With many high-profile password leaks nowadays, there is a lot of buzz in the industry on “multi-factor” authentication. In a multi-factor authentication system, users are required to go through two distinct authentication procedures: providing something they know (e.g., username/password), and leveraging something they have “physical” access to (e.g., one-time passcode generated by their mobile phone). This scheme is also commonly known as two-factor authentication or two-step verification.
When they originally began to hit the market, solid state drives were hailed for both speed and reliability. Many users assumed that because an SSD has no mechanical parts it is at less risk to fail. It’s simple logic that is correct more often than wrong – if there are fewer parts to break overall reliability will be better. Continue reading
With cellphones and tablets gaining in processing power, we are seeing a slow but steady convergence of mobile and desktop computing. Usually, this means you get to enjoy software similar to desktop applications on your mobile, but the reverse is possible as well – using mobile software on your home computer. With close to half a million applications in the Google Play store, there are bound to be a number of apps to complement your desktop computing experience. Continue reading