How to connect/disable authentication with Google authenticator

Google Authenticator is a mobile application for creating two.stage authentication codes.

In order to use this type of two.factor authentication, you need to install the “Google Authenticator ‘on your mobile device

Google authenticator recovery | 2FA verification problem solve | 1xbet 2FA Authenticator solve

For iOS owners, you can download the application here, or to the App Store app

For owners of Android, you can download the application here, or to the Play Market application

To connect authentication using the Google Authenticator application, you need:

enter, google, authenticator, code

In your personal account, go to the “Profile/Settings” section

In the section Two.factor authentication in the Google Authenticator field, click on the ‘switch (slider)’ and click ‘Continue’

Open the Google Authenticator application Scan the QR code or enter the code that will be displayed in the window that appears and click ‘Continue’

In the window that appears, enter the code from the Google Authenticator application and click ‘Turn on’

‘Switch (slider)’ on a green background means that you have authentication using the Google Authenticator application

To disable authentication using the Google Authenticator application, you need:

In your personal account, go to the “Profile/Settings” section

In the section two.factor authentication in the Google Authenticator field, click on the ‘switch (slider)’ to your email address will be sent to the code

In the window that appears in the settings of your account, enter this code and click ‘Send’

‘Switch (slider) on a gray background means that auttime autit the Google authenticator is disabled

If you have any difficulties in connecting, or you have questions, you can contact the technical support service in your personal account in the ‘Technical Support’ section or write us email to the address: Support24@ru.Unistex.com

Unitechnology OU Osmussaare tn 8, Lasnamäe Linnaosa, Harju Maakond, 13811, Tallinn, Estonia Registry Code – 14731902 Licence Number – FVT000475: Providing services of exchanging a virtual currency against a Fiat currency Providing a virtual currency wallet service Providing services of exchanging a virtual currency Against a Virtual Currency

Unitechnology OU operates UNI Stex cryptocurrency exchange and is registered under number FVT000475 (Registry Code 14731902) by State Ministry of Economic Affairs And Communications of Estonia Republic as a provider of activities of a virtual currency exchange operator and a deposit virtual currency operator.

Unitechnology OU operators Unistex cryptocurrency exchange, registered under the laws of Estonia under registration number 14731902 (FVT000475) at Osmussaare tn 8, Lasnamiie Linnaosa, Harju Maakond, 13811, Tallinn, Estonia.

Unistex Technology Inc., Operators Uni Stex Cryptocurrency Exchange, Registered Under The Laws of Canada, Registration Number MSB (Fintrac): M22662204.

Risk notifications

UNI STEX trading can lead to a loss of invested funds. Continuing the use of our site, you confirm that you got acquainted with our documents and clearly understand all the risks associated with trading on the Uni Stex platform. We draw your attention to the fact that we do not offer to trade on the platformuni Stex, we do not promise any profit and do not give any investment tips. We only provide an opportunity to trade, however, the decision to trade or not is your independent conscious decision. We do not offer UNI Stex platform services to citizens of jurisdictions, where the right to trade is limited or prohibited by the norms of applicable legislation. By registering on the UNI Stex platform, you confirm that you have reached the necessary age and are fully competent, and also have all the necessary rights to use the services of the Uni Stex platform according to the country’s jurisdiction by a citizen or resident of which you are.

We protect the personal data of users and process cookies only to personalize services. You can prohibit cookies processing in the browser settings. Please read the conditions of personal data processing and cookies. TO ACCEPT

What is it 2FA?

2FA (two.factor authentication) is a user identification method for authorization, which is used by two different types of authentication data. The following types of data are distinguished:

And now everything is the same, but in simple words.

At the entrance to the personal account of a site/service, 2 levels/stage of confirmation is used:

  • The first, as a rule, is a login pair (email)/password;
  • The second, for example, is a disposable check SMS code on the phone or code from the Google Authenticator application, which will be discussed right now.

