Downlaod App

Smart Hide IP

Smart Hide IP 2.7.1.6


Can Someone Find me with my IP Address?
Yes! In most cases all that can be easily determined is who your ISP is and possibly the state and city you reside in. Cybercriminals can use it to track back to your computer's specific IP address, which means they can secretly read your emails and IM conversations,watch your shopping habits, detect personal information such as SSN, credit card passwords, even others...
Hide your IP with Smart Hide IP NOW.

Features
* Surfing online Anonymously
* Keeping Hackers off
* Preventing Identity Theft & Credit Card Fraud
* Blocking ISP Eavesdropping
* Protecting Online Privacy
* Chatting in MIRC, ICQ, and MSN with real location concealed.
* Shopping online securely
* Ensuring Internet banking safe
* Sending anonymous Emails
* Posting on bulletin boards without displaying your real identity
* Protecting all connections including Wi-Fi
* Accessing Internet radioes

Primary Benefits
* Safe Proxy
Every IP address you see is usable, fast and 100% secure!

* Easy-to-use Interface
One single click and you are ready to go. Hide your real IP address without any configuration.

* Dynamic IP Address
Automated IP changing protection, customize set-it-and-stop-it manual mode.

* Works With a Lot
Compatible with Windows 7, Vista, XP, 2000, 98 and Server editions, 32 and 64 bit.

A History of Windows Highlights from the First 25 Years

Getting started: Microsoft co-founders
Paul Allen (left) and Bill Gates
1975–1981: Microsoft Boots Up


It’s the 1970s. At work, we rely on typewriters. If we need to copy a document, we likely use a mimeograph or carbon paper. Few have heard of microcomputers, but two young computer enthusiasts, Bill Gates and Paul Allen, see that personal computing is a path to the future.

In 1975, Gates and Allen form a partnership called Microsoft. Like most start-ups, Microsoft begins small, but has a huge vision—a computer on every desktop and in every home. During  the next years, Microsoft begins to change the ways we work.

The Dawn of MSDOSIn June 1980, Gates and Allen hire Gates’ former Harvard classmate Steve Ballmer to help run the company. The next month, IBM approaches Microsoft about a project code-named
"Chess." In response, Microsoft focuses on a new operating system—the software that manages, or runs, the computer hardware and also serves to bridge the gap between the computer hardware and programs, such as a word processor. It’s the foundation on which computer programs can run. They name their new operating system "MSDOS."
When the IBM PC running MSDOS ships in 1981, it introduces a whole new language to the
general public. Typing “C:” and various cryptic commands gradually becomes part of daily work. People discover the backslash (\) key. MSDOS is effective, but also proves difficult to understand for many people. There has to be a better way to build an operating system. MSDOS stands for Microsoft Disk Operating System.


1982–1985: Introducing Windows 1.0

Windows 1.0
Microsoft works on the first version of a new operating system. Interface Manager is the code name and is considered as the final name, but Windows prevails because it best describes the boxes or computing “windows” that are fundamental to the new system. Windows is announced in 1983, but it takes a while to develop. Skeptics call it “vaporware.”
 
The fully-packaged Windows 1.0
On November 20, 1985, two years after the initial announcement, Microsoft ships Windows 1.0. Now, rather than typing MSDOS commands, you just move a mouse to point and click your way through screens, or “windows.” Bill Gates says, “It is unique software designed for the serious PC user…” There are drop-down menus, scroll bars, icons, and dialog boxes that make programs easier to learn and use. You're able to switch among several programs without having to quit and restart each one. Windows 1.0 ships with several programs, including MSDOS file management, Paint, Windows Writer, Notepad, Calculator, and a calendar, card file, and clock to help you manage day-to-day activities. There’s even a game—Reversi.
Windows 1.0


Geek trivia: Remember floppy disks and kilobytes? Windows 1.0 requires a minimum of 256 kilobytes (KB), two double-sided floppy disk drives, and a graphics adapter card. A hard disk and 512 KB memory is recommended for running multiple programs or when using DOS 3.0 or higher.




