Solved

Give someone else temporary access

Posted on 2013-06-26
3
304 Views
Last Modified: 2013-07-29
I need to give someone temporary access for a day to answer questions, etc through my Twitter feed.

Aside from giving them my username/password, is there another way it can be done?
0
Comment
Question by:PeterErhard
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
  • 2
3 Comments
 
LVL 4

Accepted Solution

by:
AshutoshKumar earned 500 total points
ID: 39280302
hi
please go through the link
https://dev.twitter.com/discussions/7662
I also agree with Taylor Singletary. You have to trust the person which you want o give them access. otherwise the solution is that after finishing your job just change the password.

Other way is that just give a device in which login you twitter account , so that it will no need to give your account id or password
0
 

Author Comment

by:PeterErhard
ID: 39284032
It seems like it can be done through Tweet Deck but I'm confused.

There's instructions here http://www.computerworlduk.com/how-to/applications/3334470/how-to-manage-a-company-twitter-account-as-a-team/ but they're very confusing.

Has anyone done this, and able to work me through?
0
 
LVL 4

Expert Comment

by:AshutoshKumar
ID: 39289026
Ya, It seems like confusing.
0

Featured Post

Announcing the Most Valuable Experts of 2016

MVEs are more concerned with the satisfaction of those they help than with the considerable points they can earn. They are the types of people you feel privileged to call colleagues. Join us in honoring this amazing group of Experts.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

A great marketing strategy is diverse.  Read about the not so popular, yet effective, marketing tactics you can start using today!
Auditing domain password hashes is a commonly overlooked but critical requirement to ensuring secure passwords practices are followed. Methods exist to extract hashes directly for a live domain however this article describes a process to extract u…
I've attached the XLSM Excel spreadsheet I used in the video and also text files containing the macros used below. https://filedb.experts-exchange.com/incoming/2017/03_w12/1151775/Permutations.txt https://filedb.experts-exchange.com/incoming/201…
Finding and deleting duplicate (picture) files can be a time consuming task. My wife and I, our three kids and their families all share one dilemma: Managing our pictures. Between desktops, laptops, phones, tablets, and cameras; over the last decade…

742 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question