Skip to Content
12-16-2009 @ 7:55PM
Having the authenticator on your computer almost defeats the purpose of having one in the first place. If your computer is hacked, the authenticator is supposed to stop them from stealing your account as it's a separate device.It'd be like storing the key to your safe on top of the safe. Yes, someone still has to break into your house first, but it defeats the purpose of using a safe.
First time? A confirmation email will be sent to you after submitting.
Members enter your username and password.
Enter your AOL or AIM screenname and password.
Please keep your comments relevant to this blog entry. Email addresses are never displayed, but they are required to confirm your comments.
When you enter your name and email address, you'll be sent a link to confirm your comment, and a password. To leave another comment, just use that password.
To create a live link, simply type the URL (including http://) or email address and we will make it a live link for you. You can put up to 3 URLs in your comments. Line breaks and paragraphs are automatically converted — no need to use <p> or <br /> tags.