Les nouveautés et Tutoriels de Votre Codeur | SEO | Création de site web | Création de logiciel

Seo Master present to you: By now, many of you have seen our recent announcement regarding 2-step verification for Google Accounts. It’s an optional way of protecting your Google Account from unauthorized access, providing a level of security beyond that of a password alone. The initial announcement did not detail the impact enabling 2-step verification has on programmatic account access from code written against one of Google’s official APIs. We want to go into some more detail regarding the implications of 2-step verification on various authentication (and authorization) techniques, and offer best practices that you as a developer should follow.

There are three forms of authentication supported by almost all of Google’s APIs. AuthSub and OAuth (either version 1 or the newer OAuth 2) are similar web-based authentication mechanisms in which the user logs in on a web page hosted by Google. The other approach to authentication, ClientLogin, relies on your application soliciting the user’s account address and password, and then sending that information to Google.

If your code uses AuthSub or OAuth, then you don’t have to do anything special to accommodate users who have opted-in to 2-step verification. The web-based login flow currently allows users to enter both their normal passwords as well as the additional verification code, and this extra step is transparent to you as the developer.

ClientLogin, however, does not fare as well for accounts that have 2-step verification enabled. There is no concept of an additional verification code in the ClientLogin process, and a user’s account address and password are no longer sufficient for authenticating them once 2-step verification is turned on. If you make a ClientLogin authentication request for such an account, you’ll get back an HTTP 403 error response from our servers with the following in error included in the response body:

Error=BadAuthentication
Info=InvalidSecondFactor

There are two solutions to these failed ClientLogin attempts. The first solution, which does not require changing any existing code, is to ask your users to generate an application-specific password and to provide that, instead of their Google Account passwords, when making your ClientLogin request. You can point your users to this article for a full explanation of how application-specific passwords work.

The second, and recommended, solution requires some work on your part as a developer: moving away from ClientLogin completely, in favor of OAuth 2. If your code runs as part of a web application, then OAuth 2’s web-based login flow is trivial to integrate. Even applications that are installed on a user’s computer or other device can leverage OAuth 2, though. This guide explains how to launch a web browser to handle the login process, and then redirect control back to your application.

While it may take some effort to migrate your code away from ClientLogin, your users will be grateful that you did. Even those who haven’t enabled 2-step verification will benefit from entering their credentials on a web page accessed via HTTPS and hosted by Google, as opposed to sharing their password information directly with your third party code.

2013, By: Seo Master
Seo Master present to you:

Friends, This is a funny and useable software for your windows 7. It change your windows log on background with one click. It works with Windows 7 Home Basic, Home Premium, Professional, Ultimate, Enterprise and Starter, in x86 or x64 (32 or 64 bits). It also works on Windows Server 2008 R2 (but you are not supposed to customize a server). You can select a picture from your personal gallery, then click on apply button. Then restart your computer, It will change your windows logon background theme with your image. You can download free from this site. Software all credits goes to julien-manici. Download and enjoy…..

Win7LogonBackgroundChanger_1_5_2 free download from (www.matrixar.com)



Download Windows 7 Logon Background Changer 1.5.2: Click here (Alternate Link) OR Click here

 

 

 

 

Special Thanks To: Julien-Manici

Leave a comment….. If links are broken…………………………….

 

2013, By: Seo Master
Seo Master present to you:
Facebook and other social networking sites can be great tools to help you stay connected with friends and family but beware! Just because the url says Facebook does not necessarily make it safe to do all it has to offer. Increasingly people are getting infected from viruses and malware installing games, quizzes, and other rogue apps from social networking sites. The viruses or malware spread by posting to your friends wall and soliciting them to install it as well.

The best plan of action is to use these social networking sites without installing any 3rd party games, apps, or quizzes. This ensures that you will be protected from most threats. However if you have a computer that is used by everyone in the family and you have teenagers that might not follow these simple rules then it is important to have security software to block these threats from entering your computer.

More and more people are using Facebook and other social networking sites at the workplace which increases the risk of spreading viruses at the workplace. Many businesses have had to block Social networking sites altogether to stop the infections and lost productivity to these services.

Security programs such as Microsoft Security Essentials can help stop the viruses and malware before you get infected instead of having to remove them after the damage has already been done. Malicious Software Removal costs are higher after you have been infected.

Behavioral steps you can take to avoid getting a Virus or Malware. Avoid Facebook quizzes and games that can give you a Virus or Malware. Stay away from sites that look shady or want you to install something to run if you are not sure of how legitimate they are.

Do not open attachments even from friends unless you are expecting a particular file from them. Many times the virus will attach itself to your contact list and send emails out to everyone appearing as if they came from you. The best rule of thumb is to never open emails that look like they are from unfamiliar people.

Stop using and downloading anything from peer to peer networks these services are loaded with viruses and malware. Use the latest Firefox or Google Chrome browsers they help to keep viruses and malware out of your computer much better than Internet Explorer.

If the virus or malware you have does not let you install or download anything then boot up your computer in safe mode to allow you to download and install the proper virus removal and malware software. Instructions for booting your computer into safe mode are listed below.

2013, By: Seo Master
Powered by Blogger.