1987–1992: Windows 2.0–2.11
(More windows, more speed)


Windows 2.0
On December 9, 1987 Microsoft releases Windows 2.0 with desktop icons and expanded memory. With improved graphics support, you can now overlap windows, control the screen layout, and use keyboard shortcuts to speed up your work. Some software developers write
their first Windows–based programs for this release.

Windows 2.0 is designed for the Intel 286 processor. When the Intel 386 processor is released, Windows/386 soon follows to take advantage of its extended memory capabilities. Subsequent Windows releases continue to improve the speed, reliability, and usability of the
PC. In 1988, Microsoft becomes the world’s largest PC software company based on sales. Computers are starting to become a part of daily life for some office workers. Control Panel makes its first appearance in Windows 2.0. 

1990–1994: Windows 3.0–Windows NT
(Getting the Graphics)

Windows 3.1 in 1992
On May 22, 1990, Microsoft announces Windows 3.0, followed shortly by Windows 3.1 in 1992. Taken together, they sell 10 million copies in their first 2 years, making this the most widely used Windows operating system yet. The scale of this success causes Microsoft to revise earlier plans. Virtual Memory improves visual graphics. In 1990 Windows starts to look like the versions to come.

Windows now has significantly better performance, advanced graphics with 16 colors, and improved icons. A new wave of 386 PCs helps drive the popularity of Windows 3.0. With full support for the Intel 386 processor, programs run noticeably faster. Program Manager, File Manager, and Print Manager arrive in Windows 3.0. 

 
Bill Gates Shows the Newly Released
Windows 3.0
 Windows software is installed with floppy discs bought in large boxes with heavy instruction manuals.

The popularity of Windows 3.0 grows with the release of a new Windows software
development kit (SDK), which helps software developers focus more on writing programs and less on writing device drivers.

Windows is increasingly used at work and home and now includes games like Solitaire, Hearts, and Minesweeper. An advertisement: “Now you can use the incredible power of Windows 3.0 to goof off.” Windows for Workgroups 3.11 adds peer-to-peer workgroup and domain networking support and, for the first time, PCs become an integral part of the emerging client/server computing evolution.

Windows NT
When Windows NT releases on July 27, 1993, Microsoft meets an important milestone: the completion of a project begun in the late 1980s to build an advanced new operating system from scratch. "Windows NT represents nothing less than a fundamental change in the way that companies can address their business computing requirements," Bill Gates says at its release. Unlike Windows 3.1, however, Windows NT 3.1 is a 32-bit operating system, which  makes it a strategic business platform that supports high-end engineering and scientific programs.  The group that develops Windows NT was originally called the "Portable Systems" team. 


1995–2001: Windows 95
the PC comes of age (and don't forget the Internet)

Launch day: Bill Gates introduces Windows 95
On August 24, 1995, Microsoft releases Windows 95, selling a record-setting 7 million copies in the first five weeks. It’s the most publicized launch Microsoft has ever taken on. Television commercials feature the Rolling Stones singing "Start Me Up" over images of the new Startbutton. The press release simply begins: “It’s here.”  
This is the era of fax/modems, email, the new online world, and dazzling multimedia games and educational software. Windows 95 has built-in Internet support, dial-up networking, and new Plug and Play capabilities that make it easy to install hardware and software. The 32-bit operating system also offers enhanced multimedia capabilities, more powerful features for mobile computing, and integrated networking. At the time of the Windows 95 release, the previous Windows and MSDOS operating systems are running on about 80 percent of the world’s PCs. Windows 95 is the upgrade to these operating systems. To run Windows 95, you need a PC with a 386DX or higher processor (486 recommended) and at least 4 MB of RAM (8 MB of RAM recommended). Upgrade versions are available for both floppy disk and CD-ROM formats. It’s available in 12 languages. Windows 95 features the first appearance of the Start menu, taskbar, and minimize, maximize, and close buttons on each window.


Catching the Internet wave 

In the early 1990s, tech insiders are talking about the Internet—a network of networks that has the power to connect computers all over the world. In 1995, Bill Gates delivers a memo titled “The Internet Tidal Wave,” and declares the Internet as “the most important development since the advent of the PC.” 

In the summer of 1995, the first version of Internet Explorer is released . The browser joins those already vying for space on the World Wide Web. In 1996, Microsoft releases Flight Simulator for Windows 95—the first time in its 14-year history that it’s available for Windows.



