On Wednesday 18 April 2012 11:59:32 Simon Brereton wrote:
> Are you planning to implement 2-step authentication in the next Horde
> release?
>
> http://www.codinghorror.com/blog/2012/04/make-your-email-hacker-proof.html
>
> It would be relatively trivial so long as a mobile app can be written
> (
On Apr 19, 2012 3:48 AM, "Michael M Slusarz" wrote:
>
> Quoting Andrew Morgan :
>
>> I'm not sure where you are getting your information from - unless you
think Google's 2-step verification via a cell phone is not actually
2-factor authentication? Since a hacker won't have access to your phone,
t
Quoting Andrew Morgan :
I'm not sure where you are getting your information from - unless
you think Google's 2-step verification via a cell phone is not
actually 2-factor authentication? Since a hacker won't have access
to your phone, they cannot retrieve the one-time PIN generated by
Go
On Wed, 18 Apr 2012, Michael M Slusarz wrote:
Quoting Simon Brereton :
Hi
Are you planning to implement 2-step authentication in the next Horde
release?
http://www.codinghorror.com/blog/2012/04/make-your-email-hacker-proof.html
It would be relatively trivial so long as a mobile app can be
Quoting Simon Brereton :
Hi
Are you planning to implement 2-step authentication in the next
Horde release?
http://www.codinghorror.com/blog/2012/04/make-your-email-hacker-proof.html
It would be relatively trivial so long as a mobile app can be written
(and that could be done in html5, so i
Hi
Are you planning to implement 2-step authentication in the next Horde release?
http://www.codinghorror.com/blog/2012/04/make-your-email-hacker-proof.html
It would be relatively trivial so long as a mobile app can be written
(and that could be done in html5, so it shouldn't need to be device
d