Google authenticator

The application from Google allows you to create codes for two.stage authentication on the phone. You can download it from links:

Follow the links. download and install the application on your device: click/start/start/ready until we are asked to add an account.

At this stage, put our smartphone aside, open the BINANCE website.

enter, google, authenticator, code

How to install and configure Google Authenticator (Google Authenticator) to protect accounts (mail, exchanges, wallets)?

Depending on the type of your phone, we move to the App Store (for iPhone) or Google Play (for Android phones) in the search line enter the Google Authenticator and install the official application from Google to your mobile phone (smartphone).

Next, go to the site on which you will connect a two.stage authentication and enter your personal account, after which we go to the account settings to the “Security” or “Account Protection” section and select connect Google Authenticator.

On the 2FA connection page, a QR code and a “secret key” will be displayed (be sure to save them, take a screenshot from the site and write or print on a clean sheet and store it in a reliable place) through which you can connect a two-stage authentication (in the screenshot above the LiveCoin Exchange Example ).

On a mobile phone in the Google Authenticator application, click the red plus in the lower right corner and in the menu that appears, select “Scan the barcode” (meaning a QR code in the form of cubes) or “introduce the key” (secret key). It is more convenient to use the QR code, since it is instantly scanned through the phone camera and the account protection is immediately connected (in the Google Authenticator application, a window with the name of the account appears on which protection is placed and a 6-digit key appears, which will be required in the future when authorizing ). We click on the site, enter the generated six.digit code from the application on the phone and after that two.factor authorization using Google Authentifier will be connected.

Protection through Google Authenticator can be connected simultaneously in various accounts on different sites and all of them will be displayed by the list in the mobile application (different codes will be generated for each account).

Note: if Google Authenticator does not work (the generated six.digit code in the application does not fit when entering the site during authorization and writes the wrong code) you must go to the application on the phone, in the right corner, press the vertical 3 points and select “Settings in the menu “.” Correct correction for codes “.” synchronize “, after which the application synchronizes with the server and gives out new correct codes for entering.

How to restore an authenticator from Google when changing a mobile phone

In the case of a phone change (breakdown, loss), gain access to your account on the resource where Google has been installed by an authenticator, after re.installing the official Google Authenticator application on a new phone and recovery in the application using a reserve access code (secret key), which is needed. It was possible to save at the time of connection of the authenticator to protect the account.

It is enough to open the Google Authenticator application on a new phone to press a red plus in the lower right corner and enter a “secret key” or scan the QR code that needed to be saved when connecting two-factor authorization. After that, in the application on a mobile phone, a password will immediately be displayed for entering the account, to which access was restored.

Important: if at the time of connection of a two-stage authorization through Google an authenticator on any site you did not save a secret key or a QR code, and after that deleted the application on the phone (or the phone was lost or broke), you will not be able to enter your account. The only solution is to contact this site and ask for admins to disable two.stage authorization through this application (not always support does it or answers such questions, especially on large sites).

How to restore an authenticator from Google when changing a mobile phone

In the case of a phone change (breakdown, loss), gain access to your account on the resource where Google has been installed by an authenticator, after re.installing the official Google Authenticator application on a new phone and recovery in the application using a reserve access code (secret key), which is needed. It was possible to save at the time of connection of the authenticator to protect the account.

It is enough to open the Google Authenticator application on a new phone to press a red plus in the lower right corner and enter a “secret key” or scan the QR code that needed to be saved when connecting two-factor authorization. After that, in the application on a mobile phone, a password will immediately be displayed for entering the account, to which access was restored.

Important: if at the time of connection of a two-stage authorization through Google an authenticator on any site you did not save a secret key or a QR code, and after that deleted the application on the phone (or the phone was lost or broke), you will not be able to enter your account. The only solution is to contact this site and ask for admins to disable two.stage authorization through this application (not always support does it or answers such questions, especially on large sites).

