Effectively closing entry gates for hackers: How strong auth