Warning: Illegal string offset 'sfsi_rectsub' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 52
Warning: Illegal string offset 'sfsi_rectfb' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 55
Warning: Illegal string offset 'sfsi_rectshr' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 58
Warning: Illegal string offset 'sfsi_recttwtr' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 61
Warning: Illegal string offset 'sfsi_rectpinit' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 64
Warning: Illegal string offset 'sfsi_rectfbshare' in /home/gdashleycyber/public_html/wp-content/plugins/ultimate-social-media-icons/libs/controllers/sfsiocns_OnPosts.php on line 67
A method of confirming a user’s claimed identity by utilizing a combination of two different components. These components may be something that the user knows, something that the user possesses or something that is inseparable from the user.