This document discusses computer login security techniques. It introduces login systems for websites, apps, operating systems and describes different biometric techniques for login including passwords, fingerprints, voice recognition, facial recognition and iris recognition. It notes limitations of facial recognition from changes in lighting, appearance and need for cameras. The best solution proposed is DNA recognition for its very high accuracy and inability to make mistakes.