Bruce’s Shorts | 4.9 - Authentication

What is two-factor authentication (2FA) and why is your identity at risk if you don’t use it? In a continuing series of short films, Bruce Devlin takes a light-hearted look at aspects of internet security.
Authentication is used to establish the identity of a user attempting to access a web site. But what if It were a robot trying to hack into the site? A challenge-response test like CAPTCHA can be used to determine if the user is a human. Emails can also be used to authenticate addresses. However, these methods are not infallible.
This is where 2FA comes in. Typically an identification token is sent via SMS or email to give a second level of authentication.
You might also like...
Remote Contribution At NAB 2025
The technology required to get high quality content from the venue to the viewer for live sports production remains an area of intense research and development, so there will be plenty of innovation and expertise in this area on the…
Production Network Technologies At NAB 2025
As NAB approaches we pick up the key theme of hybrid production network infrastructure that combines SDI-IP network infrastructure & data center model compute resources, with a run-down of what to expect from vendors on the show floor.
KVM & Multiviewer Systems At NAB 2025
It’s NAB time again. Once again, as we head towards the show, we will take a look at the key product announcements across a range of key technology and workflow areas. We begin with the always critical world of K…
Sports Production Infrastructure – Where’s The Compute?
The evolution of IP based production and increased computer processing power have enabled new workflows, so how is compute resource being deployed to create new remote and hybrid approaches?
Building Software Defined Infrastructure: Shifting Data
The fundamental principles of how data flows through local and remote processing systems are central to designing software defined infrastructure.