Tags » Authentication

Chapter 8 - Sign in, sign out

Chapter 8 adds functionality for registered users to sign in and out by adding authentication machinery using sessions and cookies. I’m going to list the commands run and files here as a reference, because it includes a good span of files and it will be handy to have an abridged reference for setting up a new feature like this. 546 more words

Ruby

Keytool Update: Whitelisting is here - Find out what it means to you

Authentication is one of the first tasks a developer needs to understand when using the Valence development platform. The workflow looks something like this:

  1. Register an app with Keytool to receive an active App ID\Key pair.
  2. 787 more words

Locks, keys, and passwords have all seen their heyday

When I first started paying attention to smartphone-based locks, I was worried about them being hacked and their batteries going dead. Still am. I initially thought that we would still be defaulting to physical locks and keys for some time to come. 138 more words

biometric authentication & you

The problem of authentication, of verifying one’s identity, is becoming increasingly complex. How do I prove that I really am me to thus gain access to the benefits of being me? 779 more words

Authentication

But that's MY company - PROOF it!

It’s all too easy to hijack a company or LLP. If you want to minimise the risk of a fraudster targeting and damaging your business, you need to PROOF it! 566 more words

Business

Security Countermeasure - Authentication

Authentication is the process of verification that an individual or an entity is who it claims to be. Authentication is commonly performed by submitting a user name or ID and one or more items of private information that only a given user should know. 1,277 more words

Security

Security Countermeasure - Cryptography

Cryptography is the practice and study of techniques for secure communication in the presence of third parties (called adversaries). More generally, it is about constructing and analysing protocols that overcome the influence of adversaries and which are related to various aspects in information security such as data confidentiality, data integrity, authentication, and non-repudiation. 1,736 more words

Security