1998–2000:Win 98, Win 2000, Windows Me

Released on June 25, 1998, Windows 98 is the first version of Windows designed specifically for consumers. PCs are common at work and home, and Internet cafes where you can get online are popping up. Windows 98 is described as an operating system that “Works Better, Plays Better.”
With Windows 98, you can find information more easily on your PC as well as the Internet. Other improvements include the ability to open and close programs more quickly, and support for reading DVD discs and universal serial bus (USB) devices. Another first appearance is the Quick Launch bar, which lets you run programs without having to browse the Start menu or look for them on the desktop.
Windows 98 is the last version based on MSDOS. 

Designed for home computer use, Windows Me offers numerous music, video, and home networking enhancements and reliability improvements compared to previous versions.


First appearances: System Restore, a feature that can roll back your PC software configuration to a date or time before a problem occurred. Windows Movie Maker provides users with the tools to digitally edit, save, and share home videos. And with Microsoft Windows Media Player 7 technologies, you can find,  organize, and play digital media. Technically speaking, Windows Me was the last Microsoft operating system to be based on the Windows 95 code base. Microsoft announced that all future operating system products would be based on the Windows NT and Windows 2000 kernel.

Windows 2000 Professional

More than just the upgrade to Windows NT Workstation 4.0, Windows 2000 Professional is designed to replace Windows 95, Windows 98, and Windows NT Workstation 4.0 on all business desktops and laptops. Built on top of the proven Windows NT Workstation 4.0 code base, Windows 2000 adds major improvements in reliability, ease of use, Internet compatibility, and support for mobile computing. 

Among other improvements, Windows 2000 Professional simplifies hardware installation by adding support for a wide variety of new Plug and Play hardware, including advanced networking and wireless products, USB devices, IEEE 1394 devices, and infrared devices.  The nightly stress test performed on Windows 2000 during development is the equivalent of three months of run time on up to 1,500 computers

2001–2005: Windows XP
(Stable, usable, and fast)

On October 25, 2001, Windows XP is released with a redesigned look and feel that's centered on usability and a unified Help and Support services center. It’s available in 25 languages. From the mid-1970s until the release of Windows XP, about 1 billion PCs have been shipped worldwide.

For Microsoft, Windows XP will become one of its best-selling products in the coming years. It’s both fast and stable. Navigating the Start menu, taskbar, and Control Panel are more intuitive. Awareness of computer viruses and hackers increases, but fears are to a certain extent calmed by the online delivery of security updates. Consumers begin to understand warnings about suspicious attachments and viruses. There’s more emphasis on Help and Support. 

Windows XP Home Edition offers a clean, simplified visual design that makes frequently used features more accessible. Designed for home use, Windows XP offers such enhancements as the Network Setup Wizard, Windows Media Player, Windows Movie Maker, and enhanced digital photo capabilities.
 
Windows XP Professional brings the solid foundation of Windows 2000 to the PC desktop, enhancing reliability, security, and performance. With a fresh visual design, Windows XP Professional includes features for business and advanced home computing, including remote desktop support, an encrypting file system, and system restore and advanced networking features. Key enhancements for mobile users include wireless 802.1x networking support, Windows Messenger, and Remote Assistance. Windows XP has several editions during these years:

  • Windows XP 64-bit Edition (2001) is the first Microsoft operating system for 64-bitprocessors designed for working with large amounts of memory and projects such as movie special effects, 3D animations, engineering, and scientific programs.
  • Windows XP Media Center Edition (2002) is made for home computing andentertainment. You can browse the Internet, watch live television, enjoy digital musicand video collections, and watch DVDs.
  • Windows XP Tablet PC Edition (2002) realizes the vision of pen-based computing. Tablet PCs include a digital pen for handwriting recognition and you can use the mouse or keyboard, too.
Windows XP is compiled from 45 million lines of code. 2006–2008: Windows Vista—Smart on security


2006–2008: Windows Vista—Smart on security

Windows Vista is released in 2006 with the strongest security system yet. User Account Control helps prevent potentially harmful software from making changes to your computer.
In Windows Vista Ultimate, BitLocker Drive Encryption provides better data protection for

your computer, as laptop sales and security needs increase. Windows Vista also features enhancements to Windows Media Player as more and more people come to see their PCs as central locations for digital media. Here you can watch television, view and send photographs, and edit videos. Design plays a big role in Windows Vista, and features such as the taskbar and the borders around windows get a brand new look. Search gets new emphasis and helps people find files on their PCs faster. Windows Vista introduces new editions that each have a different mix of features. It's available in 35 languages. The redesigned Start button makes its first appearance in Windows Vista.  More than 1.5 million devices are compatible with Windows Vista at launch.

2009–Windows 7 and counting...

By the late 2000s, the wireless world has arrived. When Windows 7 is released in October 2009, laptops are outselling desktop PCs and it’s common to get online at public wireless hotspots like coffee shops. Wireless networks can be created at the office or at home. Windows 7 includes many features, such as new ways to work with windows—Snap, Peek, and Shake. Windows Touch makes its debut, enabling you to use your fingers to browse the
web, flip through photos, and open files and folders. You can stream music, videos, and
photos from your PC to a stereo or TV.

By the fall of 2010, Windows 7 is selling seven copies a second—the fastest- selling operating system in history. Improvements to the Windows 7 taskbar include live thumbnail previews Windows 7 is evaluated by 8 million beta testers worldwide before it's released.

Free VPN Service Providers

If you're of the mindset that what you do with your BitTorrent client is your business and not that of people snooping, sniffing, and prying at your packets along the way, then you'll need a VPN to keep your traffic encrypted and secure. Even so, which free VPN service is the best, and which offers the best combination of reliability, features, security, and affordability? We'll be looking at the top five free VPN service providers based on our test.

 

 SecurityKiss

 SecurityKiss is a popular free VPN service available for use on PCs only. The paid version available for use on Mac, Linux, and smartphones. The free package includes a 300MB daily limit, and an unspecified bandwidth speed cap of less than 12.5 Mbps, and basic packages start at about $6 per month.Software installation is required.

 

 

 

Its Hidden

 ItsHidden uses 128-bit encryption on the secure tunnel created between you and the ItsHidden servers. Based out of the Netherlands, ItsHidden takes advantage of the legal climate there and doesn't log any activity passed through its servers. Available on Mac, PC, and Linux, and requires no software installation.

 

 

 

 

 CyberGhost

CyberGhost VPN is a free utility that encrypts, anonymizes, and offshores your internet use when you're using public Wi-Fi at an airport or coffee shop, or you're worried someone on your network is running a tool like Firesheep to gather credentials Cyber Ghost is limited to PCs only, and software installation is required.

 

 

Hotspot Shield

Hotspot Shield is a free program that allows you to secure your connection while surfing WiFi hotspots and to access sites not normally available outside of the USA, like Huluand Pandora.
Everything is done in an extra tab open in your browser, so there's no need to configure anything. A green and red shield in your system tray indicates when Hotspot Shield is or is not connected. The VPN is encrypted with 128 bit SSL encryption so you can surf safely without worrying about others intercepting your data.  It works on Mac and PCs along with Android and iOS devices.

 

Your Freedom

Your Freedom services makes accessible what is unaccessible to you, and it hides your network address from those who don't need to know. Just download the client application and install or just run it on your PC; it turns your own PC into an uncensored, anonymous web proxy and an uncensored, anonymous SOCKS proxy that your applications can use, and if that's not enough it can even get you connected to the Internet just as if you were using an unrestricted DSL or cable connection -- just like the firewall suddenly went boom! You can even make your PC accessible from the Internet if you like.

अपने Gmail पर ताला लगाया क्या

जरा सोचिए अगर आपका जीमेल (Gmail) हैक हो जाए यानी उसका पासवर्ड किसी के हाथ लग जाए तो आप पर क्या कहर बरसेगा? आपकी गोपनीय जानकारी हैकर के हाथ लग जाएगी. जब तक आपको इस चोरी की भनक लगेगी तब तक ना जाने कितने राज बेपर्दा हो चुके होंगे.
अगर पासवर्ड गया तो सब गया!

ऑफिस के जरूरी ईमेल, जिन्हें आपने जीमेल में संभाल कर रखा था, आपकी सैलरी स्लिप, बैंक डिटेल्स, इनवेस्टमेंट और इंशोरेन्स का पूरा ब्योरा, म्यूचुअल फंड की स्लिप, एलआईसी का प्रीमियम, ऑनलाइन खरीदारी की रसीदें, ईएमआई की डिटेल्स, रेल और हवाई जहाज की टिकटें, पासपोर्ट की स्कैन कॉपी, पैन-कार्ड, क्रेडिट-कार्ड, होटल बुकिंग, इनकम टैक्स का कच्चा चिट्ठा, इनकम टैक्स रिटर्न की रसीद... आप अपने जीमेल के पुराने पन्नों को पलट कर देखिए तो सही, याद आएगा कि अपने कितने राज आप जीमेल के हवाले कर चुके हैं. लेकिन ध्यान रखें अगर पासवर्ड गया तो ये सब भी गया!
अगला शिकार आप हो सकते हैं

अगर आप एंड्रॉयड फोन इस्तेमाल करते हैं तो आपको पता ही होगा कि आपके फोन में जो कुछ भी है, लगभग वो सभी गूगल के लॉकर में भी बंद है. चाहे गूगल प्लस पर भेजी गयी तस्वीरें हों या 'गूगल ड्राइव' में छिपा कर रखे गये कागजात. हर दिन लाखों पासवर्ड हैक होते हैं. अगला नंबर आपका हो सकता है.
एक ही होगा गूगल के सभी ऐप्लीकेशन्स (Apps) का पासवर्ड

ये तो आपको पता ही होगा की गूगल की दुनिया में हर ताले की चाभी एक ही होती है. यानी गूगल के सभी ऐप्लीकेशन्स (Apps) का पासवर्ड एक ही होगा. चाहे वो क्रोम ब्राउसर (chrome browser) हो, जीमेल चैट हो या यू-ट्यूब (You Tube). मतलब, आपका पासवर्ड पता चला जाए तो पल भर में ही ये भेद खुल जाएगा कि ऑफिस में चुपचाप आप कौन-कौन सी वेबसाइट्स देखते हैं, घर में कमरा बंद करके किससे चैट करते हैं और देर रात यू-ट्यूब (YouTube) पर कौन से वीडियो खोजते हैं. यही नहीं, आपको याद दिला दूं कि तमाम दूसरी वेबसाइट्स पर एकांउट खोलते समय आपने जीमेल का ही पता दिया था. यानी उन वेबसाइट्स पर अगर 'पासवर्ड भूल गया हूं' (Forgot Password ?) का बटन दबाया जाए तो नया पासवर्ड जीमेल पर ही आएगा.
जब इतना कुछ जीमेल के लॉकर में ही बंद है तो सवाल उठता है कि आपने अपने जीमेल पर ताला लगाया क्या? ऐसा ताला, जिसकी चाभी सिर्फ आपका पासवर्ड नहीं हो. ऐसा ताला कि किसी ने आपका जीमेल खोलने की कोशिश की नहीं, और आपका फोन फौरन आपको सावधान कर देगा.

ये है जीमेल को हैकर-प्रूफ बनाने का तरीका

इस तरीके को टू स्टेप वेरिफिकेशन (2-step verification) कहते हैं. आगे बढ़ने से पहले, तीन बातें बताना बेहद जरूरी है. अगर आपने इनको नजरअंदाज किया तो इस बात का खतरा है कि आपका जीमेल लॉक हो जाए और आप मुश्किल में पड़ जाएं. इसके लिए आप खुद जिम्मेदार होंगे.
कोई ऐसा कंप्यूटर चाहिए जो आपके लिए हमेशा उपलब्ध हो

पहली बात ये है कि जीमेल पर टू-स्टेप वेरिफिकेशन (2- step verification) को एक्टिवेट करने का काम आप अपने घर या ऑफिस के किसी ऐसे कंम्पयूटर से करें जो आपके लिए हमेशा उपलब्ध हो. इस कंम्पयूटर को ट्रस्टेड कंम्पयूटर बनाना नहीं भूलें (जिसका तरीका आगे बताया गया है). कुछ गड़बड़ हो जाए तो इस कंम्पूटर पर आकर आप आसानी से सब कुछ ठीक कर सकते हैं और चाहें तो टू-स्टेप वेरिफिकेशन (2- step verification) को ऑफ भी कर सकते हैं.
बैकअप ईमेल व बैकअप मोबाइल नंबर डालें

