Like every other website on the planet, SmallNetBuilder uses cookies. Our cookies track login status, but we only allow admins to log in anyway, so those don't apply to you. Any other cookies you pick up during your visit come from advertisers, which we don't control.
If you continue to use the site, you agree to tolerate our use of cookies. Thank you!

Router Charts

Click for Router Charts

Router Ranker

Click for Router Ranker

NAS Charts

Click for NAS Charts

NAS Ranker

Click for NAS Ranker

More Tools

Click for More Tools

Security Features

The Current Crop

In our last article, we took a look at some of the security threats that face the ordinary Joe who is logging into online services today. From that you will have (I hope) received a very succinct impression regarding the state of your personal security as you transact online.

Let us take a look at the types of solutions that are being used on the Internet right now, culminating with a look at 2 Factor Authentication.

Single Factor Authentication Solutions: this is where the password is not ciphered or disguised in a manner that protects it from key loggers/screen scrapers, and social engineering techniques such as phishing. We'll be looking at:

  1. The fully transmitted login password
  2. The partially transmitted login password
  3. Scramble Pads
  4. Virtual Keyboard

2 (Separate) Factor Authentication Solutions: this is where two factors exist to produce unrelated information as sources for the login process. This means that a password or PIN is entered, plus a separate piece of data that is sourced from something other than the computer.

  1. The Bingo Card (Static Grid Card)
  2. The TAN list
  3. Mobile Phone SMS Password

2 (Combined) Factor Authentication Solutions: this is where the user combines their password and an issued token to produce either a ciphered representation of a password/PIN, or a unique one time password/PIN dispatched through a mobile phone or similar device. In this category we'll be examining:

  1. The Dynamic Grid Card OTP
  2. Electronic Token OTP
  3. Mobile Phone/PDA OTP

Let us begin at the beginning, with that dreaded login box.

More Stuff

Wi-Fi System Tools
Check out our Wi-Fi System Charts, Ranker and Finder!

Support Us!

If you like what we do and want to thank us, just buy something on Amazon. We'll get a small commission on anything you buy. Thanks!

Over In The Forums

I am experiencing something strange with my new RT-AX88U router.On my work laptop certain applications need a VPN connection but others work both thro...
Hello,I'm a software developer but need now to set up an on-prem testing/staging/deployment network. I have Linux skills and have been managing a simp...
I Got My X4S-R7800 3 Weeks ago and it's been having 2 issues while on WiFi (PC that's wired does not seem to have these issue) 1. Slow WiFi-Right when...
It It worth Getting a Netgear X4S R7800 for $100 (Or Rather Keeping as I Already got it) to upgrade from my Asus 68U?
Selling a NETGEAR R7800 and ASUS RT-AC86U. Both are in perfect working condition. Will reset to factory settings with the latest stock firmware (or Vo...

Don't Miss These

  • 1
  • 2
  • 3