المشاركات

Google Account

 
Jump to content

Google Account

From Wikipedia, the free encyclopedia
Google Account
Google account icon.svg
Type of site
Single sign-on
OwnerGoogle
URLmyaccount.google.com

Google Account is a user account that is required for access, authentication and authorization to certain online Google services. It is also often used as single sign on for third party services.

Usage[edit]

A Google Account is required for GmailGoogle HangoutsGoogle Meet and Blogger. Some Google products do not require an account, including Google SearchYouTubeGoogle BooksGoogle Finance and Google Maps. However, an account is needed for uploading videos to YouTube and for making edits in Google Maps.

YouTube and Blogger maintain separate accounts for users who registered with the services before the Google acquisition. However, effective April 2011 YouTube users are required to link to a separate Google Account if they wish to continue to log into that service.[1]

Google Account users may create a publicly accessible Google profile, to configure their presentation on Google products to other Google users. A Google profile can be linked to a user's profiles on various social-networking and image-hosting sites, as well as user blogs.

Third-party service providers may implement service authentication for Google Account holders via the Google Account mechanism.[2]

Security[edit]

While creating a Google account, users are asked to provide a recovery email address to allow them to reset their password if they have forgotten it, or if their account is hacked. In some countries, such as the United States, the United Kingdom and India, Google may also require one-time use of a mobile phone number to send an account validation code by SMS text messaging or voice message when creating a new account.[3][4]

Google also offers a two-step verification option—for additional security against hacking—that requests a validation code each time the user logs into their Google account. The code is either generated by an application ("Google Authenticator" or other similar apps) or received from Google as an SMS text message, a voice message, or an email to another account.[5][6] Trusted devices can be "marked" to skip this 2-step log-on authentication.[7] When this feature is switched on, software that cannot provide the validation code (e.g. IMAP and POP3 clients) must use a unique 16-character alphanumeric password generated by Google instead of the user's normal password.[8][9]

Users who seek an even higher level of security protection, including users whose accounts could be attractive targets for hackers, such as celebrities, politicians, journalists, political activists and wealthy individuals, can opt-in to Google's Advanced Protection Program. This program requires the user to purchase two U2F USB keys — not for data storage, but for identity verification. The U2F keys are used to provide two-step verification during login. One is for backup purposes, in case the first is lost. The Advanced Protection Program includes further security measures to protect the user's account, such as restrictions on which applications the user can grant access to their account, and a more thorough identity verification process for regaining access to the account if the password is forgotten.[10]

On June 5, 2012, a new security feature was introduced to protect users from state-sponsored attacks. Whenever Google analysis indicate that a government has attempted to compromise an account, a notice will be displayed that reads "Warning: We believe state-sponsored attackers may be trying to compromise your account or computer."[11][12]

Activity tracking[edit]

The tool called 'My Activity' launched in 2016 - which supersedes Google Search history and Google Web History — enables users to see and delete data tracked by Google through the Google account. The tool shows which websites were visited using Chrome while logged in, devices used, apps used, Google products interacted with, etc. All information is laid out in a timeline-like layout. Users can choose to entirely disable tracking, or remove certain activities which they don't want to be tracked.[13]

Account blocking[edit]

Google may block an account for various reasons, such as "unusual activity"[14] or entering an age "not old enough" to own a Google account.[15] Reactivation is possible using web-forms, providing proof of identity through valid photo ID,[16] or a credit card payment of US$0.30. Other methods (such as sending a fax or uploading some requested document) may require human interaction and may take some "days or a couple of weeks" to be accomplished.[17]

See also[edit]

References[edit]

