Microsoft Announces Two-Factor Authentication For Online User Accounts

This new and optional feature will roll out to all Microsoft accounts over the next few days. The two-factor authentication works very much like the two-factor authentication schemes being used today in other Microsoft products making it familiar to most users. Besides your usual password, you will also need a second piece of information which can be a short code. For the user to obtain the codes, Microsoft also launched their own Authenticator app for Windows Phone, but the company also notes that “there are excellent authenticator apps that already exist for those platforms and are compatible with Microsoft account two-step verification. Read the full story right here.



Comments

  • A fair double take on adidas

    Posted by Updatatweda on 05/05/2013 09:07pm

    E [url=http://www.adidaskutuja.com/]アディダス スニーカー[/url] qgPmg TmqMas GmjEta WeaR [url=http://www.adidaskutuja.com/adidas-originals-c-4.html]アディダス ランニングシューズ[/url] wuBecUth YxsCevLkfE [url=http://www.adidaskutuja.com/adidas-superstar-c-2.html]アディダス スタンスミス[/url] ev EfnLgh [url=http://www.adidaskutuja.com/jeremy-scott-c-5.html]アディダス 通販[/url]RcpJrc TsdNbu

    Reply
  • A powerful double strain on adidas

    Posted by Updatatweda on 05/05/2013 08:58pm

    X [url=http://www.adidaskutuja.com/]アディダス スニーカー[/url] xdGhb IchPbp AzgAkd HxgD [url=http://www.adidaskutuja.com/adidas-originals-c-4.html]アディダス ランニングシューズ[/url] ecTeoOsn KohFdbGlqE [url=http://www.adidaskutuja.com/adidas-superstar-c-2.html]アディダス シューズ[/url] py CtbJec [url=http://www.adidaskutuja.com/jeremy-scott-c-5.html]adidas jeremy scott[/url]WndWnd WlaHyu

    Reply
Leave a Comment
  • Your email address will not be published. All fields are required.

Top White Papers and Webcasts

  • Do you know where your data is? Consumer cloud-based file sharing services store your sensitive company data on servers outside of your control, outside of your policy and regulatory guidelines – maybe even outside your country – and not managed by you. The potential for data leakage, security breaches, and harm to your business is enormous. Download this white paper to learn about file sync and share alternatives that allow you to manage and protect your sensitive data while integrating and …

  • The hard facts on SaaS adoption in over 80,000 enterprises: Public vs. private companies Mid-market vs. large enterprise GoogleApps, Office365, Salesforce & more Why security is a growing concern Fill out the form to download the full cloud adoption report.

Most Popular Programming Stories

More for Developers

Latest Developer Headlines

RSS Feeds