His roundups of new features in Windows 10 updates have been called "the most detailed, useful Windows version previews of anyone on the web" and covered by prominent Windows journalists like Paul Thurrott and Mary Jo Foley on TWiT's Windows Weekly. Instructional tutorials he's written have been linked to by organizations like The New York Times, Wirecutter, Lifehacker, the BBC, CNET, Ars Technica, and John Gruber's Daring Fireball. The news he's broken has been covered by outlets like the BBC, The Verge, Slate, Gizmodo, Engadget, TechCrunch, Digital Trends, ZDNet, The Next Web, and Techmeme. Beyond the column, he wrote about everything from Windows to tech travel tips. He founded PCWorld's "World Beyond Windows" column, which covered the latest developments in open-source operating systems like Linux and Chrome OS. He also wrote the USA's most-saved article of 2021, according to Pocket.Ĭhris was a PCWorld columnist for two years. ![]() ![]() Beyond the web, his work has appeared in the print edition of The New York Times (September 9, 2019) and in PCWorld's print magazines, specifically in the August 2013 and July 2013 editions, where his story was on the cover. With over a decade of writing experience in the field of technology, Chris has written for a variety of publications including The New York Times, Reader's Digest, IDG's PCWorld, Digital Trends, and MakeUseOf. Chris has personally written over 2,000 articles that have been read more than one billion times-and that's just here at How-To Geek. But, with a physical authentication key that works in concert with your browser, the browser can ensure it's communicating with the real website and the code can't be captured by an attacker.Ĭhris Hoffman is the former Editor-in-Chief of How-To Geek. They could then use that code to log into Google. For example, a phishing site could show you a fake Google login page and capture your one-time-use code when you attempt to log in. It's also simpler and more convenient to use. This solution works better than SMS verification and one-time-use codes because it can't be intercepted and messed with. ![]() In the future, these devices should work with NFC and Bluetooth for communicating with mobile devices without USB ports. Whenever you want to log into your account from a new computer, you'll have to insert the USB key and press a button on it. This is just a small USB key you put on your keychain. Big companies from the technology and financial sectors are creating a standard known as U2F, and it's already possible to use a physical U2F token to secure your Google, Dropbox, and GitHub accounts. Physical authentication keys are another option that are starting to become more popular. Related: U2F Explained: How Google and Other Companies Are Creating a Universal Security Token
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |