List to connect for the remaining 30 days classmates. History of cloud account registration in Odnoklassniki - IP verification. What do you mean by this?

Problems of information security are not without its origins in computer viruses, spyware or hackers, which we ourselves are often responsible for wasting, wasting an hour or simply leaving a computer, smartphone or tablet unplugged on the desktop. And everyday passwords will not help in this situation: in the first place, few people can cope with this situation, and in another way, entering the password right away is difficult and just lazy. As “spyguns” one can act as spies, colleagues, jealous girls, relatives or even bosses. If you happen to send a small round of information, it won’t lead to anything good, so be prepared and don’t relax.

Since it is impossible to guarantee the purity of access to your cloud account, then I would like to check every hour: what is not connected to your cloud record? Currently, most popular web services are required to provide tools to ensure and verify access to the client’s profile. It is therefore important to know what options are available for viewing this information in each of the services, so that you can check the access list for your profile every hour:

  • Dropbox– access to the storage facility is the most important part of security, since the storage facility itself often stores important information and files. Check the data about the hour, the place and device from which all inputs were connected to the cloud recording, you can adjust it in the section. There is a special tab with access data, which describes all program connections and sessions logged into the cloud account for the rest of the time. If you have the right to access any views on this page of programs or devices that are not configured, use the following option to simply enable access to the profile for these devices.
  • Google. This service was one of the first to introduce the idea of ​​access monitoring. Nowadays, every customer of the postal or home service knows where the hour is recorded, the IP address and the type of browser used to access the account pages. Recently this list has been expanded and a new section has appeared called “Appliances and activities”. Here you can see information about connections for the last 4 years. In principle, it is not difficult to remember or write down a number of primary IPs or once a month to review the names of the browsers used to log in. If you are in doubt, you can guess the approximate hour of remaining access, or specifically record the date, hour, browser and IP, and then check the data after an hour. The presence of an unknown number will be immediately obvious. What are you going to do? Restrict access to your profile from previous devices, update your antivirus, configure access and always change your password.
  • — as in Google services, food safety for customers is a principle here. The largest social network in the world cannot lack confidentiality and therefore requires access to the “Accounts Left” tab to verify access sessions. By opening this page, you can view all sessions for the remaining hour, and for each of them the hour, type and name of the browser will be indicated, as well as the choice of mobile phone and IP.
  • Microsoft– she advises her clients not to forget to look at all the data and access points for the rest of the hour, and also details the skin area, indicating the IP address, displaying additional devices, programs and applications. If there is a third-party presence, it is enough to click on the “Not me” option and thus notify company representatives about unauthorized access. Next, the standard procedure for updating the security system, introducing additional logins to prevent unauthorized access and changing the password is followed. The bottom line from all the descriptions of services here is that Microsoft provides the most information and detail, as befits a reputable company.
  • Odnoklassniki and VKontakte– two national social measures can teach their clients the ability to monitor access to social media accounts, but pay in different ways: Odnoklassniki – sparingly show the list of “Connections in 30 days”, in which It takes less than an hour to log in and IP, and distributors of the network VKontakte – we went to the food in more detail, giving more information. Therefore, by looking at the “Activity History” tab in the security settings of your VKontakte profile, you can get acquainted with the latest session history, time, browser type, as well as devices or programs that were used to log in.

Also, do not forget to take care of the safety and saving of your cloud account in Apple Icloud. Recently, a lot of private photographs of famous people have been leaked from this service and in the system.

Before speaking, if you need to repair an Apple-owned product, then using the picture you can go to the website of the sellers for the repair of similar products.

In most cases, to identify a spy, the information provided is entirely sufficient, using the following techniques: do not forget to unmute your computer as soon as you leave for a short time, carefully select a password, immediately block access to the profile from a stolen or stolen one mobile device, do not allow others to profit your profile, look at your connection lists a couple of times a month, check the approximate time, IP, name of browsers and programs. The whole complex of actions does not take many hours and does not require special skills, but allows you to maintain confidentiality and security at a pleasant level.

Video.
Since the popularity of Facebook in Russia is steadily growing, it will be worthwhile to find out how to secure your account with this social network.

Unfortunately, evil sides are not uncommon in social circles. Moreover, scammers often change your passwords and prevent you from accessing them. Often they just do various things in your name every hour, for example, send out spam, and in some cases just follow your lists, which is also not good. Therefore, it is very important to immediately identify the flow and live the events. Let's talk about that.

