Logins

Logins are where a username and password are requested, often followed by a TFA (Two-Factor Authentication) code, usually 6 digits, sometimes sent to a phone via SMS, and sometimes to an email. In both cases, avoid generating multiple code requests because it becomes impossible to tell which is the correct one to use. In these cases (common), leave it ten minutes and try again, and request only ONE code, then wait patiently for it to arrive. Sometimes it feels like ages.

Managing your usernames and passwords, known as credentials”, is a modern problem for which there are several offers of solutions. googling is helpful. I do NOT recommend written notes, whether typed or handwritten, because in my experience, they are always outdated and the notes are not updated. Searching for password managers” is one idea.

Connections

There is a LOT of jargon in what follows, so google is your friend.

This is the method, which will be one of several possibilities, by which you arrive at, or sometimes called navigate to, your above login screen. This may be by using a link address (a URL) in your browser (Chrome, Firefox, etc), so your browser may save your details to allow automated access.

Or it may be by using an app” (i.e. an application such as RDP ), which when setting it up, you provide the connection details, typically an i.p. address”, then your above username and password to allow automatic login. Also required is likely to be a port number”. Computers have 64,000 doors or ports” through which they can be connected. Usually, nearly all of these are closed. You need exactly the right port number to add to the IP address. So it is very technical, but simple once seen, and it is usually one time only, i.e. the first time.

It doesn’t work!

A frequent cry is that every aspect of the system is accused of being broken or not working in some way. While this is possible, it is highly unlikely, and it is practically always user error”. That’s you doing it wrong, often because what you guess must be the way is not. TFA codes are a prime example of this, as is finding that your device is not connected to the internet, or Wi-Fi, or the wrong Wi-Fi, or that VPN is activated when it should not be, or that VPN is not activated when it needs to be. Add to this Tailscale” install and activation, and it becomes apparent there are many ways for user error” to be the problem.

What to do?

Have in mind or even make a note of what connection method you will be using, and of course, your username and password, and how your TFA code will arrive.

So connection detail examples might look like this in an app:

IP address 192.168.0.xxx

Port number 3389

What VPN is required? (This blocks the outside internet from seeing your stuff)

Tailscale? (requires a setup code issued to you)

Teleport? (requires the app called wifiman” on any device.)

NONE? (usually means you are inside your network already)

Username: Fred (never, or very rarely, case sensitive)

Password: Sdfghj234! (Long is more secure than complex)

TFA: 123456 (nearly always a six-digit code)

We can see there is quite a lot to get wrong. Yet when it all works, it’s pretty much transparent and instant access - so that is the SECOND time…

N.B. It is perfectly possible to get someone else to do all of this for you. However, if you do that you are giving up your freedom to use any device you like from anywhere (on the planet). Knowledge is your power.

This document will not destruct in 30 seconds.

June 13, 2025


Previous post
Printer strategy Canon Maxify GX7050 (“Office Printer Canon GX7000”) is now a shared, locally installed printer on the server Printer Installed on the Server Added
Next post
Tech To do Backup testing Snapshots setup Format 128gb sticks Create RDP +1 Done Archive user logs Set log size Pay for licences £3k ? Hardening a bit more