Jump to content

Search results

View (previous 20 | ) (20 | 50 | 100 | 250 | 500)
  • Computer access control (category Articles with short description)
    access is approved based on successful authentication, or based on an anonymous access token. Authentication methods and tokens include passwords, biometric...
    19 KB (2,561 words) - 08:01, 6 April 2025
  • Thumbnail for Ring (company)
    Ring (company) (category Articles with short description)
    its users to have strong passwords, enable two-factor authentication, and adopt other security measures. Ring mandated two-factor authentication for all...
    61 KB (6,190 words) - 20:34, 12 May 2025
  • of the owner's face. In addition to biometric authentication, Windows Hello supports authentication with a PIN. By default, Windows requires a PIN to consist...
    273 KB (22,328 words) - 18:38, 6 June 2025
  • Thumbnail for Telegram (software)
    Telegram (software) (category Articles with short description)
    coordination with phone or telecom companies. Pavel Durov has said that Telegram users in "troubled countries" should enable two-factor authentication by creating...
    214 KB (19,258 words) - 20:31, 14 June 2025
  • Thumbnail for WhatsApp
    WhatsApp (category Articles with short description)
    launched a beta version of two-factor authentication for Android users, which allowed them to use their email addresses for further protection. Also in...
    211 KB (18,554 words) - 18:47, 12 June 2025
  • Security and safety features new to Windows Vista (category Articles with short description)
    custom authentication mechanisms for all domain users. Credential Providers may be designed to support Single sign-on (SSO), authenticating users to a secure...
    45 KB (5,802 words) - 12:27, 25 November 2024
  • Thumbnail for SD card
    been done for payment applications and secured authentication. In 2012 Good Technology partnered with DeviceFidelity to use microSD cards with secure elements...
    163 KB (14,358 words) - 00:35, 15 June 2025
  • Steam (service) (category Digital rights management for macOS)
    and communicate with friends in the Steam community. The application also incorporates a two-factor authentication system that works with Steam Guard. Newell...
    293 KB (25,962 words) - 18:57, 14 June 2025
  • Information security (category Articles with short description)
    (eye) scans Strong authentication requires providing more than one type of authentication information (two-factor authentication). The username is the...
    161 KB (18,145 words) - 19:06, 11 June 2025
  • Thumbnail for Children's Online Privacy Protection Act
    Children's Online Privacy Protection Act (category Children's rights legislation)
    allowed users under 13 to register, that Wildec knew there were significant numbers of minor users, and that this allowed inappropriate contact with minors...
    53 KB (5,562 words) - 05:43, 5 June 2025
  • Thumbnail for Computer security
    Computer security (category Articles with Encyclopædia Britannica links)
    have obtained access to a machine by some means. The risk may be mitigated by the use of two-factor authentication. As the human component of cyber risk...
    220 KB (22,312 words) - 12:28, 12 June 2025
  • Thumbnail for Signal (software)
    Signal (software) (category Articles with short description)
    and manage user accounts, though configurable usernames were added in March 2024 to allow users to hide their phone numbers from other users. After removing...
    140 KB (11,998 words) - 19:39, 28 May 2025
  • share publicly any data collected about users of its software. In addition, the company does not provide users of its (Office) software an option to turn...
    193 KB (16,053 words) - 23:14, 5 May 2025
  • Battle.net (category Digital rights management for macOS)
    Though not required to use Battle.net, some game aspects require the user to enable two-factor authentication through either the device or mobile app...
    50 KB (5,285 words) - 19:57, 10 June 2025
  • as mobile payments, secure banking, full-disk encryption, multi-factor authentication, device reset protection, replay-protected persistent storage, wireless...
    354 KB (30,199 words) - 22:31, 12 June 2025
  • Thumbnail for Identity document
    Identity document (category All articles with dead external links)
    point of view the card will have a contact chip, with digital certificates (for electronic authentication and signature purposes). The chip may also hold...
    194 KB (23,069 words) - 05:34, 14 June 2025
  • List of Facebook features (category Articles with short description)
    friends. Facebook also offers two-factor authentication called "login approvals", which, if turned on, will require users to enter a code whenever they...
    118 KB (12,486 words) - 15:33, 24 May 2025
  • particular product. The practice is also referred to as persistent online authentication. The technique is meant to prevent copyright infringement of software...
    23 KB (2,675 words) - 00:59, 13 May 2025
  • Thumbnail for PlayStation 3
    PlayStation 3 (category Pages with non-numeric formatnum arguments)
    networking service for the PlayStation Network. Home allowed users to create a custom avatar, which could be groomed realistically. Users could edit and decorate...
    174 KB (15,003 words) - 17:28, 14 June 2025
  • Thumbnail for Web server
    Web server (category Pages with disabled graphs)
    requires a user authentication (request of user credentials such as user name and password); access is forbidden to some or all kind of users. If the authorization...
    86 KB (9,910 words) - 04:31, 3 June 2025
View (previous 20 | ) (20 | 50 | 100 | 250 | 500)