History of expansion

Great social networks have long created special sections for their participants that store basic information about the devices from which you access the site. I recommend that you periodically review this data so that you can make the most of your entries.

What are you going to do with respect?

Please check the IP address of the entry point.

butt. You spent the whole month near Tver, and the middle point of connection was another place, like London.

What is it like to live?

  1. Convert the file host and machine to virus.
  2. Change passwords on your folding device
  3. Notify the administration of the social network about your suspected entry point.

And now I’ll tell you how to find out the history of the story on various sites.

Classmates

To go into the history of history in Odnoklassniki, you need to click on “ change settings" under the head photo of the page, then select the item " History of expansion».

Also, the Raju will respect you for the sake of it." Exit from other devices" Clicking on it is only possible if you have opened Odnoklassniki on many computers, phones or tablets and have forgotten to correctly log out of the social network (simply closed the browser window, instead of clicking on the message " Vikhid").

VKontakte.

The history of posting on VKontakte is available in the section “ Setting up" Go to new and right hand select section " Safety" Click on the message " Show activity history" There is information there that is worth looking for. Respect what's on the deposit " Safety", you can end all sessions (log out of VKontakte) from all computers, tablets and phones with one click.

Facebook.

Press on the gear in the right corner, select “ Setting up" Now you need to select from the left side menu Safety" The information to click can be found after the heading “ Active sessions»

Google+

(as well as (Gmail) and other services from Google)

Posta Yandex.

Let's scroll to the end. Approximately in the middle there is a hole Remaining entrance" This is history.

Very often we are asked on the forum about the history of the news on the website ok.ru. In this article, we will understand this topic, and briefly talk about how to protect your page from evil and other inconveniences.

What is the history of the story?

on this side All data is saved (logs) about remaining connected to your personal page in the OK.ru social network. In the logs you can see the following information:

  • For any additional device you need to log in (mobile browser or desktop);
  • what programs denied access to it;
  • region and other region;
  • IP addresses of koristuvach;
  • entry date – date and hour.

Let's look at the whole story

The entire history of logins to your profile is saved on social network servers. You can take a look at it from the menu. Go to the message, under the avatar “My training”, then we go to the section “History of development”.

On this page you will find information about your remaining connections for a month (30 days). The Inode system itself can indicate which logics are suspicious and follow them up.

In this way, you can get rid of anyone if you go to your website under any IP. If you are suspicious of activity on it, you can safely change your password for the social media account and email associated with it.

Please note that you are visiting the address that appears there, so your details will not be displayed at all. Most often, proxies connect to the server, vikoryst to the IP address of another country, as shown in the screenshot below.

Exit from other devices

If your computer or smartphone does not use proxies or VPNs, we recommend that you log out of your cloud account on all devices.

Scroll down the page with login information and find the section with the “Close all other connections” button. Click on it and confirm with your password.

The article has been updated and supplemented: 01/10/2020.

GD Star Rating
a WordPress rating system

History of branching in Odnoklassniki, 4.8 out of 5 based on 37 Ratings

Marveled: 918

0

A number of gloomy syntheses and social services lead to the edge of a brown image, if the signs and devices of some devices were entered before the cloud record. It is important to re-evaluate the importance of these data if you spent, sold, gave away your money, or lost your smartphone, tablet, or computer. From these articles you will learn about how to find out in the cloud records of Google, Microsoft, Dropbox, Facebook, VK and Odnoklassniki videos about the history of your secondary profiles.

The seriousness of the problem is due in no way to hacker enterprises using the method of evil cloud recording and the devastation of your people. We all live in a society, the representatives of which from time to time have their noses stuck in the wrong. A traveler, a colleague or a travel companion can quickly use your device and simply read the listings on social networks, postal screenshots, or take a quick look at the dark disk. Generating complex passwords and enabling two-factor authentication may not work here. Therefore, it is important to check that you will not look at this periodically without your knowledge until further information is provided.

Google

Google's cloud account settings recently updated to include the " " section. The page displays all devices that are connected to the profile, including the remaining four steps.

Turn it over, why should you use a mobile device, what is the input? Guess what you went into the cloud record at night or during long trips? Return to your account, what is your default browser? Analyze which IP address, geographic location, and location you can access?

If you have indicated that you are suspicious, block access to the profile of gadgets on Android or iOS, or update security settings if abnormal activity was carried out through the computer.