दूसरी बात है कि सेटअप करते समय अपने जीमेल में एक बैकअप ईमेल (इस जीमेल के अलावा कोई दूसरा ईमेल) और एक बैकअप मोबाइल नंबर (अपने मोबाइल नंबर के अलावा कोई दूसरा मोबाइल नंबर ) जरूर डालें. मोबाइल चोरी हो जाने पर या एंकाउट में किसी तरह की गड़बड़ होने पर ये बहुत काम आएगा.
तीसरी और आखिरी बात है कि जीमेल का टू-स्टेप वेरिफिकेशन (2- step verification) शुरू करते ही हो सकता है कि आपके जीमेल से जुड़ी कुछ दूसरी सर्विसेज (जैसे यू-ट्यूब, मोबाइल पर जीमेल आदि) काम करना बंद कर दें. घबराएं नहीं, इसको ठीक करना बेहद आसान है. ठीक करने का तरीका आगे बताया गया है और ये काम आपको सिर्फ एक बार करना होगा.
तो आइए, अपने जीमेल को हैकर-प्रूफ बनाने के लिए उस पर मजबूत ताला लगाने का काम शुरू करते हैं...
1. अपने जीमेल एंकाउट में लॉग-इन करें. ध्यान रहे की आगे बढ़ने पर जीमेल कभी भी फिर से आपका पासवर्ड मांग सकता है. ये आपकी सुरक्षा के लिए है. पासवर्ड डाल कर आगे बढ़ते जाएं.
2. दाहिनी तरफ सबसे ऊपर बने अपने फोटो (या फोटो की खाली जगह) पर क्लिक करें.










3. जो छोटा सा विंडो खुला, उसमें अपने नाम और ईमेल के नीचे लिखे 'एकांउट' पर क्लिक करें.











4. अब आपके सामने नया विंडो है. इस विंडो में बांए हाथ पर जो ऑपशन्स दिख रहें हैं, उसमें पांचवें नंबर के ऑपशन 'सिक्योरिटी' (Security) को क्लिक करें.













5. अब आपके सामने जो विंडो खुला है, उसमें दूसरे नंबर पर (पासवर्ड के बाद) लाल रंग के बैग के साथ 'रिकवरी ऑप्शन' ( Recovery Option) होगा. यहां फोन नंबर और ईमेल की अपनी जानकारी को ध्यान से अपडेट करें. अगर जानकारी ठीक नहीं है तो उसे एडिट करके सही करें. 'रिकवरी ईमेल' (Recovery Email) में अपने जीमेल के अलावा कोई दूसरा ईमेल ऐड्रेस डालें.













6. अब इसी विंडो में और नीचे (ताले के निशान के साथ) टू-स्टेप वेरिफिकेशन पर आएं. यहां आपका स्टेट्स 'ऑफ' (Off) लिखा होगा. 'एडिट' पर क्लिक करें. (याद रखें, यदि कोई गड़बड़ हो जाए तो यहीं पर आकर आप टू-स्टेप वेरिफिकेशन को फिर से ऑफ कर सकते हैं).

7. टू स्टेप वेरिफिकेशन का नया विंडो खुल गया होगा. दाहिनी तरफ नीले रंग के स्टार्ट सेट अप (Start Set up) पर क्लिक करें. अब आप अपने जीमेल को सुरक्षित बनाने से सिर्फ चार कदम दूर हैं.

8. जो विडों खुला उसमें अपना मोबाइल नंबर डालने से पहले चेक कर लें कि अपने देश का झंडे का निशान दिख रहा है. (ये देश का आईएसडी कोड दिखाता है. भारत का कोड +91 है. अपना मोबाइल नंबर डालें. फोन नंबर के नीचे कोड भेजने का ऑपशन में एसएमएस पहले से दिख रहा होगा. उसे नहीं बदलें. कोड भेजने का बटन क्लिक करे.