How to disable Google authenticator?

We enter the Personal Account on the site where the Google authenticator was connected, go to the account security settings and click disconnect the Google Authenticator. It will be necessary to enter a 6-digit code from the Google Authenticator application, after which it will be disconnected.

Note: after disconnecting two-stage authentication via Google authenticator and connecting it anew, it is necessary to re-save the generated QR code and the “secret key” (the old ones will no longer be active and will not help when restoring access to the account).

How is the two.factor authentication of Google Authenticator

Google Authenticator supplements the protection of your account using an additional entry stage. To use the service, you need to register an account and enable the function. To implement the service, an application is used that is installed on mobile platforms, but this is not necessarily. The program is necessary for entering the identifier code, it comes to the smartphone and consists of 6-8 digits.

The standard entry form involves the use of login and password, but when using the Authenticator application, an additional step is required for identification. this is a connection with a registered smartphone. This method works for PC, and for a mobile device you need to generate a unique password, which will allow you to enter the profile. The generation of codes will be required not only for devices, but all the applications.

What is used for?

Google Authenticator Windows is an increased user protection level, which is achieved due to an additional identification step. To implement the concept, an application is used in which data is entered to enter the profile. The application of the application should be carried out in the background, it should not be closed.

When switching to any site, a special code will be created in the application, it must be entered into a special window that will pop up after pressing the synchronization button. When the password is transferred, an automatic entrance to the Google website and profile account will occur if they are connected. The key will be generated on the site, it will automatically be saved in a loaded program, and then it will be necessary for authorization.

The greatest benefits from the service will be for users who actively interact with various sites under their personal data with Google. After entering such sites, it will be possible to use all the functionality. The application saves time by eliminating the need for permanent registrations and inputs. A person will not have to spend efforts and time on passwords, since authentication will be performed automatically.

Protecting your Google account using two.factor authentication

In the modern world, even complex and unique cease to be a sufficient measure of the protection of your accounts on the network, because the main problem is the environment of their transfer. And the weakest link is the user himself.

Deto is that Brutus Formal Hackers have not been selected for public services for a long time, because the services themselves (postal, social networks) are protected from this kind of attacks. They block multiple attempts to select a password. That is why another attack vector is most often selected. the user himself and its data transfer environment. The easiest way to lure the password from the user himself, intercepting it when he crosses the fake link. In this process, elements of social engineering are actively used. For example, a fake is created (a photograph copied from a real profile is put) or the original account of the person who you trust (for example, your parents) is hacked and meaningful sentences and phishing links are sent on their behalf, clicking on which, you will send your data to the attacker. At the same time, the real data of people who were stolen from some other poorly protected site, such as an online store, can be used. Usually, simple online stores are worst.

Another option is to hack his mail in one way or another and get a link or temporary password from there, which generates the service to restore password. Of course, the list of options is not limited, but this article is not about that.

Another attack vector is a computer of the user himself, on which you can intercept and send the attacker the data entered by the user. For this, various keys are used that monitor the input buffer from the keyboard, various spy addors for browsers (panels, “Helpers”). The same goal is pursued by various “improvers” of popular social networks. unofficial applications that connect to real social networks through the API, but provide supposedly expanded opportunities (such as listening to music without restriction). They can also log in your user data.

The fourth type of attacks. MITM (“Man in the middle”). If the entrance is performed on a password, then you can present the following scenario of the attack:

  • User traffic is redirected to the attacking car
  • The attacker monitors attempts to connect to the server/application and redirects them to his server
  • The attacking server is, firstly, to keep a journal of all the entered data, including the user password, and, secondly, transfer commands to the legitimate server to which the user wants to connect to their execution, and then return the results to the legitimate user.