Facebook

The billions of thousands of people in the most popular social network love to correspond, share photos and videos, but rarely care about the security of special information. Of course, Facebook has great respect for privacy and has a wide range of security options. Among them is the “ ” option. The channel offers both desktop browsers and mobile applications, including Messenger.

"VKontakte"

The Runet is filled with the evil of VK accounts, and even this social network itself is the most widespread in our area. We would like to remind you that you would like to occasionally look at the “” section, which is located in the “Security” tab to set up the service. Afterwards, you will be shown the remaining activity, and under it you will be sent back to the table of running sessions.

"Odnoklassniki"

Most often, RuNet contributors duplicate all the milestones of their life-saturated lives and for their fellow party mates. “Odnoklassniki”, along with other time eaters, are trying to increase the level of safety of their rogues. Why do people “sweat”? Take a look at their “” and you will understand. Dosit sparingly, even IP and hour input would be bad to add the type of device. We hope for a better situation in the near future.

Microsoft

Microsoft's efforts to improve the security of cloud storage look less favorable than those of Google, but are more pressing behind the scenes. Why? You are encouraged to appreciate the detailed impact of the action. For example, you find out that you want to choose a password for your profile.

A number of gloomy syntheses and social services lead to the edge of a brown image, if the signs and devices of some devices were entered before the cloud record. It is important to re-evaluate the importance of these data if you spent, sold, gave away your money, or lost your smartphone, tablet, or computer. From these articles you will learn about how to find out in the cloud records of Google, Microsoft, Dropbox, Facebook, VK and Odnoklassniki videos about the history of your secondary profiles.

The seriousness of the problem is due in no way to hacker enterprises using the method of evil cloud recording and the devastation of your people. We all live in a society, the representatives of which from time to time have a hard time sticking their nose into things that are not their own. A traveler, a colleague or a travel companion can quickly use your device and simply read the listings on social networks, postal screenshots, or take a quick look at the dark disk. Generating complex passwords and enabling two-factor authentication may not work here. Therefore, it is important to check that you do not “look at it” from time to time without your knowledge until further information is provided.

Recently, updates to Google's cloud account settings included a section called “Appliances and activities.” The page displays all devices that are connected to the profile, including the remaining four steps.

Turn it over, why should you use a mobile device, what is the input? Guess what you went into the cloud record at night or during long trips? Return to your account, what is your default browser? Analyze which IP address, geographic location, and location you can access?

If you have indicated that you are suspicious, block access to the profile of gadgets on Android or iOS, or update security settings if abnormal activity was carried out through the computer.

Facebook

The billions of thousands of people in the most popular social network love to correspond, share photos and videos, but rarely care about the security of special information. Of course, Facebook has great respect for privacy and has a wide range of security options. Among them is the option “ The stars are gone" The channel offers both desktop browsers and mobile applications, including Messenger.

"VKontakte"

The Runet is filled with the evil of VK accounts, and even this social network itself is the most widespread in our area. We won’t tell you if you would like to look into the section “ Activity history", which is located in the "Security" tab, set up the service. Afterwards, you will be shown the remaining activity, and under it you will be sent back to the table of running sessions.

"Odnoklassniki"

Most often, RuNet contributors duplicate all the milestones of their life-saturated lives and for their fellow party mates. “Odnoklassniki”, along with other time eaters, are trying to increase the level of safety of their rogues. Why do people “sweat”? Take a look at their “List to connect for the remaining 30 days” and you will understand. Dosit sparingly, even IP and hour input would be bad to add the type of device. We hope for a better situation in the near future.

Microsoft

The "Recent Activities" settings for Microsoft's cloud storage security settings seem to be less advanced than Google's, but also more behind the scenes. Why? You are encouraged to appreciate the detailed impact of the action. For example, you find out that you want to choose a password for your profile.

A detailed description of the presentations in the service.

The “This is not me” button lets Microsoft know that an attacker can deny access to the cloud account. You will then be asked to log in to the security service by changing your password and updating your security information.

A popular solution for remotely saving and synchronizing data between devices also has on board a tool that provides access to the hard drive. Go to Dropbox settings and go to the security tab. Here you will enter Wicon sessions and login devices. In addition, you will find out what programs are connected to the profile. With a couple of clicks on the mouse, you can disable access to cloud recording for third-party utilities and mobile devices.