首页 > 电脑资讯 > 正文

Popular Science: How to Get Your Google Account is more secure
2014-11-23 12:18:44   来源:   评论:0 点击:

If you use Gmail as your primary e-mail, or long-term dependence on the services provided by Google, then, or you are a "Google brain residual powder" ...... then this ...
If you use Gmail as your primary e-mail, or long-term dependence on the services provided by Google, then, or you are a "Google brain residual powder" ...... then this article would be worth to you to read. This article will guide you to re-examine and re-set up your Google account in order to enhance the security of your Google account.

Although Facebook did not like the song Otani, but diligent hands and feet smell sensitive security update page, but then, Google here, there are some additional security measures to strengthen the security of your personal information, and that you did not notice for a long time, do not believe to under the watch!

Briefly, for example, as Google is now built into a two-step secure authentication methods, features a Google account offers - allows users to immediately determine which applications and services can access their data, thereby increasing the user self-determination software security permissions.

See which applications and services can access your data



Google Account Settings page provides a very useful way to keep track of which applications and services to access the data in your Google account. Perhaps the possession of which is inexplicable surprise you access it!

Typically, a mail client, such as Google Drive services, the application Google his affirmation can access the data. However, sometimes with the Google account associated to online games but also can access it!

So we should come to a page to provide these game application details, as well as the data they need to access. If it is a you know APP, but no longer in use; or worse point, exactly the one you do not know APP, so in these cases, you can undo the decisive access data directly from the page permissions.

Make sure no one login to your account

Google is one of the most let the special function of human "peace of mind" is we can see who is logged on to your account and from where the landing of the Gmail web browser -- in the lower left corner of the page, open a window will pop up all the information you need.

If you are worried that you had been hacked into, or a device power is stolen, this page is to find out the great thief first station, you can immediately published every other computer session, then the speed change your password.

For any concerns about the safety of users of Google, you can also view the log into your account hacker IP address - this helps to track any questionable login (but agent, VPN what not good tracking = =). The login page also provides detailed equipment types, online time, whether it is still active and so on information, must care greatly all know these functions, do not know should pay attention to, to enhance the security of your account, today and you say, Mo and so never prison pyronaridine!


The establishment of the two step verification

The two step Google verification to talk about it, as you can see, the two step method for Google verification provides a good second and strategy, this is bound to be a popular options, if you are from a new computer login Google, then we only need to verify the second step.

Google system safety and many representative methods, such as mobile phone verification code to provide information (a commonplace talk of an old scholar? = =), such as automatic call, for instance through a dedicated USB key provides the bank level security have!

Make sure you don't use too much Google+

The first thing to say, Google + page may not belong to your main social networks, but Google has put it into one of the world anyone can find resource nodes you, so it is also worth to rethink your personal data, to make sure that you present to the world a handsome / beautiful yourself.

So it is still worth you control what Google + users can then contact you. If the default value you lock your "friends" and not easy, then you will be less subject to interference by spam and bad network molecules.

Manage your Google store

Google relies on Google Adwords will users as advertising objectives advertising to profitability, the search engine will appear above the text ads, or sent to the user's Gmail mail also has advertising. This information is generally in the Google search service from the YouTube obtained.

Storage can you can decide which Google service through the Google dashboard settings in your information, which do not store.

There are some key management position information service, it can store a detailed historical data, such as where you used the Android device, you use the Chrome browser history (this is a separate web browsing history, it will be in any of you open and signed on to a Chrome device to run automatically records).

Refer refer fortunately, Google itself provides a clear interpretation problem for software how to work and so on, do not want to be user network tracking can take note of the Google Tools list page. Refer to refer to

The Google security analysis so far




Solemnly declare: This article by www.addu8.com reproduced, reproduced content comes from the Internet

This article is to provide to you the exchange of use, not for any commercial purposes. We are not responsible for copyright.

If you found this article violated your intellectual property, please 966775@qq.com

We will promptly removed.

相关热词搜索:Google

上一篇:入耳式耳塞才是王道,平头塞已无市场?
下一篇:QQ公众号来了,与微信公众号有何不同?

分享到: 收藏

新公网安备 65010302000460号