Apple will show you a warning for this and say that it will not be able to reset your password should you need it. Every time you sign in to iTunes or make an iTunes purchase using a new device, you will have to enter this information to sign in.
With two-step verification enabled, you will need any two of the following to manage your Apple ID: Your password, a trusted device (which can receive the code using Find My iPhone) and Your Recovery Key. On the right-hand side, you will see Two-step verification at the top. You will have to answer the two security questions you set up when you created your account.Ĥ. Click on Password and Security on the left side.ģ. You may use these while you are travelling and your phone is out of coverage area.Īpple's two-step verification is a bit of a long-winded process that will take a minimum of three days to set up. Facebook also lets you a few login approval codes that you can use when you don't have your phone. In case you don't, you will need the security code sent via text message every time you log in from a new browser. Facebook will now tell you that you can disable Login Approvals within a week. Enter this code on the website and hit Confirm.4. Now you will be sent a code via text message.
Finally, you can key in your phone number and click Continue. Click Continue, re-enter your password and hit Submit. Now you'll see a pop-up titled Alternate Security Code Delivery. Check "Require a security code to access my account from other browsers". Click the Edit button next to Login Approvals. If not, then you'll have to wait till Facebook rolls out this feature.Ģ. If you see a header called Login Approvals, under Login Notifications, then this is available in your region.
If it is available in your region, here's how to set it up.ġ. Each code password you generate will only work for one app.įacebook's two-step verification is not available in all regions as of now. Now select the app (click Other if it isn't mentioned) and device from drop-down menus and click Generate. To do this, click Configure when Google prompts you to. If you've configured apps to access your Google account on any device, you will have to create a separate app password for each and sign in again. Next, Google will ask you to reconnect all your apps and devices. Enter the code on the website and click Verify > Next > Confirm.
A six-digit code will arrive on your phone via text message or by a call. Choose the mode by which you will receive the code > click Send code.ĥ. Go to Google Account Security and under Password, look for 2-step Verification.Ģ. To set up two-factor authentication, you need to take the following steps:ġ. Not only is your email account a repository of all sorts of important information, but also, since our email ids are the default way to sign into Web services today, your Gmail account can also serve as a gateway to all your other accounts.
Your Google account is probably the one you want to secure first. Regardless, once your authenticator is set up, trying to log into your account results in a code being sent by the chosen method, and without this code, the account won't be accessed. Some services offer all three modes of verification - others rely on one or the other method. ( Also see: How to Prevent Theft of Photos From Your iCloud Account) If you do this, then access to your account is restricted only to people who have your password - and also access to the second level of authentication, which can take the form of a text message, an email, or even a paired app on your smartphone. Social networks are our public face, and email holds our financial data and more.Ī strong password is a good first step, but setting up two-factor authentication adds another layer between other people and your data. You might think that this sort of thing only happens to celebrities, and the rest of us need not worry, but think about all the data that's there in just your email account. As the leaking of private photos stolen from several celebrities proves, we all need to be more careful than ever to protect our data on the Internet.