For this attack on the local network, you can redirect traffic in two ways:

  • ARP PUFING. During this attack, the attacker’s computer sends the ARP false messages that the MAC address of the router is the MAC address of the attacking computer. As a result, computers in the local network begin to send network bags through the attacking computer. This is a universal option that is suitable in all cases.
  • DNS Spufing. The essence of the replacement of answers to DNS queries, as a result, the victim’s computer will receive incorrect IP addresses for requested hosts. This option is suitable only if the connection to the remote server or site is performed by the name of the host.

For interception of user passwords in real time on sites, DNS is often used, when the user enters the fake site, which looks like the original and enters the data there. For example, there were several clones of the network. who stole user data.

No less popular, but not always working option. Cookie interception from the sites that you visited and entered data from the user browser. Cookie themselves does not contain pairs of login/password, but if the site that issues them is incorrectly configured, then stole the cookie file you can install a session with the server that issued them on behalf of the user and reset his password or change the data.

You can read here about safety and parameters of cookies here.

Modern sites based on popular open CMS are more or less protected and store passwords in the form of a hash which, even in case of leakage, is quite difficult and/or deciphered for a long time (depending on the accepted encryption algorithm). However, custom or manuscript engines often sin with low safety and it is easier to hack them, as a result of which user data leaks occur periodically, even from large sites. Well.protected sites should not store the user password at all.

Also, some are afraid to use authorization on various services through accounts in social networks (, VK, and T.D.). In general, this method of authorization is safe enough and it should not be afraid. With this method of authorization on sites, the password is not used. Instead, between a third.party site and the account in social networks, a safe connection is configured for the OAUTH protocol, which uses keys. The site trusts the public social service and does not check the password, but he asks the authentication service, you are verified by the user or not. The authentication service checking you gives out token to you to a browser session, which returns the authorization token to the site.Provided that your computer and browser are not compromised, such a one.time token transmission is safe. It is almost impossible to intercept and use such a token on another computer, but the only thing is that the authentication process in the social network can be compromised through the same cookies (few people come out of. and the session is constantly supported).

As you can see, the password can be stolen or an account can be compromised at various stages. But let me remind you that the purpose of the article is not to study the methods of attack and abduction of passwords, but protection against this using the example of Google account.

Why is it necessary to protect it? Many store passwords saved by Google Chrome on Google account. Indeed, it is convenient, but dangerous, if you do not use additional protection. With this use of the Google account, it is necessary to include two.factor authentication (2FA). 2FA is almost 100% authenticated by safe (see. application below). At the moment, it should be included on all sites where it is available.

You will have a QR code that you need to scan the Google Authenticator application

Or manually enter a 16-digit combination in the application if the smartphone does not want to recognize the code.

After entering the code, the exchange account will automatically be added to the Google Authenticator application list on your mobile device and will include:

the name of the account (which can be changed at will);

2-the first unique 6-digit code, which will then be generated by the application every 30 seconds;

After entering the code on the smartphone, click on the NEXT STEP website

We will have a proposal to record or save the generated 16-digit code. Do not forget to do it.

In order to insure yourself in case something happens to your smartphone (it will be dropped to the factory installations, will be heard, or you accidentally delete Google authenticator), you need to take a screenshot of the QR code and a 16-digit key and save it. Preferably not on the phone. Such prudence will allow you to restore the account if necessary through a QR code and key, and not lose access to your money.

Click Next STEP and proceed to the next step. By pressing “Prev Step”, you can return to the previous step.

It remains to complete the two.factor authentication of the account on the exchange

In the first field we enter or copy a 16-digit code.

In the second field we enter the password invented by you during registration.

In the third field, the 2FA code (which generated an authenticator)

Double defense for entering the account on the exchange was created. Now, to enter the exchange, you need to enter the code from Google authenticator, so do not delay your smartphone far away.

Using Google Authenticator, you can configure two.factor authentication for other exchanges (Bitfinex, Bittrex), as well as wallets that support it.

enter, google, authenticator, code

And yet, you can always refuse two.factor authentication by making the processes re.examined above.

