Historically, usernames and passwords are the most common form of authenticating computer users. They are also both the worst management headache for IT staff and the biggest network security hole in existence. Many help desks handle more password related calls than any other category. Users routinely share their passwords with one another. We have passwords on yellow sticky notes on the monitor and under the keyboard. If you don’t find the password there, try the Rolodex under “P” for password.
a biometric token-attaches to your key ring. will unlock a computer, network, programs, the building front doorsthe garage/barrier from your car. a RSA database. JUST USE YOUR FINGER. totally secure even if lost or stolen.