Sentences with phrase «up authentication method»

Not exact matches

The Contractor shall deliver devices meeting the specifications of the Kindle Touch, as follows: must provide at least a 6 ″ diagonal E Ink display, optimized with proprietary waveform and font technology, 600 x 800 pixel resolution at 167 ppi, 16 - level gray scale; must hold up to 1,400 books or have at least 2 GB of internal memory; must be accessible to public and private Wi - Fi networks or hotspots that use the 802.11 b, 802.11 g, or 802.11 n standard with support for WEP, WPA and WPA2 security using password authentication or Wi - Fi Protected Setup (WPS); must not connect to WPA and WPA2 secured networks using 802.1 X authentication methods; must not connect to ad - hoc (or peer - to - peer) Wi - Fi networks; and must include a front light feature.»
If you do, however, make sure everything is up to date — double check your phone number or other authentication method and confirm that your backup code amount is correct — if you've never used a backup code for anything but have fewer than 10 left available, something isn't right!
For free Promotional memberships, Marvel may take a payment method from you when signing up to a Promotional Membership for authentication purposes, however, nothing will be charged at that time (with the exception of a temporary hold (of de minimis charge) that may be placed for card validation purposes).
LastPass provides two free multi-factor authentication methods to lock your password vault up tight: a mobile app or a piece of paper.
Be warned, however, that the feature has more than its fair share of hiccups so you may want to set up an alternate authentication method.
Click the Configure button and you'll be able to set up a VPN like you would on an iOS device, choosing the type of VPN server, name, address, account, password, and other authentication methods.
and up to 10 WLANs» / SSID's with multiple authentication methods, Web Auth, LDAP, WPA2, Mac Auth.
It will be up to professionals and their organizations to discern the method of authentication that is right for their clients, but two security checkpoints are always better than one, especially when those two checkpoints are ones to which people have easy access.
a b c d e f g h i j k l m n o p q r s t u v w x y z