Skip to main content

不要把GgoogleVoice帐号捆绑到你的google主帐号上

首要的,也是最重要的一条是:不要把GgoogleVoice帐号捆绑到你的google主帐号上!
因为用SipSorcery或Obi110等打GV电话时,都需要给出你的GV帐号密码。这样这个密码很容易被盗,你的google主帐户就变得非常危险!
所以在设立新GV号码时,一定要新建一个google帐号,专门用于GV。这样做并不影响方便性,因为你可以把voicemail和SMS的notification,甚至所有的email都转发到你的主mail上。
如果你的GV号码已经是捆在你的主google帐号上的话,尽快转到一个新的独立帐号。在这里填表:
http://www.google.com/support/voice/bin/request.py?contact_type=account_transfer
填表前,先申请一个gmail用于新的GV帐户。可以在这个新gmail帐户上加GV,也可以不加。在你现在的GV帐户里,核实或更换PIN,不能跟新帐户的PIN一样(如果新帐户没有GV,PIN是0000)。切换完成后,PIN还是老的不会变。
顺便说一句:如果你还没有GV号码,这是最容易得一个的方法了。就是申请一个gmail,然后直接加GV。不需要邀请或等待什么的,立马可得。

Comments

Popular posts from this blog

CKA Simulator Kubernetes 1.22

  https://killer.sh Pre Setup Once you've gained access to your terminal it might be wise to spend ~1 minute to setup your environment. You could set these: alias k = kubectl                         # will already be pre-configured export do = "--dry-run=client -o yaml"     # k get pod x $do export now = "--force --grace-period 0"   # k delete pod x $now Vim To make vim use 2 spaces for a tab edit ~/.vimrc to contain: set tabstop=2 set expandtab set shiftwidth=2 More setup suggestions are in the tips section .     Question 1 | Contexts Task weight: 1%   You have access to multiple clusters from your main terminal through kubectl contexts. Write all those context names into /opt/course/1/contexts . Next write a command to display the current context into /opt/course/1/context_default_kubectl.sh , the command should use kubectl . Finally write a second command doing the same thing into ...

OWASP Top 10 Threats and Mitigations Exam - Single Select

Last updated 4 Aug 11 Course Title: OWASP Top 10 Threats and Mitigation Exam Questions - Single Select 1) Which of the following consequences is most likely to occur due to an injection attack? Spoofing Cross-site request forgery Denial of service   Correct Insecure direct object references 2) Your application is created using a language that does not support a clear distinction between code and data. Which vulnerability is most likely to occur in your application? Injection   Correct Insecure direct object references Failure to restrict URL access Insufficient transport layer protection 3) Which of the following scenarios is most likely to cause an injection attack? Unvalidated input is embedded in an instruction stream.   Correct Unvalidated input can be distinguished from valid instructions. A Web application does not validate a client’s access to a resource. A Web action performs an operation on behalf of the user without checkin...