Logo
CAR REVIEW
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
PREGNANCY
 
 
Windows Vista

Maintaining Security : Restricting User Rights, Protecting Your Account

1/4/2013 3:25:54 PM

1. Restricting User Rights

One of the surest ways to protect your computer from either malicious or accidental damage is to assign everyone who uses the computer to the Standard group, and allow only one Administrator account for use in executing system changes. Often, however, several people are assigned administrative accounts. You can easily switch those administrative accounts to the Standard group. If you want to further restrict access to specific people, don’t assign them user accounts at all; instead, ask them to sign in to the Guest account. Of course, you’ll need to activate the Guest account before anyone can use it.

Change the Type of Access

1. Click the Start button, and click your account picture to display the User Accounts window for your account. Click Manage Another Account to display the Manage Accounts window.

2. Click the account you want to manage.

3. In the Change An Account window, click Change The Account Type.

4. Select the Standard User option if it isn’t already selected.

5. Click the Change Account Type button.

Use the Guest Account

1. In the Change An Account window, click Manage Another Account to display the Manage Accounts window.

2. Click the Guest account.

3. In the Turn On Guest Account window, click the Turn On button.

4. Close the Manage Accounts window when you’ve finished.

5. If necessary, inform those who want to use the computer that they don’t have Standard access, and advise them to log on using the Guest account.

Tip

If you’d prefer someone who has an account on the computer to log on as a Guest, you can easily delete his or her account. To do so, click the account in the Manage Accounts window, and click Delete The Account. Windows Vista will give you the options of saving any of this user’s files (but not their e-mails) to a folder on the Desktop that’s accessible only by the person who deleted the account, or of deleting the files.


2. Protecting Your Account

One of the easiest ways for someone to access your private files is waiting until you leave your computer unattended for a while and then jumping onto the computer using your already logged-on account. To prevent this, you can lock out any access to the computer by other people via your account. However, you can allow other people to log on using their own accounts and to have network access to the computer. When you lock the computer, all your programs and open files remain running but unavailable until you enter your password.

Lock the Computer

1. Make sure that you have a password assigned to your account.

2. Click the Start button, and then click the Lock This Computer button. The logon screen appears.

3. When you want to resume your work on the computer, type your password, and press Enter. If someone else logged on using his or her account, and your user account isn’t already displayed, click your user name, and then enter your password to unlock your user account on the computer.

Tip

You can also quickly lock the computer by pressing the Windows key+L.



Other -----------------
- Maintaining Security : Setting Your Password, Changing Your Password, Resetting Your Password
- Adobe Photoshop CS5 : The Essentials of Camera Raw - Photoshop Killer Tips
- Adobe Photoshop CS5 : Cropping and Straightening
- Adobe Photoshop CS5 : Adjusting Contrast Using Curves
- Developing Disk Images : Editing a Build’s Task Sequence
- Developing Disk Images : Creating Image Builds
- Developing Disk Images : Configuring the Lab Distribution Share (part 3) - Adding Packages
- Developing Disk Images : Configuring the Lab Distribution Share (part 2) - Adding Applications
- Developing Disk Images : Configuring the Lab Distribution Share (part 1) - Adding Windows Vista
- Adobe Flash Catalyst CS5 : Configuring the Data List's Parts
- Adobe Flash Catalyst CS5 : Convert Artwork to a Data List
- Adobe After Effects CS5 : Building a 3D object - Adding a camera
- Adobe After Effects CS5 : Building a 3D object - Nesting a 3D composition, Completing the scene
- Adobe Fireworks CS5 : Exporting to Flash Catalyst
- Adobe Fireworks CS5 : Adding a Flex skin
- Adobe Flash Professional CS5 : Editing Bitmaps in an Outside Editor
- Adobe Flash Professional CS5 : Importing Multiple Files, Copying Images from Other Programs
- Developing Disk Images : Capturing Images with BDD 2007, Navigating Deployment Workbench
- CorelDRAW X5 : Font Etiquette - Using Fonts with Style and Appropriateness
- CorelDRAW X5 : Finding and Saving Important Characters
 
 
Most view of day
- Microsoft Dynamics CRM 4 : Digital Phone Integration (part 2) - Cisco Unified CallConnector for Microsoft Dynamics CRM
- Maintaining Desktop Health : Using Task Scheduler (part 4) - Managing Tasks
- Microsoft Project 2010 : Comparing Costs to Your Budget (part 3) - Associate Resources with Their Budget Type, Compare Budget Resource Values
- Sharepoint 2013 : New Installation and Configuration - Managed Accounts
- Windows Server 2008 Server Core : Modifying Files with the Edlin Utility, Repairing System Databases with the ESEnTUtl Utility
- Monitoring Dynamics CRM Using System Center Operations Manager (part 2) - Microsoft Dynamics CRM Architecture
- Microsoft Exchange Server 2007 : Implementing Client Access and Hub Transport Servers - Transport Pipeline
- Microsoft Dynamics AX 2009 : Form Customization (part 1) - Learning Form Fundamentals
- Plug and Play and Power Management : Device Enumeration and Startup (part 2) - Device Power-Down and Removal
- Windows Phone 8 : Working with the Windows Phone Software (part 4) - Adding Content from Nonstandard Locations
Top 10
- Windows Phone 8 : Scheduled Tasks - Scheduled Task API Limitations
- Windows Phone 8 : Scheduled Tasks - Updating Tiles Using a Scheduled Task Agent
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 5) - Editing an Existing To-Do Item
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 4) - Creating the To-Do Item Shell Tile, Saving a To-Do Item
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 3) - Debugging Scheduled Tasks
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 2) - TodoService, TodoItemViewModel
- Windows Phone 8 : Scheduled Tasks - To-Do List Scheduled Task Sample (part 1) - TodoItem,TodoDataContext
- Windows Phone 8 : Scheduled Tasks - Using Scheduled Tasks
- Windows Phone 8 : Scheduled Tasks - Background Agent Types
- Windows Phone 8 : Windows Phone Toolkit Animated Page Transitions - Reusing the Transition Attached Properties
 
 
Windows XP
Windows Vista
Windows 7
Windows Azure
Windows Server
Windows Phone
2015 Camaro