9. अब आपको अपने मोबाइल पर एसएमएस के जरिए छह डिजिट का एक नंबर मिलेगा. उस कोड को यहां डाल कर 'वेरिफाई' पर क्लिक करें.

10. अब जीमेल आपसे पूछेगा का क्या जिस कंम्पयूटर को आप अभी इस्तेमाल कर रहें हैं उसे आपके भरोसे का कंम्पयूटर माना जाए. यदि ऐसा है तो 'ट्रस्ट दिस कंम्पयूटर' पर टिक करके आगे बढें. जीमेल याद रखेगा कि ये आपका कंम्पयूर है. टू-स्टेप विरेफिशन को कन्फर्म कर दें.

बधाई हो. जीमेल पर ताला लगाने का काम अब पूरा हुआ. अब जब भी आप किसी नए कंम्पयूटर से अपने जीमेल में लॉग इन करने की कोशिश करेंगें, अपने पासवर्ड के अलावा एक छह डिजिट का वेरिफिकेशन कोड भी आपको डालना होगा. ये कोड आपको अपने मोबाइल पर एसएमएस से मिलेगा.
अभी एक और है मुश्किल
लेकिन जरा सी मुश्किल अभी बाकी है. जीमेल पर ताला तो लग गया लेकिन गूगल और जीमेल से जुड़ी कुछ और सर्विसेज हो सकता है समझ ना पाएं की आपने टू-स्टेप वेरिफिकेशन शुरू कर दिया है. कुछ एप्लीकेशन्स दोबारा लॉग इन करने को कह सकती हैं और कुछ हो सकता है काम ही करना बंद कर दें. इसमें आपके फोन का जीमेल ऐप्लीकेशन भी हो सकता है.
ठीक करने के लिए या तो फोन पर ब्राउसर के जरिए (जीमेल.कॉम टाइप करके) पर जाएं और अपने फोन नंबर (या बैकप फोन नंबर) पर जो छह डिजिट का कोड मिले उसे डाल कर लॉग-इन कर लें. ये सिर्फ एक बार करना होगा. उसके बाद आपका फोन बार-बार वेरिफिकेशन कोड नहीं मांगेगा. एंड्रॉयड फोन पर हो सकता है आपको अपना जीमेल एकांउट डिलिट करके एक बार फिर से डालना पड़े.
बात नहीं बनती है तो भी चिंता करने की कोई जरूरत नहीं है. नीचे दिए गए लिंक को क्लिक करें. यहां से आप गूगल से जुडीं हर तरह की सर्विस के लिए पासवर्ड पा सकते हैं. पासवर्ड बनाएं और जहां जरूरत हो वहां डाल दें. इस पासवर्ड को याद रखने की जरूरत नहीं है क्योंकि ये पासवर्ड सिर्फ एक बार डालना होगा.
https://accounts.google.com/b/0/IssuedAuthSubTokens?hide_authsub=1

एक बार फिर से याद दिला दें कि आप कभी भी (ऊपर बताए गए तरीके से स्टेप नंबर 6 तक जाकर) टू स्टेप वेरिफिकेशन को ऑफ कर सकते हैं.

अगर आप स्मार्ट फोन इस्तेमाल करते हैं तो वेरिफिकेशन कोड पाने का एसएमएस से भी एक बेहतर और आसान तरीका है. अगर आपका फोन एंड्रायड है तो गूगल प्ले स्टोर से, आई-फोन है तो एप स्टोर से और अगर ब्लैकबेरी है तो m.google.com/authenticator पर जाकर गूगल ऑथेंटिकेटर नाम का एप (Google Authenticator app) डाउनलोड कर लें. इससे आप बिना एसएमएस का इस्तेमाल किए कभी भी वही कोड पा सकते हैं. खास बात ये है कि ये एप बिना इंटरनेट, यहां तक कि बिना मोबाइल नेटवर्क के भी बखूबी काम करेगा.
काम खत्म हुआ, अब नीचे दिए गए लिंक पर क्लिक करके आप चेक कर सकते हैं कि सबकुछ वैसा ही है जैसा आप चाहते है.  https://accounts.google.com/b/0/SmsAuthSettings




Downloading

Get our toolbar!

Total Pageviews