{"id":3583,"date":"2023-01-05T13:38:55","date_gmt":"2023-01-05T06:38:55","guid":{"rendered":"https:\/\/www.bagi2info.com\/?p=3583"},"modified":"2023-03-12T16:04:44","modified_gmt":"2023-03-12T09:04:44","slug":"cara-mengamankan-akun-gmail-hasil-beli-agar-tidak-dicuri","status":"publish","type":"post","link":"https:\/\/www.bagi2info.com\/en\/how-to-secure-purchased-gmail-accounts-from-being-stolen\/","title":{"rendered":"How to Secure Purchased Gmail Accounts from Being Stolen"},"content":{"rendered":"\r\n\r\nSometimes we want to buy accounts for various purposes such as blog accounts, games, adsense, and these accounts usually use Gmail as their login email.\r\n\r\n\r\n\r\n\r\n\r\nWhen buying a Gmail account, actually the account will not necessarily be yours completely if the buyer cannot secure the account. This is because, there are some sellers who actually take \/ steal \/ hack back after being sold because of a setting that the buyer doesn&#8217;t know. Therefore, so as not to lose, you can see how to secure a purchased Gmail account in this article.\r\n\r\n\r\n\r\n\r\n\r\nIndeed, not all sellers have such sneaky traits. Generally, this will happen when you buy it from an illegal seller. Even so, you must still be able to and understand how to secure the Gmail account so you don&#8217;t miss it.\r\n\r\n\r\n\r\n\r\n\r\nWith the high buying and selling transactions of Gmail accounts, the cases of fraud have also increased. A common case is the hackback of an account that was previously purchased.&nbsp; For this reason, you need to know how to secure the purchased Gmail account.\r\n\r\n\r\n\r\n\r\n<div class=\"wp-block-spacer\" style=\"height: 100px;\" aria-hidden=\"true\">&nbsp;<\/div>\r\n\r\n\r\n\r\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_82_2 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.bagi2info.com\/en\/how-to-secure-purchased-gmail-accounts-from-being-stolen\/#How_to_Secure_a_Purchased_Gmail_Account\" >How to Secure a Purchased Gmail Account<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.bagi2info.com\/en\/how-to-secure-purchased-gmail-accounts-from-being-stolen\/#1_Change_Password\" >1. Change Password<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.bagi2info.com\/en\/how-to-secure-purchased-gmail-accounts-from-being-stolen\/#2_Check_2FA_Two_Factor_Authentication_Authentication_Settings\" >2. Check 2FA (Two Factor Authentication) Authentication Settings<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.bagi2info.com\/en\/how-to-secure-purchased-gmail-accounts-from-being-stolen\/#3_Check_Email_Recovery_Settings\" >3. Check Email Recovery Settings<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.bagi2info.com\/en\/how-to-secure-purchased-gmail-accounts-from-being-stolen\/#4_Sign_out_from_all_devices\" >4. Sign out from all devices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.bagi2info.com\/en\/how-to-secure-purchased-gmail-accounts-from-being-stolen\/#5_Check_Third_Party_Application_Access\" >5. Check Third Party Application Access<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.bagi2info.com\/en\/how-to-secure-purchased-gmail-accounts-from-being-stolen\/#6_Check_Email_Settings_from_computer\" >6. Check Email Settings from computer<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"How_to_Secure_a_Purchased_Gmail_Account\"><\/span>How to Secure a Purchased Gmail Account<span class=\"ez-toc-section-end\"><\/span><\/h2>\r\n\r\n\r\n\r\n\r\nGenerally, the person doing the hackback uses a loophole through the email recovery number that is still linked to the Gmail account.\r\n\r\n\r\n\r\n\r\n\r\nEven if you have previously replaced all the data, everything can be recovered, including the password.\r\n\r\n\r\n\r\n\r\n\r\nThen, how do you secure the purchased Gmail account so that this doesn&#8217;t happen? Follow these steps.\r\n\r\n\r\n\r\n\r\n<div class=\"wp-block-spacer\" style=\"height: 100px;\" aria-hidden=\"true\">&nbsp;<\/div>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"1_Change_Password\"><\/span>1. Change Password<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n\r\nNow, to reset the password, you can open the settings on the Google device. After that, tap on \u201cYour Google Account\u201d. Then at the top, tap the <strong>Security<\/strong> option and enter Google.\r\n\r\n\r\n\r\n\r\n\r\nChoose a password. Now, enter your password. If so, continue pressing change password. Well, now your password has been changed to a new one.\r\n\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><a href=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-2.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3692\" src=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-2-1024x587.png\" alt=\" password, 2FA, recovery settings\" width=\"512\" height=\"294\" srcset=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-2-1024x587.png 1024w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-2-300x172.png 300w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-2-768x440.png 768w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-2.png 1149w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<div class=\"wp-block-spacer\" style=\"height: 100px;\" aria-hidden=\"true\">&nbsp;<\/div>\r\n\r\n\r\n\r\n<div class=\"wp-block-spacer\" style=\"height: 100px;\" aria-hidden=\"true\">&nbsp;<\/div>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"2_Check_2FA_Two_Factor_Authentication_Authentication_Settings\"><\/span>2. Check 2FA (Two Factor Authentication) Authentication Settings<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n\r\nYour account will be safer if it requires a password and verification code before starting to log in. If this method is omitted, maybe your account is only asked for when logging in, so the possibility of being hacked is greater.\r\n\r\n\r\n\r\n\r\n\r\nRemove all existing 2FA settings, and add your new 2FA settings to ensure account security\r\n\r\n\r\n\r\n\r\n<div class=\"wp-block-spacer\" style=\"height: 100px;\" aria-hidden=\"true\">&nbsp;<\/div>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"3_Check_Email_Recovery_Settings\"><\/span>3. Check Email Recovery Settings<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n\r\nBefore using it, make sure you have checked the email settings again, make sure that the 3 settings such as <strong>Phone recovery, Email Recovery, Security Question<\/strong> are deleted and replaced according to your active contacts. In this way, you can be sure that your Gmail account is completely safe and account breaches by irresponsible persons can be minimized.