  1. ^ "Why Connecting your YouTube and Google Accounts Matters". YouTube Blog. March 24, 2011. Archived from the original on August 5, 2011. Retrieved August 6, 2011. Retrieved on August 5, 2011
  2. ^ "About the Sign in Request Page"Archived from the original on July 13, 2015. Retrieved July 1, 2015.
  3. ^ "Gmail sign up procedure". LatestCrunch.in. 2012. Archived from the original on July 16, 2012. Retrieved July 17, 2012.
  4. ^ "I don't have a mobile phone, can I sign up?"Google. 2009. Retrieved July 8, 2009.
  5. ^ "2-step verification : How it works". 2012. Archived from the original on July 15, 2012. Retrieved July 17, 2012.
  6. ^ Fallows, James. "Hacked". Atlantic Monthly. Archived from the original on December 24, 2011. Retrieved December 26, 2011As email, documents, and almost every aspect of our professional and personal lives moves onto the "cloud"—remote servers we rely on to store, guard, and make available all of our data whenever and from wherever we want them, all the time and into eternity—a brush with disaster reminds the author and his wife just how vulnerable those data can be. A trip to the inner fortress of Gmail, where Google developers recovered six years' worth of hacked and deleted e‑mail, provides specific advice on protecting and backing up data now—and gives a picture both consoling and unsettling of the vulnerabilities we can all expect to face in the future.
  7. ^ "More on 2-step verification". 2012. Archived from the original on May 25, 2012. Retrieved July 17, 2012.
  8. ^ "Please Turn On Two-Factor Authentication"LifeHacker. August 8, 2012. Archived from the original on August 11, 2012. Retrieved August 14, 2012.
  9. ^ "9 Google Apps Security Secrets For Business". informationweek.com. August 14, 2012. Archived from the original on August 15, 2012. Retrieved August 14, 2012.
  10. ^ Gebhart, Gennie (January 22, 2018). "Google's Advanced Protection Program Offers Security Options For High-Risk Users"Electronic Frontier FoundationArchived from the original on July 10, 2018. Retrieved July 17, 2018.
  11. ^ "Google Online Security Blog". Official Gmail Blog. Archived from the original on June 9, 2012. Retrieved June 5, 2012.
  12. ^ CBC News (June 6, 2012). "Google to warn users of 'state-sponsored attacks'"Canadian Broadcasting CorporationArchived from the original on June 6, 2012. Retrieved June 6, 2012.
  13. ^ Eric Ravenscraft (June 29, 2016). "Google's New My Activity Page Lets You See and Delete All of Your Google Activity"Archived from the original on June 17, 2017. Retrieved May 26, 2017.
  14. ^ "Gmail Help Section".
  15. ^ "Google account help page".
  16. ^ "Google accounts help page".
  17. ^ "Google account help page". Archived from the original on January 15, 2013.

External links[edit]

إرسال تعليق

SQL MY SQL databases phone tablat computer And TV

  نبذة عن ووردبريس SQL MY SQL databases phone tablat co البحث مرحبًا،  admin تسجيل الخروج التجاوز إلى المحتوى SQL MY SQL databases phone tablat compouter And TV Home Services About Reviews Why Us Contact Home my sql What is MySQL? MySQL is the world’s most popular open source database. According to  DB-Engines , MySQL ranks as the second-most-popular database, behind  Oracle Database . MySQL powers many of the most accessed applications, including Facebook, Twitter, Netflix, Uber, Airbnb, Shopify, and Booking.com. Since MySQL is open source, it includes numerous features developed in close cooperation with users over more than 25 years. So it’s very likely that your favorite application or programming language is supported by MySQL Database. How do you pronounce “MySQL”? “My ess-cue-el” is the “official” way to pronounce “MySQL,” but pronouncing it “my sequel” is common too. What is the name of the MySQL dolphin? The MySQL logo is a dolphin named Sakila. The name...

Rac

  Skip  HOME RDBMS EXADATA WEBLOGIC APPSDBA OS OTHERS SCRIPTS Step by Step Manual Upgrade Oracle Database from 12c to 19c DBsGuru   >  DATABASE ,  UPGRADE  >   Step by Step Manual Upgrade Oracle Database from 12c to 19c DBsGuru   February 20, 2022   0 Comments 0 ( 0 ) Step by Step Manual Upgrade Oracle Database from 12c to 19c In a recent post, we demonstrated  Step by Step Oracle Database Upgrade from 11g (11.2.0.4) to 12c (12.2.0.1) using DBUA,  click here to read more about it.   In this article, we are going to demonstrate Step by Step Manual Upgrade Oracle Database from12c to 19c on Linux. Follow the below steps to perform a manual upgrade to 19c. List of target upgrade versions from supported source version along with the certificate,  data source  support.oracle.com . Direct Upgrade List: Source DB Version Target DB Version 18.1 19c 12.2.0.2 19c 12.1.0.2 19c 11.2.04 19c Indirect Upgrade List: So...

Send Whatsapp Query