Comparing with one-factor authentication, two factor authentication provides more protection to the user identity in online services. please compare the three different types of current;y available techniques for second factor regarding password cracking , eaves droopping , trojan horse