In order to leave a comment, you must log in or register.

How to recover your Discord account with lost Authenticator / Backup code | Part 1

Installation and primary setting

To start the installation, you will need to download Google Authenticator in Play Market or App Store, depending on the device used and the operating system. The installation procedure is automatic, as for all the products available in the catalogs of the mentioned stores, so the user can only wait for the completion of download, installation and finally confirm the test of the safety of the downloaded application. The further configuration procedure is also not very difficult and looks as follows (for the example of the Android OS):

  • On the device with the Android operating system, open the “Settings” and go to the Google section. “Google Account Management”;
  • Next, go to the Safety subsection and select “Entrance to the Google account”;
  • Turn on the “Two.stage authentication” parameter and when you are requested, confirm the input of authorization data entrance to the Google account;
  • This can be done, for example, using a computer and a web browser, where it is enough to log in in your account and, by analogy, enable additional confirmation of the entrance.

After confirming that all the manipulations were successful, you should proceed to the setting of access under consideration using Google authenticator, and this will need to be done:

  • Go to the account settings and in the proposed options for the second stage, select the Authenticator application;
  • Select the type of phone used. “Android” or “iPhone”;
  • In the next step, it will be proposed by the QR code scanner to scan the generated code using the application itself on the mobile device;
  • Open the application and select the “Add account” section, and then select “Scan the barcode” or “Enter the key”, depending on what was activated in a step above;
  • In conclusion, confirm the manipulations to complete the settings.

Further actions depend on which resource used the two.factor authentication under consideration. For example, for authorization in Gmail.COM “will need to enter the main login and password and confirm the entrance with the code that will be generated in the application on the mobile device. The settings can be considered complete.

Recovery

Repeat once again about responsibility, which has already been mentioned earlier. It is assigned to each user regarding measures to ensure the safety of his data. Taking this into account, it must be borne in mind that the specifics of this application does not imply the preservation of codes/passwords on some servers, since all this is preserved only in the memory of the phone or tablet, which in turn leads to the impossibility of restoring data if the application is deleted or the settings will be reset to the factory values. Hence the conclusion that Google does not implement any restoration tools, and all the consequences and possibilities of obtaining access to any site (where two-factor authentication was previously used) are assigned to the shoulders of the owner of the account and the administration of the network resource. If the functionality under consideration was used on sites that do not provide access to financial transactions, then it is likely that the administration will go to the meeting and upon receipt of certain evidence (screenshots, photos, RPD) will provide access to the account. Online stores or payment services are very reluctant to meet in this case, which must be taken into account.

IMPORTANT. Therefore, given all of the above, it is worthwhile to deliberately indicate the list of network resources, where it is planned to use “Google Authenticator”, and in evaluative judgments of possible risks, the possibility of failures in the operation of the device or accidental removal of software.

Google authenticator

If you have a smartphone on iOS, Android or a mobile device from RIM, then you can install a special Google Authenticator application, which will replace incoming SMS with codes.

Consider the principle of the authenticator on the example of Android.

Acting according to the instructions, we load the Google Authenticator from Play Store to the smartphone smartphone. When starting, the application will offer you 2 settings: manual entry of the account and password, or scanning the QR code, which is on the page of installation of the application.

If you select an option with a QR code, then the authenticator can request the installation of the scanner application. We agree and put it. After that, scan the QR code on the settings page and enter the code generated by the application.

In the future, if it is necessary to enter the code, just just start the application and enter the generated code.

Way leaflet

With each, the situation may be adopted when the phone is forgotten at home, and with it the Authenticator application and the ability to receive SMS. In such a case, it is useful to play back and use the reserve codes.

You can simply rewrite them on a leaflet and print them, and then wear them in a wallet. Each such code is disposable, and when the printed codes begin to come to an end, it is enough to request the generation of a new pack of codes.

BYRGPUB.COM 2022