Closet and Storage

Bottom Line McAfee's True Key password manager handles basic tasks, with a focus on multi-factor authentication, but it lacks secure sharing, password inheritance, and other advanced password management features. If you raise the security level to Advanced, desktop installations add the option to authenticate using a second device.

Easy Start

There's also a Wallet feature that lets you save address, credit card, driver's license, membership, passport, and social security number data, with appropriate data fields for each type. For credit cards, True Key lets you import details by snapping a photo. You can create as many personal data records as you want, and color-code them. However, you can't use them to fill in Web forms the way you can with LastPass, Password Boss Premium , and most for-pay password managers.

True Key sticks to the basics. At the time of my previous review, the company told me that this feature was planned for the next edition, but it still hasn't happened.

You can't categorize, group, or tag your saved logins. There's no secure sharing of passwords, or password inheritance, either. But what it does do, True Key does well. True Key's real strength lies in its ability to use multiple factors for authentication. Right from the start, it requires both the master password and a trusted device.

Any attempt to log in from a device that's not yet trusted requires additional authentication. For example, when I installed it on an Apple iPhone 7 , it sent a verification email that I had to click. When I went on to install on an Android device, it asked me to verify by swiping a notification on the now-trusted iPhone.

You can add other factors in settings. Your trusted email account is automatically available for verification. If you wish, you can enhance facial recognition so it requires you to turn your head from side to side.

That's so that nobody can log in using a photo of your face. And you can require authentication using a second device, typically a mobile device. At the default Basic security level, you choose from a subset of these possibilities. You can't deselect Trusted Device; that's a given. To that, you add either master password, face-based authentication, or fingerprint verification. Which of these are available depends on your device.

If you raise the security level to Advanced, desktop installations add the option to authenticate using a second device. At this level, you must choose exactly two factors besides the trusted device. On the iPhone, for example, it offered three choices: The Mac edition still exhibited slightly confusing behavior. If you select three additional factors instead of two, it disables the Activate button without explicitly saying why.

The security level and authentication choices are specific to the device you're using. If you want to always use Advanced authentication, remember to change that setting on each new device. If you've gone out without your second device, or if it's too dark for face recognition, never fear. You can choose to use a different factor, such as email verification.

Fingerprint verification is available for certain Android devices, but only those whose fingerprint readers meet Intel's criteria for accuracy. True Key can use a PC-installed fingerprint reader for authentication.

Having been part of Intel has clearly paid off for True Key. When you use the Edge extension, you get another option for authentication, Windows Hello. This is the same feature that lets you log into your Windows account using face recognition, fingerprint authentication, or a PIN on a trusted device. Which of these are available depends on the capabilities of your PC. I have several Windows 10 computers, but only one has a camera, and the camera isn't up to Windows Hello standards.

True Key doesn't attempt to pull in every authentication factor in the world. But really, True Key's choices for multi-factor authentication work well together.

LogMeOnce lets you create your account without ever defining a master password, using a variety of other factors instead. With oneID , you can't create a master password even if you want to; it relies strictly on authentication using a trusted device.

True Key initially requires a master password, but you can go password-free quite easily. At the Basic security level, you can choose to authenticate using your face, not a master password. If you wisely choose Advanced, you can authenticate with multiple factors.

Password managers that do rely on a master password usually offer a warning that if you forget that password, they can't help you. That also means they can't be compelled to unlock your account for the NSA, which is a plus. McAfee can't unlock your account, or tell you the master password you forgot, but if you've defined enough other factors, True Key lets you authenticate with those and thereby reset the master.

I tried the reset feature on the Android device. It required advanced face authentication, meaning I had to move my head from side to side. And it sent an authentication request to my iPhone. With that double authentication, it let me reset the master password.

If someone else tries to reset the master password, you get an email alert, with an option to lock password recovery for a day. Three failed tries triggers that lock automatically. You're not likely to lose a desktop computer, but it's awfully easy to misplace a mobile device. If someone else gets hold of your device, the multi-factor authentication system should prevent them from accessing it. To make it even tougher for a thief, you can remotely remove the device from the trusted list.

Every successful modern password manager syncs passwords across all your devices. True Key goes a step further, involving those devices and your biometric data in the authentication process. It's easy to set up, easy to use, and attractive. If only it also had the advanced features that grace its competitors, it would be even better.

LogMeOnce Password Management Suite Ultimate also offers many different authentication factors, but just two at a time. It's even more feature-packed than long-time favorite LastPass Premium. With Dashlane, you get all your password management needs in a slick package that's as attractive as True Key's. And Sticky Password Premium combines advanced password management features with an extra-secure local-only syncing option.

These four are our Editors' Choice commercial password manager. But if your main concern is multi-factor authentication, True Key has them all beat. If this review has piqued your interest in multi-factor authentication, you can read more about it in our feature, Two-Factor Authentication: He was present at the formation of the Association of Shareware Professionals, and served on its board of directors.

This newsletter may contain advertising, deals, or affiliate links. What is a "Handle" when discussing resources in Windows? How do they work? It's an abstract reference value to a resource, often memory or an open file, or a pipe. Lawrence Dol Lawrence Dol I really appreciate the speedy response.

Unfortunately, I think I'm still too much of a newbie to fully understand it: Does my expanded answer shed any light? This has a couple of consequences: Why go through this trouble? Consider this fourth example of a newer version of this same API: Dan Moulding Dan Moulding k 16 83 Intentional or not, you're right -- the concept is certainly opaque at least to me: I've expanded on my original answer with some concrete examples.

Hopefully this will make the concept a bit more transparent. This has to be one of the cleanest, direct, and most well written response to a any question I've seen in a while. Thank you sincerely for taking the time to write it!

So for instance, if you want to create a Window, and show it on the screen you could do the following: Nick Haddad Nick Haddad 6, 2 27 The other handle types you name HWND , etc. Those are not managed by the Windows kernel. IInspectable guessing those are managed by User Now if we update foo to: A final update to foo of: This is flawed reasoning; the C memory allocation subsystem cannot just invalidate pointers at will.

Besides, double indirection does not help if the memory directly pointed to is moved around underneath the program unless the pointer is actually itself an abstraction from the real memory - which would make it a handle. The Macintosh operating system in versions up to 9 or 8 did exactly the above. If you allocated some system object, you'd often get a handle to it, leaving the OS free to move the object around.

With the limited memory size of the first Macs that was rather important. A handle is like a primary key value of a record in a database. Edwin Yip Edwin Yip 1, 2 27 I don't imagine you can assert that the handle is unique. It may be unique per a user's Windows Station, but it is not guaranteed to be unique if there are multiple users accessing the same system at the same time.

That is, multiple users could get back a handle value that is numerically identical, but in the context of the user's Windows Station they map to different things A primary key isn't gonna be unique between different tables either Charlie Martin Charlie Martin True, but it's always worth remembering that handle is usually not a memory address and one user code should not dereference it. Raj Raj 1 1 Sign up or log in Sign up using Google.

Sign up using Facebook. Sign up using Email and Password. Post as a guest Name. Email Required, but never shown. Post Your Answer Discard By clicking "Post Your Answer", you acknowledge that you have read our updated terms of service , privacy policy and cookie policy , and that your continued use of the website is subject to these policies. Adios to Winter Bash Stack Overflow works best with JavaScript enabled.

Copyright © 2017 · All Rights Reserved · Maine Council of Churches