Type of site
|Slogan(s)||One account. All of Google.|
A Google Account is a user account that is required for access, authentication and authorization to certain online Google services, including Gmail, Google+, Google Hangouts and Blogger. A wide variety of Google products do not require an account, including Google Search, YouTube, Google Books, Google Finance and Google Maps. However, an account is needed for uploading videos to YouTube and for making edits in Google Maps.
After a Google Account is created, the owner may selectively enable or disable various Google applications.
YouTube and Blogger maintain separate accounts for users who registered with the services before the Google acquisition. However, effective April 2011 YouTube users are required to link to a separate Google Account if they wish to continue to log into that service.
Google Account users may create a publicly accessible Google profile, to configure their presentation on Google products to other Google users. A Google profile can be linked to a user's profiles on various social-networking and image-hosting sites, as well as user blogs.
Third-party service providers may implement service authentication for Google Account holders via the Google Account mechanism.
While creating a Google account, users are asked to provide a recovery email address to allow them to reset their password if they have forgotten it, or if their account is hacked. In some countries, such as the United States, the United Kingdom and India, Google may also require one-time use of a mobile phone number to send an account validation code by SMS text messaging or voice message when creating a new account.
Google also offers a 2-step verification option—for additional security against hacking—that requests a validation code each time the user logs into their Google account. The code is either generated by an application ("Google Authenticator" or other similar apps) or received from Google as an SMS text message, a voice message, or an email to another account. Trusted devices can be "marked" to skip this 2-step log-on authentication. When this feature is switched on, software that cannot provide the validation code (e.g. IMAP and POP3 clients) must use a unique 16-character alphanumeric password generated by Google instead of the user's normal password.
On June 5, 2012, a new security feature was introduced to protect users from state-sponsored attacks. Whenever Google analysis indicate that a government has attempted to compromise an account, a notice will be displayed that reads "Warning: We believe state-sponsored attackers may be trying to compromise your account or computer."
Google may block an account for various reasons, such as "unusual activity" or entering an age "not old enough" to own a Google account. Reactivation is possible using web-forms, providing proof of identity through valid photo ID, or a small credit card payment (at a cost of 0.30 USD). Other methods (such as sending a fax or uploading some requested document) require human interaction and may take some "days or a couple of weeks" to be accomplished.
A provider of an authenticated web applications can delegate the authentication function to Google. When a user tries to gain access to a secure resource on the third party website they are redirected to the Google Accounts login page. Here they will see an explanation of why they need to log in with their Google credentials. Any data which is to be shared with the third party will also be listed on this screen. Once authentication has succeeded the user is redirected back to the referring site along with a token identifying them as having logged in via Google.
The tool called 'My Activity' launched in 2016 - which supersedes Google Search history and Google Web History - enables users to see and delete data tracked by Google through the Google account. The tool shows which websites were visited using Chrome while logged in, devices used, apps used, Google products interacted with, etc. All information is laid out in a timeline-like layout. Users can choose to entirely disable tracking, or remove certain activities which they don't want to be tracked.
As email, documents, and almost every aspect of our professional and personal lives moves onto the “cloud”—remote servers we rely on to store, guard, and make available all of our data whenever and from wherever we want them, all the time and into eternity—a brush with disaster reminds the author and his wife just how vulnerable those data can be. A trip to the inner fortress of Gmail, where Google developers recovered six years’ worth of hacked and deleted e‑mail, provides specific advice on protecting and backing up data now—and gives a picture both consoling and unsettling of the vulnerabilities we can all expect to face in the future.
None of the audio/visual content is hosted on this site. All media is embedded from other sites such as GoogleVideo, Wikipedia, YouTube etc. Therefore, this site has no control over the copyright issues of the streaming media.
All issues concerning copyright violations should be aimed at the sites hosting the material. This site does not host any of the streaming media and the owner has not uploaded any of the material to the video hosting servers. Anyone can find the same content on Google Video or YouTube by themselves.
The owner of this site cannot know which documentaries are in public domain, which has been uploaded to e.g. YouTube by the owner and which has been uploaded without permission. The copyright owner must contact the source if he wants his material off the Internet completely.