\r\n\r\n\r\n\r\n\r\n<div class=\"wp-block-spacer\" style=\"height: 100px;\" aria-hidden=\"true\">&nbsp;<\/div>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"4_Sign_out_from_all_devices\"><\/span>4. Sign out from all devices<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n\r\nYou can see the history of all devices that have logged in using the features that already exist in this Google account, starting from the date to the time when the Gmail account was used. You can also see the IP address used when accessing the account\r\n\r\n\r\n\r\n\r\n\r\nSo, to see the activity of the account, first open your Google account. Then, on the left navigation pane, select <strong>Security<\/strong>. After that, in the <strong>Your Devices<\/strong> section, click <strong>Manage all devices<\/strong>.\r\n\r\n\r\n\r\n\r\n\r\nDo <strong>sign out<\/strong>all existing devices. This step is important because even after changing the password, not all login sessions will be signed out as well, do this step to make sure no devices are logged in to your account again.\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><a href=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-1.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3690\" src=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-1-1024x426.png\" alt=\" security gmail your device third party apps\" width=\"512\" height=\"213\" srcset=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-1-1024x426.png 1024w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-1-300x125.png 300w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-1-768x320.png 768w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-1.png 1163w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"5_Check_Third_Party_Application_Access\"><\/span>5. Check Third Party Application Access<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n\r\nTo share your data safely, Google also allows you to provide access to other third-party applications or services. Where third parties here are made by developers who are not part of Google.\r\n\r\n\r\n\r\n\r\n\r\nFor example, when you download an application that can help schedule sports with your friends. Perhaps, the application will request access to <strong>Google Calendar<\/strong> and your contacts.\r\n\r\n\r\n\r\n\r\n\r\nTo check, you can open the security section of your Google account. Then in the <strong>Third-party apps with account access<\/strong> option, tap <strong>Manage third-party access<\/strong>. Well, now delete all the third party apps listed.\r\n\r\n\r\n\r\n\r\n<div class=\"wp-block-spacer\" style=\"height: 100px;\" aria-hidden=\"true\">&nbsp;<\/div>\r\n\r\n\r\n\r\n<h3 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"6_Check_Email_Settings_from_computer\"><\/span>6. Check Email Settings from computer<span class=\"ez-toc-section-end\"><\/span><\/h3>\r\n\r\n\r\n\r\n\r\nThe final step, login to your Gmail account from the computer, select <strong>See all settings<\/strong> in the upper right corner of the browser. On the <strong>Settings<\/strong> tab, select <strong>Accounts and Import<\/strong>, check the <strong>Grant access to your account<\/strong> setting, delete if any, this feature allows other e-mails to access e-mail You don&#8217;t log in at all.\r\n\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-full is-resized is-style-default\"><a href=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-3.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3698\" src=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-3.png\" alt=\"email gmail setting\" width=\"154\" height=\"238\" srcset=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-3.png 307w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-3-194x300.png 194w\" sizes=\"auto, (max-width: 154px) 100vw, 154px\" \/><\/a><\/figure>\r\n\r\n\r\n\r\n<figure class=\"wp-block-image size-large is-resized is-style-default\"><a href=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-4.png\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3704\" src=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-4-1024x389.png\" alt=\" Accounts and Import\" width=\"512\" height=\"195\" srcset=\"https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-4-1024x389.png 1024w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-4-300x114.png 300w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-4-768x292.png 768w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-4-1320x500.png 1320w, https:\/\/www.bagi2info.com\/wp-content\/uploads\/2023\/01\/image-4.png 1329w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/a><\/figure>\r\n","protected":false},"excerpt":{"rendered":"<p>Sometimes we want to buy accounts for various purposes such as blog accounts, games, adsense, and these accounts usually use Gmail as their login email. When buying a Gmail account, actually the account will&#46;&#46;&#46;<\/p>\n","protected":false},"author":1,"featured_media":3707,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-3583","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-komputer"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/posts\/3583","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/comments?post=3583"}],"version-history":[{"count":9,"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/posts\/3583\/revisions"}],"predecessor-version":[{"id":4173,"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/posts\/3583\/revisions\/4173"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/media\/3707"}],"wp:attachment":[{"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/media?parent=3583"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/categories?post=3583"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bagi2info.com\/en\/wp-json\/wp\/v2\/tags?post=3583"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}