How well do "picture passwords" in Windows 8 work?
jdixon 40 weeks ago
I'm looking at getting a new tablet, and pretty much have it down to a Surface or a Nexus 10. I have an Android phone, but I've also had a work issued iPhone, and one think I like is using the screen lock pattern instead of entering a PIN. I know it's not a big deal, and a "first world problem" at best, but it still annoys me to enter a pin each time I unlock the screen. I know Windows 8 has a "picture passwork" option where you can unlock the device through "drawing" on a photo. Two question about it: First, is it pretty easy to use? By that I mean is it really picky that you get it exactly right, or is does it give you a little leeway so if you don't stop on exactly the right pixel it will still unlock? Second, does it work ok from a security standpoint? Could someone just draw around on a photo and eventually get it to unlock?
Topic: Personal TechAnswer this Question
Ask a question
What will Microsoft do with the Android-variant smartphone Nokia has under development: Keep it or kill it?
We've already learned about iBuyPower's reasonably priced $500 Steam Machine. Digital Storm is heading in the other direction, aiming for the "Best" Steam Machine tier.
You now (or soon will) have ten new ways to use your Chromecast, though most of them are fairly niche.
Just in case you haven't heard, there's a bogus post going around promising a way to enable backwards compatibility on your Xbox One.
Microsoft sold out the Dell Venue 8 Pro tablet within minutes of kicking off an online discount Monday morning.
Limited data plan? No problem--we have some simple tricks that can help you cut back on data usage.
Yahoo may soon be broadcasting more concerts following its acquisition of live music streaming startup Evntlive.
Third-party devices can add smart features to an existing set, and some of them are quite cheap.
Thanks to Amazon Prime Air, it might be time to update a classic poem
A report from HP claims apps lack security defenses, fail to encrypt data, and compromise personal information.
White Papers & Webcasts