startup’s team move to Google’s offices and continue their work. So what exactly does SlickLogin’s technology do that had Google so interested in acquiring it. To put it simply, it relieves the user of the burden of having to enter pins and passwords for two-factor authentication. Currently Google’s two-step process involves a mobile phone where an SMS code is sent to authenticate users. As the TechCrunch profile explains, SlickLogin can be used as the second level in a two-step verification process (i.e instead of the SMS) or can replace the whole username-password method altogether.
Whenever you visit a website with a SlickLogin-enabled login process, all you need to do is click on the login button and place your phone near the computer. SlickLogin will first verify your phone’s position to determine that this is not an attempt at fooling the system. This includes various factors such as Wi-Fi, Bluetooth, NFC, or GPS.
But the slick login system (get it?) comes from the use of unique sounds that are inaudible to the human ear. When the computer plays the sound through its speakers, an app on your smartphone can recognise it and authenticate the login.
It’s said to be secure as each time the sound generated is completely unique and won’t be replicated for a particular app. The creators also say that since login data is stored on your phone, anyone trying to hack into your account by intercepting the uniquely-generated sound before it reaches your phone, will most likely end up giving you access to their account, rather than having access to yours. App developers can make use of the SlickLogin method by adding a few lines of code to their existing app, so there’s no need for extra hardware.
SlickLogin was founded less than a year ago. The company is based on a novel idea to enable end users to log-in easily into password-protected websites by using a uniquely generated sound.
The company is yet to launch a commercial product and accrued clients, so the deal actually represents an acquisition of the technology itself.
Subscribe to:
Post Comments (Atom)
Search
Popular Posts
-
After studying or while studying, you may to work or you many want to have rather you would like to have some job experience. That will sur...
-
Have you heard about, facebook has overtaken whatsapp. What you think out of it. Hello, there, facebook is using whatsapp. I will be tak...
-
hello folks!, how you are all, this time i'm here to share some queries about OSI and TCP/IP model. Query 1 according to you, Wh...
-
Hello everyone, I'm back with hacking tutorial. This time i'm introducing to you how to hack facebook account using simple text ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and socia...
-
Apple is one of the most chosen products by people. Time by time it had produced such a concepts that has stunned most of us. Here as it...
-
Access Control Lists Introduction Hello everyone. How are you all. This time i'm going to discuss about Access control list with ...
-
Hello there, Welcome to our blog. How you all are, Hope you all doing great. On our blog you will find support for tech, hacking and so...
-
Social media is very important part of our life. I mean everyone's life. We can't have our food digest until we don't chat for...
-
Certified Ethical hacking Hello Folks, How ...
Categories
Account Hacking
ACL
Adobe Flash Player
algorithms
Android
APPS AND SOFTWARE
Basic Networking
Bluetooth Hacking
BREAKING NEWS
Bus Tupology
CCNA
ccna discovery
ccna exploration
CCNA Security
CCNA1
CCNA2
CCNA3
CCNA4
Cloud Storage
Credit Card Hacking
Cyber Criminal
Cyber security
DEVELOPERS
Encrypted Password
Encryption
facebook
FTP
FTP Server
GOOGLE GLASS
Google Hacking
hacking tool
internet and network security
Mark Zuckerberg
Media Hacked
NASA
Network Hacking
packet tracer tutorial
Port security
Programming
SOCIAL MEDIA
SOCIAL NETWORKS
Blog Archive
Get Content For Your Website
Get a 150-300 word article written for : $1.50
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
Get a 700-1000+ word article written for : $5.00
Have a 150-300 word article rewritten for : $1.25
Have a 700-1000+ word article rewritten for : $4.25
0 comments:
Post a Comment