Skip to main content

Name.com offers two-factor authentication as added layer of security.

Name.com offers another layer of security to protect their customer using Verisign Identity Protection (VIP) Services. The two-factor authentication is something you know (username and password) and something you have (device) to access your information. This is an excellent move by Name.com management to help protect their customers domain portfolio.

The service is called NameSafe. Yes, it is a service that you need to pay Name.com for $19.95 per year. The security device will cost you $5 one time fee. Once you receive your security device (or credential as they call it), you need to register your device Serial ID and follow the instruction. You will be done in under 10 minutes.

What do you expect with this NameSafe service?
  • Better security protecting your domain names.
  • Self-learning fraud detection.
  • You can use this device (credential) to any VIP Network members. Though you have to check the cost to use this service with other VIP Network. See here who's in VIP Network Members.
  • And Security Security Security!

I think Name.com is pioneer in domain name industry to provide a two-factor authentication. I know some registrars that provides additional service where you need to call their support hotline for you to make changes of DNS, Contact Information or other domain-related changes you need. This will take some time to complete, depending on how quickly the customer service response to your call. What if you leave outside USA? Then you have to pay internaltional phone bills unless you have VOIP service in place. Definitely Namesafe service is your alternative ways to protect your domain name porfolio.

I used the same technology (two-factor authentication) managing my Paypal account but I don't have to spend $19.95 per year for using this service. I only pay for the device $5 one time fee.

I use NeedName.com Enom Technology Partner (ETP) and Moscom.com (GoDaddy) for my domains. I need to call them and find out if I can get additional layer of security for my domain portfolio. Wish me luck.

Comments

Popular posts from this blog

Alternative Social Networks

If you are planning to create your  social network  e.g. similar to Facebook. Here's a short list of alternative software's: Open Source and Free​ http://buddypress.org/  - Wordpress (Open Source and Free) http://elgg.org/  - (Open Source and Free) Commercial Social Networks software http://www.socialengine.com/  ($299 Stand Alone, $29/mo Cloud) http://www.jomsocial.com/  (run with Joomla, need to know CMS) http://www.boonex.com/  (very expensive, $399 for Standard) http://www.anahitapolis.com/ http://www.oxwall.org/ http://sharetronix.com/ http://www.moosocial.com/ http://www.jcow.net/ http://phpdolphin.com http://www.grou.ps  (from free to Commercial, I left my networks and they are selling it  http://www.phpfox.com/  (I used this before, it's hard to maintain. I moved to NING but left too after it was sold to another company) http://www.ning.com  (I don't recommend using this service, it's hard to export your data when it's time to move) S

Learning Vulnerability Scanning by KING.NET

Learning Vulnerability Scanning is fun and easy. So I hope you enjoy reading this short how to guide on how to use vulnerability scanning to secure your servers and networks. NMAP is the swiss tool that you need to learn if you're serious in Cyber Security profession. The NMAP tool can be use with NSE scripting (Nmap Scripting Engine) to automate your tasks. For example using NSE Script using a  single vulnerability (cold fusion)  to scan our test lab machine. root@kali:~# nmap -v -p 80  --script http-vuln-cve2010-2861  10.11.1.220 Starting Nmap 6.47 ( http://nmap.org ) at 2016-07-22 17:34 EDT NSE: Loaded 1 scripts for scanning. NSE: Script Pre-scanning. Initiating ARP Ping Scan at 17:34 Scanning 10.11.1.220 [1 port] Completed ARP Ping Scan at 17:34, 0.04s elapsed (1 total hosts) Initiating Parallel DNS resolution of 1 host. at 17:34 Completed Parallel DNS resolution of 1 host. at 17:35, 13.01s elapsed Initiating SYN Stealth Scan at 17:35 Scanning 10.11.1.220 [1 port] Comp