Introducing the “Welcome to Xojo” Bundle!

New to Xojo and looking for guidance? We've put together a terrific bundle to welcome you! Xojo Bundle

This bundle includes six back issues of the magazine -- all of year 15 in printed book and digital formats -- plus a one-year subscription so you'll be learning all about Xojo for the next year. It's the perfect way to get started programming with Xojo. And you save as much as $35 over the non-bundle price!

This offer is only available for a limited time as supplies are limited, so hurry today and order this special bundle before the offer goes away!

Article Preview

Buy Now



Two-factor Authentication

Implementing YubiKey for strong authentication of users in REALbasic

Issue: 7.5 (July/August 2009)
Author: Mattias Sandstrom
Article Description: No description available.
Article Length (in bytes): 20,761
Starting Page Number: 20
RBD Number: 7510
Resource File(s):

Download Icon 7510 project.zip Updated: Wednesday, July 1, 2009 at 1:23 PM

Related Web Link(s):


Known Limitations: None

Excerpt of article text...

Looking up authentication in Cassell's Concise English Dictionary I find the definition "to establish the truth or credibility of". Being a programmer or computer user, the idea that pops up is a username (often your email-address) in combination with an arbitrary complex password (an average password is claimed to be 6.8 characters long, often the name of a pet or the license plate of your first car). Being somewhat security conscious (or paranoid as some could say), a password for me is something much stronger - Cassell defines it as "a word by which to distinguish friends from strangers". Personally, I don't see how qwerty123 or passw0rd would fit those shoes. Anyway this is what we live with and have become accustomed to. Interviewing a couple of friends in a semi-scientific manner I find out that they use exactly three different passwords for their digital life; one weak and one strong, and finally one "in the middle". The criteria to define which online service needs which password is somewhat sketchy and there are several friends using some sort of password database software. Over the years we have learned to accept username and password as a daily thing in our digital life.

...End of Excerpt. Please purchase the magazine to read the full article.

Article copyrighted by REALbasic Developer magazine. All rights reserved.




Weblog Commenting and Trackback by HaloScan.com