All I got from this, is the hacker has 30 seconds to use said code after you attempt to log...that means they basically have to be waiting for one person imparticular to log on and then quickly get their key logger to get the login name and password and then input the proper code...
if someone puts in that much effort they can have all my stuff for 2 days hehe, but yes very good info to have, nothing makes you completely safe, but hey better then a kick in the nuts.
JJ